Wednesday, November 27, 2019

How effectively does Shakespeare introduce the characters and themes of Hamlet Essay Example

How effectively does Shakespeare introduce the characters and themes of Hamlet Paper To be or not to be that is the question Hamlet famously declaims in the third act of William Shakespeares longest drama, and one of the most probing plays ever to be performed on stage. Shakespeares Hamlet was written around the year 1600 in the final years of the reign of Queen Elizabeth I, who had been the monarch of England for more than forty years and was then in her late sixties. The prospect of Elizabeths death and the question of who would succeed her was a subject of grave anxiety at the time, since Elizabeth had no children, and the only person with a legitimate royal claim, James of Scotland, was the son of Mary, Queen of Scots, and therefore represented a political faction to which Elizabeth was opposed. Hamlet and many other Shakespeare plays from this period, unsurprisingly, explore this theme of the transfer of power from one monarch to the next, particularly focusing on the uncertainties, betrayals, and upheaval that accompany such shifts in power, and the general sense of anxiety and fear that surround them. These themes of disorder, dilemma and indecision, madness and revenge and the discrepancy between appearance and reality are mainly explored through the main characters, principally Hamlet, Claudius, Gertrude, Polonius, Laertes and Ophelia, and through the plot itself. We will write a custom essay sample on How effectively does Shakespeare introduce the characters and themes of Hamlet specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on How effectively does Shakespeare introduce the characters and themes of Hamlet specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on How effectively does Shakespeare introduce the characters and themes of Hamlet specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Therefore, the first two acts in this drama are paramount in introducing the characters, and thus also themes, of Shakespeares play Hamlet for it to be regarded as one of the greatest plays ever to be written and staged in universal drama. As one critic, T. S. Elliot, remarks in his book On Poetry and Poets, the opening scene of Hamlet is as well constructed as that of any play ever written . Immediately, from the opening of the play, Shakespeare establishes a mood of anxiety and dread by using fragments of conversation, for example, Nay, answer me, stand and unfold yourself and Long live the King! The verses do not flow and their broken rhythms generate an atmosphere of unease, apprehension and confusion; this, and the fact that the play begins with the question Whos there? and is followed by six more in the next twenty lines, reveals from this early point of the play the notion of distrust and uncertainty that is prevalent throughout the play. In addition, the supernatural appearance of the ghost on a chilling, misty night outside Elsinore Castle indicates immediately that something is wrong in Denmark. The ghost serves to enlarge the shadow King Hamlet casts across Denmark, indicating that something about his death has upset the balance of nature. The appearance of the ghost also gives physical from to the fearful anxiety that surrounds the transfer of power after the kings death, seeming to imply, as Horatio sees it, a dark and frightening future for all. In addition, Horatio in particular sees the ghost as an ill omen, an extravagant and erring spirit, boding violence and turmoil in Denmarks future. The introduction of this character in the scene is important in signalling to the audience that there can be no doubt of the Ghosts existence or of its striking resemblance to the last King of Denmark, the valiant warrior, King Hamlet. This is due to the establishment of this character as a good-honoured man who is also educated, intelligent and sceptical of supernatural events. Before he sees the ghosts, he insists, Tush, tush, twill not appear, and even after seeing it he is reluctant to give full credence to stories of magic and mysticism. However, on seeing the ghost, Horatios ability to accept the truth at once, even when his predictions had been proven wrong, indicates the fundamental trustworthiness of his character. His reaction to the ghost functions to overcome the audiences sense of disbelief, since for a man as sceptical, intelligent and trustworthy as Horatio to believe in and fear the Ghost is far more convincing than if its only witnesses had been a pair of superstitious watchmen. In this subtle way, Shakespeare introduces Horatio from the first scene of the play not only to inaugurate the themes of disorder and uncertainty but also to represent the audiences perspective throughout this dark and ghostly scene. In a seemingly stark contrast, the second scene of the play is devoted to the apparently jovial court of the recently crowned King Claudius. If the area outside the castle is murky with the aura of dread and anxiety, the rooms inside the castle are committed to an energetic attempt to banish that aura, as the king, queen, and the courtiers desperately pretend that nothing is out of the ordinary. Claudiuss opening speech appears relaxed, level-headed, eloquent and persuasive. In spite of this, Shakespeare signals to the audience, long before they hear Claudius confess it, that the Kings public mask conceals a troubled mind. The merriment of the court seems superficial largely due to the fact that the idea of balance Claudius pledges to follow is unnatural. Claudiuss speech is full of contradictory words, ideas and phrases, beginning with Though yet of Hamlet our late brothers death / The memory be green, which combines the idea of death and decay with the idea of greenery, growth, and renewal. He also speaks of defeated joy, an auspicious and a drooping eye and dirge (a lament for the dead) in marriage, ideas which are at unease with one another, theatrical means of hinting at the hypocrisy Claudius embodies. Consequently, as a result of this clear dishonesty, this scene portrays as dire a situation as the first scene does. While in the first scene Shakespeare illustrates the sense of disorder, fear and danger through the guards panicked and forceful exchanges and the appearance of the ghost, the second scene hints at the corruption and weakness of Claudius, through the incongruities in his speech and the fallaciousness of the setting around him. Contrary to the dishonesty of Claudiuss character is the way Hamlet is introduced through the first two acts. Prince Hamlet, devastated by his fathers death and betrayed by his mothers marriage, is introduced as the only character who is unwilling to play along with Claudiuss gaudy attempt to mimic a healthy royal court. His words to Claudius are cryptic so that he can be rude to the clever Claudius whilst giving little away to the court. His first words, A little more than kin and less than kind, suggest how Hamlet feels that he is neither kindly disposed towards his uncle, nor does he think that he is of the same kind, meaning from the same honourable class. His next response, Not so, my lord. I am too much in the sun adds more emphasis to this dark and mysterious side of Hamlet as he hints of his awareness of all the that is ongoing ever since his fathers death. The war of words is apparent in this scene between the two characters of Claudius and Hamlet as is the audiences sense that both of these characters know the truth but due to political concerns and fear of confrontation they do not openly say it, thereby highlighting a central theme in the play: that of the conflict between appearance and reality. While Claudius pretends to be unaware of the reasons for Hamlets anger and hatred, Hamlet in his uncertainty on how to exact revenge, is afraid to take decisive action and thus has to be content with making scathing comments in the hope of provoking some sort of admittance by Claudius of fowl play. His seven soliloquies are all centred on the most important existential themes: the emptiness of existence, suicide, death, suffering, action, a fear of death which puts off the most momentous decisions, the fear of the beyond, the degradation of the flesh, the triumph of vice over virtue, the pride and hypocrisy of human beings, and the difficulty of acting under the weight of a thought which makes cowards of us all. Thus, they probe his own situation, his mind and the problems attached to being human in a society characterised by duplicity and hypocrisy, and being an active agent in a moral universe. Hamlets first soliloquy in Act one Scene 2 opens with the emphatic line: O that this too too sullied flesh would melt, a cry of anguish and a longing for dissolution, which is however followed by an acknowledgement of the fundamental Christian injunction against suicide, thereby precluding escape from the burden of life. This question of the moral validity of suicide in an unbearable painful world haunts the rest of the play, reaching the height of its urgency in perhaps the most famous line in all of English Literature: To be, or not to be- that is the question. In this scene Hamlet mainly focuses on the appalling conditions of life, railing against Claudiuss court as an unweeded garden/ That grows to seed. Things rank and gross in nature/ Posses it merely. The listless tempo of the words How weary, stale, flat and unprofitable conveys his weariness. The speech contrasts dramatically with Claudiuss flowing lines as its verse starts and stops, punctuated by expressions of pain and confusion. This disjointed rhyme serves to reflect the dislocated progress of Hamlets thoughts which convey to the audience his inner turmoil. Moreover, in this soliloquy, Hamlets bewilderment and disgust at his mothers hasty remarriage and sexual depravity is revealed as he proceeds to a comparison in which his sanctified father is contrasted with his repugnant uncle, Hyperion to a satyr, the sun god is set against the mythical half-human, half-beast noted for sexual appetite. This disgust is not only apparent in the imagery but also in the sounds of Hamlets words. Hissing sibilants convey the young mans nausea as he imagines his other and his uncle in bed together: Oh most wicked speed, to post/ With such dexterity to incestuous sheets. The intensity of Hamlets disgust here underlines how impossible he finds it to come to terms with the incestuous union of his mother and his uncle and the indecent haste of his mothers re-marriage. In essence, Shakespeare uses this soliloquy to encapsulate and foreshadow several of the ideas, concepts and images that dominate this play: disillusionment so severe that suicide seems to be the only alternative, insincerity that leads to dramatic theatricality, Hamlets inability to express his feelings publicly or to replace his words with action which lead to further frustration, anger and passion, and a desperation and weakness that amounts to a betrayal of human decency, far beyond any religious considerations. Although the development of these ideas is gradual, the important role the first two acts play in illustrating the various concepts and in underlining their importance from early on, mainly through Hamlets soliloquies, cannot be exaggerated. A presentation of this can be seen through comparing Hamlets thoughts and actions in act one scene two to that of act two scene two, where he makes his second soliloquy. Again, Hamlet speaks in riddles, this time to Polonius. Although his words sound like nonsense, a thread of bitter satire runs through it giving the audience the impression that Hamlets remarks indeed are not madness, but forthright contempt, privileged rudeness in a court where no one speaks the truth. For example, importantly Hamlet declares, I am but mad north-north-west. When the wind is southerly, that is, he is only mad at certain calculated times, and the rest of the time he knows what is what. And, although he presents himself as sounding mad, a closer look at the directions reveals they do in fact point in one and the same way. Furthermore, in this scene, the longest by far in the play, Hamlet makes his second soliloquy following his involvement with the players. The presence of actors and the idea of a play within a play points to an important theme: that real life is in certain ways like play-acting. Hamlet professes to be amazed by the player kings ability to engage emotionally with the story he is telling even though it is only an imaginative recreation. He berates himself for displaying less passion when overwhelmed with grief and outrage than that displayed by an actor who is merely producing a performance. His self-disgust is evident through the insults he hurls at himself, calling himself among other things a rogue and pleasant slave and through his questioning of himself: Am I a coward? As his indignation reaches its zenith, assonance, rhythm and repetition illustrate the intensity of emotion, portraying his ever-worsening inner turmoil that threatens to erupt in the climax Bloody, bawdy villain! / Remorseless, treacherous, lecherous, kindles villain! only to collapse into a state of exhaustion due to the continual failure to take action. The theme of dilemma and indecision is clearly dominant here, and it is due to Hamlets apparent lack of willingness to take action here that many view Hamlet as a play of words and emotion rather than action. One such critic, who takes this view, T. S. Elliot, remarked that Hamlet presented a character dominated by an emotion which is inexpressible because it exceeds the events that occur, the absolute opposite of Macbeth.   Yet, in contrast to these interpretations, Hamlet by the end of the play evolves from a dreamer to a man of action. While the play begins with Hamlet contemplating his fathers death and later on, in the graveyard scene, death itself, in the key image of the play where he holds Yoricks skull, Hamlet by the end of the play is no longer just like a student of the concepts of death. Instead, he becomes the tragic action hero who finds a divinity working through action. Although it is true that the impulse for his actions is imposed on him by other characters or by events, another interpretation see Hamlet as nevertheless extremely active: he listens to the ghost (which his friends refuse to do), he adopts a coarse attitude verging on insubordination, he violently rejects Ophelia, he thwarts one after the other plots aimed at revealing his plans, he stages for the court a show which is nothing but a trap in which he hopes to catch the king, he confronts his mother in a scene of extreme violence, and he fights Laertes. Engaging further in pure physical violence he kills Polonius, sends his friends Rosencrantz and Guildenstern to their deaths, kills the king, and is indirectly responsible for the death of Laertes. In conclusion, through the first two acts of the play, Shakespeare is very successful in introducing the main characters and themes of the play. While his introduction of Horatio and the ghost in the first scene is very important in establishing a mood of distress and anxiety, as well as touching on the themes of uncertainty and disorder, Shakespeares following scene builds on that to a great extent through the contrast between Claudius and Hamlet, the conflict between appearance and reality and through Hamlets first soliloquy of the play. In this soliloquy not only are Hamlets true emotions revealed to the audience but with it many of the central themes and concepts of the play are explored, such as the concept of severe disillusionment leading to the idea that suicide is the only viable option. It is thoughts and emotions such as these that are gradually developed in the novel; and which has led to Hamlet being regarded by many critics as the most powerful and probing play Shakespeare has ever written. The different interpretations of Hamlet and the play in general is only a natural consequence to the ambiguity and uncertainty that Shakespeare creates from very early on in his play. As one critic, John Dover Wilson remarks, Hamlet is very much like a dramatic essay in mystery; that is to say, the more it is examined, the more there is to discover. In that context, the first two acts of this drama have served not only as a very effective means of introducing the main characters and themes of the play, but also through the beautifully crafted soliloquies, Shakespeare probes the most daring aspects of the psychology of man and the history of human thinking through pieces of pure poetry, written in blank verse, sustained by a rhythm now smooth, now rugged, by a fast or a slow pace, offering his audience surprises in every line.

Sunday, November 24, 2019

Free Essays on Barbarian

, â€Å"an intermediate generation between gods and mortals.† (Herodotus, pg. xxx) Herodotus The Histories is an amazing work. This work is titled a history, but it is important to remember that a history is not just a telling of past events. Even the most objective histories contain the biases and personal prejudices of the author. Herodotus is no exception. Within his many detailed stories and events, the reader can clearly sense his thoughts of Greek supremacy. The ancient Greek people were very proud of their culture for many different reasons. A main source of pride, however, was the Greek style of art and architecture. The Greek culture was very rich around the time of the fifth and sixth centuries BC, influencing many other cultures that came in contact with it. One such culture was that of the Persians. The Greek force defeated the Persian force, lead by Xerxes, in 479 BC. After this battle, there is evidence of Persian art having som... Free Essays on Barbarian Free Essays on Barbarian Barbarian. Within the text of Herodotus, this term meant â€Å"a non-Greek.† Originally, this term was not meant to be offensive or negative, but over time the Greeks began to think of themselves as culturally superior to the barbarians. The Greeks believed in a concept called â€Å"guest-friendship.† Guest friendship was when one man (or community) would extend his protection to an outsider visiting his community. Guest friendship involved reciprocal gift giving and was a very formal procedure. This process was eternally under the protection of the great Greek deity Zeus. Though the ancient Greeks entertained guests from various locations and cultures, they held to the fact that their own Greek culture was entirely pure and of their invention. Ancient Greeks did not cite the influences of others on their fine art. Within the ancient Greek culture, the term â€Å"hero† referred to a mortal made divine after death. In other words, â€Å"an intermediate generation between gods and mortals.† (Herodotus, pg. xxx) Herodotus The Histories is an amazing work. This work is titled a history, but it is important to remember that a history is not just a telling of past events. Even the most objective histories contain the biases and personal prejudices of the author. Herodotus is no exception. Within his many detailed stories and events, the reader can clearly sense his thoughts of Greek supremacy. The ancient Greek people were very proud of their culture for many different reasons. A main source of pride, however, was the Greek style of art and architecture. The Greek culture was very rich around the time of the fifth and sixth centuries BC, influencing many other cultures that came in contact with it. One such culture was that of the Persians. The Greek force defeated the Persian force, lead by Xerxes, in 479 BC. After this battle, there is evidence of Persian art having som...

Thursday, November 21, 2019

Slavery and Marriage in The Braggart Soldier Essay

Slavery and Marriage in The Braggart Soldier - Essay Example The position of the women in Plautus’s society is also brought out through this play, through the married and the unmarried women, in the play who live out different roles. Slavery and Marriage in The Braggart Soldier The influence of social institutions is seen in most of one’s activities and art is no exception. The art of Plautus, reflects the social realities that existed during his age. Slavery and marriage were two of the most important institutions that were prevalent during the period that Plautus wrote his plays. These plays portray a certain kind of subversion that is possible on the part of these subaltern groups. They are able to obtain a certain kind of superiority over their masters and their clients for a certain amount of time. However, the superiority that they attain over their superiors is something that is undercut by the fact that it is a temporary phenomenon that fails to challenge the institutions in themselves that remain deeply entrenched in the consciousness of the very people that seem to attempt the subversion. This subversion, by the end of the play, even though it succeeds in the downfall of the protagonist of the play, Pyrgopolynices, serves the ends of another member of the aristocracy, Pleusicles. In the end, the slaves and the prostitute do not do anything for themselves; what they do is to fulfill their roles as slaves, which essentially place them back in their social positions, irrespective of their masters. The actions of Palaestrio and Philocomasium, from the beginning of the play, seek to foil the actions that the protagonist of the play, Pyrgopolynices, seeks to bring about. Both these characters have certain features in common; both f them were captured by the soldier. The helplessness and the lack of agency that these two characters share happens as a result of their social positions that are defined by their economic and gender belonging. Philocomasium does not possess any agency since she is a woman and does not have any agency. Throughout the play, she is looked upon as a possession that the two men in the play fight for. Her identity too, is shaped by the man that she is with, rather than the position that she defines for herself. On the other hand, Palaestrio has some agency of his own, even though it manifests itself in his loyalty to his former owner, Pleusicles. This reveals a deeply entrenched system of slavery where the slave internalizes the system and mentally enslaves himself to his owner. Palaestrio is unable to think of himself as a person whose identity may be anything except that of the slave of Pleusicles. This manifests itself in his inability to accept Pyrgopolynices as his master. He however, possesses more ability to act than the Philocomasium, who is totally deprived of any agency, because of her position as a woman in a patriarchal society. The little agency that Palaestrio has does not lead to any awareness about his position as a slave that could lead to an y solidarity between him and the other slaves. This is evident from this speech of his. Palaestrio: Someone from our house has done a naughty thing, from what I hear- The old man’s commanded that my fellow slaves be beaten up. Well, he said except for me- who gives a hoot about the rest? (Plautus 8) It is this lack of solidarity that makes Palaestrio

Wednesday, November 20, 2019

Survey about CWsandbox tool which used for dynamic malware analysis Research Paper

Survey about CWsandbox tool which used for dynamic malware analysis - Research Paper Example General Sandbox Architecture: A sandbox is deployed to secure a computer system from external attacks that are attempted through malware (malicious program). According to Hoopes (2009), the approaches used are either to block the critical accessibility of a malware or to introduce a simulated environment with completely virtual computing resources like CPU, file system and the memory. This virtual environment enables the program to get executed in a completely isolated environment which is disconnected from the real execution environment within which it resides. The main idea is to monitor the accessibility of program (under observation) to system resources. This way the system can be brought back into the safe state after complete behavioral analysis of the suspected program. The fringe benefit of this approach is the usage of a lighter security protocol for the underlying system that improves its working efficiency. The behavioral analysis keeps the execution environment intact. Th is gives it an edge over instruction level analysis (basically done using debuggers or dis-assemblers). CWSandbox architecture and functioning: CW sandbox is one the sandbox applications that are in use. Every sandbox application has its own mechanism to secure the computer system environment. CWSandbox comprise of two executable files namely cwsandbox.exe and cwmonitor.dll. The former is the central application that initiates the malware and manages the complete process of analysis. The latter on the other hand is a DLL (Dynamic Link Library). This library is introduced into all processes in the malware that are under observation. This way the malware is actually executed and being interacted by the sandbox along with its own execution. The function of the DLL file is to catch each API critical call from malware and to inform the central application (cwsandbox.exe) about it. The sandbox (main application) then takes some time to analyze the call in order to either delegate the cont rol to the required API (in case of safe conclusion) or to answer the call with a virtual error message (in opposite case). Along with the keeping an eye on every malware call, the DLL also makes it certain that the sandbox is kept informed about other malware activities like injecting a code into an already executing process or creating a child process. In both cases the DLL is instantiated again to be injected into the child process or the already running process. Figure 1.0 below, elaborates the described functioning. The CWSandbox uses the native execution environment unlike other sandbox schemes. This in turn reduces the delay caused by the analysis mechanism. Enormous communication exists between the main application (executable) and planted instances of DLLs. Each notification call from a DLL to sandbox contains a lot of information that requires a formal and reliable mechanism of communication between processes. In order to fulfill this requirement the sandbox is usually equ ipped with high efficiency IPC (Inter Process Communication) mechanism. Figure 1.0. Sandbox Instance using CWSandbox (Source: Hoopes J. 2009. Virtualization for Security) CWSandbox Malware Handling and Analysis Mechanism: The mechanisms that are performed by a sandbox can be distinguished into three parts. These parts may

Sunday, November 17, 2019

Macroeconomic Position of Iceland as of 2006 Essay

Macroeconomic Position of Iceland as of 2006 - Essay Example This essay provides a thorough economic analysis of the economic developments in the Icelandic economy in the year of 2006. Ii is shown in the essay, that the national economy depended heavily on the fishing industry, which provided more than 60% of total export earnings and employs 12% of the work force. Iceland’s economy had been diversifying into manufacturing and service industries in the last decade and new developments in software production, biotechnology, and financial services were taking place. The tourism sector was also expanding, with trends in eco-tourism such as whale watching, hiking, and nature tours growing steadily. As Iceland had focused on leveling its financial landscape and opening its markets, it had created an imbalance in the economy. The resulting volatility threatened a return to the previous days of economic overheating. The employment numbers were good, but any disruption of current output woull change that immediately. Inflation, driven by overheating real estate and investment markets, was growing. These issues had to be resolved immediately. Through prudent monetary policy, inflation could be tamed. By implementing wise fiscal policy, expenses and debt could be reduced. In terms of fiscal policy, Iceland needed to adjust its approach so that the monetary policy could be adequately supported without resorting to continued and severe hikes in the interest rate. Simply, this meant tightening its budget maintenance, reducing its debt, and enhancing the environment for investment

Friday, November 15, 2019

Construct A Script By Using Scapy Computer Science Essay

Construct A Script By Using Scapy Computer Science Essay Wireless network generally can be defined as a network which is set up by using radio signal frequency to communicate among computers and other network devices. Wireless networks known as WiFi network or WLAN. As a network grows and expands wireless networks are extremely popular and easy to setup feature and no cabling involved. There are two main components to access the wireless network which are wireless router or access point and wireless clients. Wireless network normally used in 802.11a, 802.11b, 802.11g, and 802.11n standards protocol. Wireless network needs highly security to carry all kinds of confidential data which means at least enabling Wired Equivalent Privacy (WEP) on the access point. Without proper implementation of security measures, any wireless network adapter coming within the range can access the internet without permission. So, it will results in congestion and some of the authorized client cannot access the internet. So, this research will do wireless network auditing by sniffing some of the information within the access point and detect possible intrusions in Faculty of Computer and Mathematical Sciences. 1.1 Background Wireless network is a network which is setup by using radio signal frequency to communicate among multiple stations at one time. In addition, wireless network referred as WiFi network or WLAN. Although we have enable WEP encryption on the access point, there are still some weaknesses which can be easily crack by the users with the right equipment to crack. The attacker can sniff easily with several tools to crack the password to break in as unauthorized person. In order to verify the correct access point settings and detect intrusions in terms of security in wireless network, we construct the complete script to audit wireless networks. 1.2 Problem Statement Nowadays wireless network become a trend in communication. Each wireless system or access point was setup with certain policies. It is hard to verify whether each wireless access point setup correctly or not. Plus, nowadays we need to use many tools to verify the wireless access point status. Furthermore, most of network admin does not check back each wireless access point after its configuration. Moreover, we need some tools to identify the intrusions that come where they are try to access the Internet. Besides that, some of attackers send spoofing frame to try access the wireless network. So, we cannot identify the attackers MAC address. 1.3 Research Objectives The main objective of this project is: To construct a script by using Scapy To sniff and to find possible intrusion on wireless network related with wireless security. 1.4 Scope of the Research This project focuses in Faculty of Computer and Mathematical Sciences that has multiple access points which will enables to sniff all the information on wireless networks. We focuses on Data Link layer 2 to sniff the broadcast frame and identify possible intrusion. The main platform to run the tools:- Ubuntu10.10 We are use two main tools to construct the script which are:- Python2.6 Scapy 1.5 Significance of the Research This project is important to gain knowledge to construct the complete script by using Python2.6 and Scapy script. We can learn the easiest way by using this script with the shorter line compared to other script. This project also helps to learn 802.11 frame structure including beacon frame that has transmitted by the access point. 1.6 Organization of Thesis This project divided into 5 main chapters: Chapter 1: In this chapter, we discussed on the introduction generally of this topic. It includes problem statement, objectives, scope and significance of the research. Chapter 2: This chapter reviewed literature that relate to the topic with previous researches. We include the similar of related studies to our research. Chapter 3: In third chapter, we identify materials and methods that are described in methodology phases in order to get the desired information for the accomplishment of this research. Chapter 4: In fourth chapter, we discusses on the findings of the research. Chapter 5: Finally, the last chapter is focuses on the recommendations and suggestions where it will summarize the conclusion of the research. 1.7 Conclusion This introduction of this chapter had clearly explained the problem statement, objectives, scope, and significances of the research. This chapter gives a clear view of the overall content of the research. CHAPTER 2 LITERATURE REVIEW 2.0 Introduction This chapter examines the previous work done by prior researcher in the field of auditing wireless network, security of wireless network and any other related works. Section 2.1 discuss on main platform to install the tools. Section 2.2 discuss on the tools to be use to construct and run the script. Section 2.3 discuss on standard protocol fro wireless Lan(WLAN), IEE 802.11. Then, sections 2.4 discuss on frame for 802.11, 2.5 Wireless LAN components, 2.6 Wireless Network Sniffing, 2.7 reviews for the related works and lastly 2.8 Summarizations of Literature Reviews. 2.1 Platform 2.1.1 Ubuntu10.10 Ubuntu is a free operating system, developed by small team developers who are established Linux Debian projects. This free operating system was developed to facilitate the use of desktop linux, Ubuntu. It developed based on the Debian GNU/Linux distribution and distributed as free and open source software. Most Ubuntu packages are based on package from Debian. Both distributions are using Debians deb package format and package management tools, Apt and Synaptic. However, sometimes .deb packages need to be rebuild from source to be used in Ubuntu. Ubuntu have variant edition such as GNOME desktop, KDE edition, Kubuntu and server edition. In this project, we use Ubuntu 10.10 as our platform to run all the tools in it. 2.2 Tools 2.2.1 Python Python is the one of the programming language that can interpret in developing the applications such as web applications and integrate the system more effectively. Python can run on Windows, Linux/Unix, Mac OS X. All the Python programs can be packaged into stand-alone executable code for many using various tools. In this project, we use the latest version, Python2.6 tool to construct and run the complete script after install all the Python package in Ubuntu10.10. We use Python as a programming language because it is most powerful language and shorter to write the code than other languages. Compared to other programming languages, Python are readable syntax, intuitive object orientation, very high level dynamic data types, full modularity, supporting hierarchical packages and many more. 2.2.2 Scapy According to Philippe Biondi (2009), Scapy is a powerful interactive packet manipulation program from Python program that be able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery. For this project, we focused on 802.11 standard protocols. Scapy enable to sniff wireless network and generate the packet and can send it to the wireless network. 2.3 Wireless Protocol 2.3.1 IEEE 802.11 IEEE 802.11 is a standard protocol for wireless LAN (WLAN), which is uses RF technology to transmit and receive data over the air. Based on this standard protocol, it communicates between wireless client and a base stations or access point. There are several types of standard protocols which are 802.11a, 802.11b, 802.11g, and 802.11n. Here are briefly about types of standard protocols: 2.3.1.1 IEEE 802.11b IEEE 802.11b standard supports maximum bandwidth 11Mbps in 2.4 Ghz. The advantage of this protocol is lowest. Disadvantage using this protocol is lowest maximum speed because it may interfere if no determined the frequency band. 2.3.1.2 IEEE 802.11a 802.11a supports bandwidth up to 54 Mbps in 5 GHz. The advantage of this protocol is fast maximum speed. Disadvantage using this protocol is the cost is higher than IEE 802.11b 2.3.1.3 IEE 802.11g IEE 802.11g standard supports maximum bandwidth 54Mbps in the 2.4 GHz band in maximum range. The advantage is signal range is better with fastest maximum speed. Disadvantage using this protocol is higher cost than IEEE 802.11b. 2.3.1.4 IEEE 802.11n IEEE 802.11n is developed on previous IEEE 802.11 standards by adding MIMO. IEEE 802.11n offers high throughput wireless transmission at 100Mbps 200 Mbps. It is better performance compared with IEE 802.11g. 2.4 802.11 Frame 2.4.1 Frame header Each  frame  contains  a  standard  header  as  shown  in  Figure  2.1 Figure 2.1 Frame Header from http://technet.microsoft.com/en-us/library/cc757419(WS.10).aspx The  frame header  contains  all  the  information  needed  to  get  the  frame to  where  it  is  going  and  allow  the  receiver  to  understand  what message  the  frame  is  carrying. Frame Control FC contains control information used for defining the type of 802.11 MAC frame and providing information necessary. FC field as shown in Figure 2.2 Figure 2.2 Frame Control Field from http://technet.microsoft.com/en-us/library/cc757419(WS.10).aspx The details of frame control field as follows: Protocol Version Protocol Version provides the current version of the 802.11 protocol used. Type and Subtypes It is determines the function of the frame. There are three main different of type fields which are control, data and management and breaks into multiple subtypes. Three values of type field: 00 Management 01 Control 10 Data 11 Reserved/Unused Breaks into subtype field: 00/0000 Management/Association Request 00/1000 Management/Authentication 00/1100 Management/Deauthentication 01/1011 Control/Request To Send (RTS) 10/0000 Data/Data To DS and from DS Specify  the  addressing  type  of  the frame, either the frame is going to or exiting from the DS. More Fragments   Shows more fragments of the frame, either data or management type. Retry Retransmitted either data or management frame types. Power Management   shows whether the sending station is in active mode or power-save mode. More Data   shows to a station in power-save mode that the AP has more frames to send. It is also used for APs to show that additional broadcast/multicast frames are to follow. WEP   shows whether or not encryption and authentication are used in the frame. Order   Shows that all received data frames must be processed in order. Duration/ID Shows the remaining duration needed to receive the next frame transmission. Sequence Control (SEQ) SEQ used  for  fragmentation  and packet  reassembly. Frame body The frame body contains the data or information included in either management type or data type frames. Frame Check Sequence (FCS) The transmitting STA uses a cyclic redundancy check (CRC) over all the fields of the MAC header and the frame body field to generate the FCS value. 2.4.2 Beacon Frame Beacon frames are identified by the type field being set to 0 (Management Frame) and subtype of 8. Beacon frame are used by access point to advertise its presence and relay information, such as timestamp, SSID, and other parameters based on access point to radio NICs that are within range. Radio NICs continually scan all 802.11 radio channels and listen to beacons as the basis for choosing which access point is best to associate with. According to Robin Wood (2007), people  mostly believe that turning  off  beacons  will  hide  their  network  from  attacks  as  their SSID will no longer be broadcast. Unfortunately, SSID is transmitted in clear text in all management frames and when the network is hidden while there is no data being transmitted, attacker can collect a management frame they can find in network SSID. 2.5 Wireless LAN component 2.5.1 Access point Wireless access point (WAP) is a basically hardware equipment that allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. In a wireless network, an access point sends and receives signals to any number of other, local wireless devices. These are usually adapters and routers. The WAP is commonly use in offices, homes and educational institutions. WAP devices use in IEEE 802.11 standards. 2.6 Wireless Network Sniffing Wireless Sniffer is captures the data on wireless network without being detected. Wireless network sniffing works in 802.11, Ethernet as the physical and data link layers which is able of reporting raw packets (RFMON support), which include any prism2 based card (Linksys, D-Link, Rangelan, etc), Cisco Aironet cards, and Orinoco based cards. Moreover, sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections. Sniffing wireless network usually used by the attackers to capture the data and get the appropriate information from the beacon frame. There are several techniques used to sniff the wireless network. Some of them are as follows:- Passive Scanning Passive scanning is the first steps used to sniff the wireless networks. It is turn to mode RF into monitor mode that allows every frame appearing on a channel to be copied as the radio of the station tunes to various channels. A station in monitor mode can capture packets without associating with an AP or ad-hoc network. When the transmission of the data in the form of radio waves starts the attackers can scan the whole data passively and carry on the sniffing process. The so-called promiscuous mode allows the capture of all wireless packets of an associated network. In this mode, packets cannot be read until authentication and association are completed. With the help of this data sniffer can easily decodes the secret information of the wireless networks. SSID Detection After scan the data transmitted, it can detect the list of service set identifier (SSID) in the particular wireless network. The SSID shown in the Beacon frames is set to null in the hope of making the WLAN invisible unless a client already knows the correct SSID.  When the Beacon displays a null SSID, there are two possibilities.   Eventually, an Associate Request may appear from a legitimate station that already has a correct SSID.   To such a request, there will be an Associate Response frame from the AP.   Both frames will contain the SSID in the clear, and the attacker sniffs these.   If the station wishes to join any available AP, it sends Probe Requests on all channels, and listens for Probe Responses that contain the SSIDs of the APs.   The station considers all Probe Responses, just as it would have with the non-empty SSID Beacon frames, to select an AP. Normal association then begins.   The attacker usually waits to sniff these Probe Responses and extract the SSIDs. Otherwise, if the beacon transmission is disabled, the attacker has two choices.   The attacker can keep sniffing waiting for a voluntary Associate Request to appear from a legal station that already has a correct SSID and sniff that SSID.   Collection of MAC addresses After detecting the SSID, sniffer now take steps to sniff the wireless network by collecting the required MAC addresses with the help of passive scanning and also with the help of different types of software. The collected of MAC address used for constructing spoofed frame by using specific tool. In wireless sniffing, there are some reasons why attacker collects all the MAC address. Some of the reasons are the attacker used sniffing to hide his or her identity and their access points. The other reason, access points used in collecting the MAC would not be registered. 2.7 Review of Previous Related Works 2.7.1 Author: David Maynor Title of Paper: Beginners Guide to Wireless Auditing (2006) This paper is a study of how to find the vulnerabilities in wireless devices drivers with specific techniques. The researcher discuss on how to build auditing environment, how to construct tools and finally how to interpret the results. On this paper, although this was done on Dell Latitude D610, the internal wireless card of the machine was not used. The researcher was used wireless card, Netgear WPN511 to set up auditing environment that is supported with madwifi drivers. The combination with LORCON (Loss Of Radio CONnectivity) ability to craft the packet from scratch. Moreover, after setting up the good environment with patch madwifi and LORCON, the researcher construct the script with Scapy to generate a simple frame and inject it. The researcher use Wireshark to see the packets injected. 2.7.2 Author: Shreeraj Shah Title of Paper: Secure Your Wireless Networks with Scapy Packet Manipulation (2007) According to Shreej Shah, Scapy is scriptable and easy to use compared with Kismet and Airodump-ng. This paper focused on intrusion detection by using proven techniques. There are two techniques can be employed which are passive sniffing and active packet injection. The researcher discussed only passive sniffing methodology. In this project, there are several steps are used in passive sniffing methodology as follows:- Set up a station for radio frequency (RF) monitor mode Sniff packets and discover network access points Discover hidden access points and SSID (service set identifier) Harvest MAC and IP addresses Perform ongoing intrusion detection with sniffing. 2.7.3 Author: Robin Wood, Robin and freedomsoftware.co.uk Title: Programming Wireless Security (2007) This paper discussed some programming techniques to build wireless security tools. The researchers construct the script by using Python and Ruby script. There are several techniques that are used by using both scripts including deauthentication attack, sniffing wireless traffic and automating a Four-Way- Handshake capture. All the techniques will be brought together to create an applications to automate capturing an EAPOL handshake which can used to crack the Pre-Shared Key. This paper required several tools including Lorcon, Pylorcon, ruby lorcon and Scruby. Moreover, it also discussed about several issues on Scruby which means Ruby scripts will not work properly as exactly required. 2.8 Summarizations of some Literature Reviews No Author Year Project Title Project Similarities and Differences 1. Peter Seebach 2005 Getting practical about wireless security, Part 1: Building a wireless sniffer with Perl In this paper, lightweight wireless sniffer was build that runs on open source software. This paper show to use open source software by getting information about on wireless network and identified the common security problem. 2. TJ OConnor 2010 Detecting and Responding to Data Link Layer Attacks In this paper, Scapy is used to examine network traffic for data link layer attacks with identifying signatures and anomalies on both wired and wireless networks. 3. Petter Clutterbuck, Terry Rowlands, Owen Seamons 2007 Auditing the Data Confidentiality of Wireless Local Area Networks This paper describes how the software auditing artefact uses on sampled data packets to product a very detailed evaluation of the level of data confidentiality in effect across the WLAN. 4. Mingzhe Li, Mark Claypool, and Robert Kinicki 2005 How to Build and Use an IEEE 802.11 Wireless Network Sniffer In this paper, wireless sniffer is built on computers with Linux operating systems and prism GT-based wireless interface cards. The operating systems tested are SUSE (Novell) Linux release 9.0/9.1/9.2/10.0 and Linux Fedora Core 3 where the kernel version can be either 2.4.x or 2.6.x. The wireless network interface cards, Netgear WG 511 version 1 PCMCIA card and Allnet ALL0271 54Mbit Wireless PCI adapter are used Table 2.1: Summarization of related Literature Review 2.9 Conclusion All the information gathered from this literature review is very useful in order to identify potential information that can make this research more relevant. By understanding the scenario of past implementation, it will give a better view on how to achieve these research objectives and also inspire new ideas to be implemented or added into this research. CHAPTER 3 METHODOLOGY 3.0 Introduction This chapter presents about the methodology being used as a guideline to ensure the project will operate successfully. Methodology consists of hardware, software and method that being used in this research. We need to choose proper hardware and software to meet the research requirement. Methodology is very important part to audit the wireless network with sequence of phases. We need to follow all this phases in order to accomplish the final project with achieving the objective. We divide the methodology of our project to several phases, where every phase will include the important activities and its significant to be done. 3.1 Methodology Phase In this project, there are four phases of method that followed properly. First phase is planning, second phase is development, third phase is testing, fourth phase is result and evaluation and the last phase is documentation. All the flow of the methodology phase will be implementing systematically and efficiently as its role is vital to ensure the process of finishing this project in time. These phases are illustrated in methodology overview in Figure 3.1(i) and Figure 3.1(ii). PLANNING DEVELOPMENT TESTING RESULT AND EVALUATION DOCUMENTATION Figure 3.1 Project Phase (i) Documentation Development Testing Result and Evaluation Planning Problem Assessment Preliminary study of Literature Install OS Install Python package Install Scapy package Construct script Run Scapy script Sniff a list of access point. Sniff Intrusion Detection Writing a report Project Scope Project Objective Project Planning Determine hardware and software used Scapy script completed Result finding Final report completed. Figure 3.1 Project Phase (ii) 3.2 Research Methodology 3.2.1 Planning For planning phase, the activity is to define the objective of project by identifying problem assessment and by preliminary study of literature review. The deliverable of this phase can identify research objective and scope and also project planning. It consists of: 3.2.1.1 Preliminary study of literature review The purpose is to understanding the similar or related project to be done. We need to review and get the idea on how it can be implemented and find the objective, scope and others benefit can get for the project requirement. This preliminary study can review by journals, online resource (internet), articles or book. USER ACCESS POINT USER SNIFF3.2.2 Development Diagram 3.1: Structure of research project 3.2.2 [a] Install operating system We install Ubuntu 10.10 with interactive Graphical User Interface (GUI) on the laptop. It is easier to update the latest package. All the latest package including Python will updated on Ubuntu10.10 [emailprotected]:~# sudo apt-get update 3.2.2 [b] Install tools We install Scapy in Python program where the Scapy is interactive manipulation program that can construct with the shorter script compared to the other script. We install Python program as a main programming language and resides the entire package in it. a. Install Python 2.6 package [emailprotected]:~# sudo apt-get install python [emailprotected]:~# cd /tmp [emailprotected]: /tmp# fetch http://www.secdev.org/projects/scapy/files/scapy-latest.tar.gz [emailprotected]: /tmp# tar xvzf scapy-latest.tar.gz [emailprotected]: /tmp# cd scapy-2.1.0 [emailprotected]: /tmp/scapy-2.1.0 # python setup.py install b. Install python-scapy package [emailprotected]:~# sudo apt-get install python-libpcap c. Install libpcap and libdnet and their Python wrappers. [emailprotected]:~# sudo apt-get install python-libdnet d. Install additional software for special features. [emailprotected]:~# sudo apt-get install tcpdump graphviz imagemagick python-gnuplot python-crypto python-pyx 3.2.2 [c] Construct the script We construct the script with Python program for sniffing and detect possible vulnerabilities. The script will run on Ubuntu 10.10 in root terminal. 3.2.3 Testing Testing phase, the action is to test by sniffing wireless network in an area by running the completed script. Before we run the script, we need to setting up the station for radio frequency (FR) in monitor mode. We illustrates the steps in Figure 3.2 Construct the script Setting up the station for Radio Frequency (RF) to monitor mode Script run Enter the command Get the data from acces point including:- Name of access point SSID channel Radio Type Security Type Signal Collect the data: Intrusion Detection including:- Discovering Rogue Access Point Discovering Dummy Access Point Figures 3.2 Steps for testing 3.2.4 Result and Evaluation In this phase, we come out with the result by running the script. We collect all the information about SSID, MAC address, channel, radio type, security type, signal from broadcast frame that send by multiple access point. Next, we can detect possible intrusion by running other script using a same scripting language. 3.2.5 Documentation In this final phase, all the results and findings will be included in one report. From the documentation, the researcher can determine whether the project achieve the objectives or not. 3.3 Hardware and Software Required To execute this project successfully, some requirement need to be accomplish. Some of the requirement will be involving hardware and software. Hardwares that will be required are: 3.3.1 Hardware This project will used laptop. Processor at least 1 Gigahertz of CPU speed. 3GB of RAM 250 Gigabyte of hard disk space Intel WiFi Link 5100 wireless network interface card Motherboard that support the processor Monitor Network cable 3.3.2 Software This project will be running on LINUX platform: Ubuntu 10.10 3.3.3 Tools Python2.6 Scapy 3.4 Conclusion As a conclusion, this chapter is very important to gather all related and relevant information required. All the information will be used in order to achieve the objectives of this research. CHAPTER 4 RESULTS AND DISCUSSIONS 4.0 Introduction This chapter discusses on the results gathered from this research, which is obtained by implementing the methods in Chapter 3. The result based on running completed script on Ubuntu10.10. It will display all the available information of access point actively in an area after sniffing it. Moreover we can detect all the possible intrusion with display the list of rogue access point and dummy access point. 4.1 Sniff the wireless network First of all we set up Radio Frequency (RF) into monitor mode which is in wlan0 interface. Next, we run the completed script that is already saved in root on Ubuntu 10.10 with the name of file, sniffap.py. Then, we open the root terminal by enter ./sniffap.py wlan0. The result has shown in Figure 4.1 Figure 4.1 Sniff Wireless Networks sniffap.py name of saved file wlan0 monitor mode interface CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS 5.0 Introduction This final chapter discuss about the conclusion of this research. It also discusses the suggestions and recommendations that will help those who want to upgrade or refers to this project in the future. 5.1 Conclusion As you can see, having an effective wireless access policy is critical to the security of any organization that operates a wireless networks. Without appropriate policy, the attacker easily gain access the wireless networks. 5.2 Recommendation This project is hopefully can only use the fully script to get the data from the access point without purchase the tools. Moreover, the admin take the action to get access point more securely and get a better signal for client to access the Internet.

Tuesday, November 12, 2019

Michael Vick Case

On April 25, 2007, agents raided the Surry County, Virginia home owned by Michael Vick, NFL’s Atlanta Falcons quarterback. The authorities reportedly discovered 66 dogs, 55 of them being pit bulls, blood stained carpet, a dog fighting pit, and equipment which is commonly used in dog fighting rings such as dog treadmills and scales, a pry bar used to open a dog's mouth and an instrument used for breeding. At the time of the raid, Vick was not present at his home but denied having knowledge of dog fighting taking place on his property.On July 17, 2007, a federal jury indicted Vick as well as three other men, Purnell Peace, Quanis Phillips, and Tony Taylor on charges of competitive dog fighting, procuring and training pits to fight, operating an unlawful interstate dog fighting business by the name of Bad Newz Kennels. The four codefendants each face $350,000 in fines and six years in prison if convicted of the federal charges. According to reports, Michael Vick had been staging dog fights since his rookie year with the Falcons in 2001.The dogs found on the property were treated in a horrific manner. Losing dogs were either killed in the arena during the fight or at times they were later hung, electrocuted, shot or drowned. As part of their training to get them ready for fights the dogs were sometimes starved to make them hungry for the fight. On August 24, 2007 Vick entered a plea deal where he pled guilty to â€Å"conspiracy in a dog fighting ring and agreeing that the enterprise included killing pit bulls and gambling. He denied making side bets on the fights, but admitted to bankrolling them. (ESPN) He also admitted to sharing the proceeds from the dog fights with his Peace, Phillips, and Taylor but states that he never placed any bets or collected prize money for the fights. Vick was the last of his counterparts to enter into a plea deal with the prosecution. On December 10, 2007 Michael Vick was sentenced to 23 months in prison and three yearsâ€℠¢ probation at U. S. District Court in Richmond by Judge E. Henry Hudson for running a dog fighting operation. He will serve a longer sentence than two of his codefendants because he lied about his involvement upon ntering his plea agreement when he was supposed to be admitting to his wrong doing and accepting responsibility for his actions. According to his codefendants, Vick was more involved in the dog fights than he admitted to being. On November 30, Peace and Phillips were sentenced by Judge Hudson to 18 and 21 months in federal prison. Their punishments also included three years of supervised probation following their release from prison. On December 14, 2007, Tony Taylor, who was the first of the four men to plead guilty, received a lesser sentence of 60 days in jail because he agreed to testify against Vick.Michael Vick was released from prison on July 20, 2009. After his release from prison, Michael Vick is to start his three year probation term. As part of his probation, V ick was equipped with an electronic monitor and had to perform $10-an-hour job as a laborer for a construction company. Michael Vick is currently still on probation but he is now able to play football again and no longer has to work the construction job. Works Cited http://sports. espn. go. com/nfl/news/story? id=2989824 http://articles. cnn. com/2007-07-17/us/vick_1_bad-newz-kennels-dogfighting-investigation-quanis-phillips? _s=PM:US

Sunday, November 10, 2019

Outline and Evaluate Infradian Rhythms Including Research Essay

Infradian rhythms are biological rhythms that last for more than 24 hours. They are controlled by the hypothalamus, an endogenous pacemaker which requires input from exogenous zeitgebers so the rhythm can run correctly. An example of an infradian rhythms is the mentstrual cycle. This is controlled by the pituary gland which is an endogenous pacemaker. The pituary gland releases hormones which cause an egg in the ovaries to ripen and produce oestrogen. Whilst it is known to be biological due to its universal nature, there are large individual differences such as the length of time and the age the menstrual cycle begins. Reinberg conducted research into infradian rhythms where a woman spent 3 months in a cave only with dim lighting. Her sleep/wake cycle slightly lengthened whereas her menstrual cycle shortened suggesting that light affects menstrual cycles. However, this is a case study which means it lacks generalisability even more so as there are large individual differences with the menstrual cycle. On the other hand, Russell et al applied female donor’s underarm sweat which has been combined with alcohol to the upper lips of female participants. The menstrual cycles of the participants began to synchronises therefore suggesting that pheromones act as exogenous zeitgebers. Pheromones are biological substances similar to hormones but are secreted into the air and then transmitted to other animals of the same species, or in this case humans, before being absorbed into their bloodstream. However, despite the sample size being small it was a well controlled single blind study meaning that the participants didn’t know what experimental group they were in. McClinock and Stern provided further support for the study when they found pheromones in donor’s sweat affected the recipient’s menstrual cycles, therefore suggesting that exogenous zeitgebers have a regulating effect. It may be the cases the synchronised periods have an evolutionary significance because it allows women that are living together to synchronise pregnancies so they can share child care. However, it has also been found that women working in proximity to men have shorter cycles; an evolutionary advantage which provides more opportunity for pregnancy. Likewise, the purpose of a menstrual cycle is to conserve energy. Therefore it is better to restrict periods of fertility, highlighting the need for endogenous control. On the other hand there are ‘side effects’ of the menstrual cycle such as pre menstrual tension which has been associate with increased aggression. Lewis found that pre menstrual tensions has been cited as a defence in criminal trials. A second infradian rhythm is Seasonal Affective Disorder (SAD). It involves having severe depression in the winter months. Levels of melatonin are higher in winter and may lead to increased depression and sleepiness. However, it has led to a treatment called phototherapy which is being exposed to bright lights for several hours a day in order to reduced the effect of too much serotonin. This in turn, lowers melatonin levels. Hamster research again has provided us with more knowledge of infradian rhythms. Male hamsters have annual rhythms of testosterone secretion based on the amount of light that occurs each day. As the breeding season begins, the days lengthen thus when it ends, they shorten. Rusak and Zucker made lesions in the SCN, the Suprachiasmatic Nucleus, part of the hypothalamus in a hamster which destroyed their annual breeding cycles and led to male hamsters secreting testosterone all year. The 24 hour clock that daily light levels were measured against was destroyed so the seasons couldn’t be determined. Carlson found that if it was less than 12 hours of light for hamsters, it is winter where if it more than 12 hours it is summer, and therefore the breeding season. However, the research was invasive and led to brain damage, meaning it caused harm to the hamster. As it has also been conducted on animals, it cannot be generalised because it lacks population validity despite being informative. Circa-annual rhythms which means they happen once a year are also examples of infradian rhythms. When studying migration, Gwinner kept wild birds in cages exposing them to 12 hours of light and 12 hours of darkness. This lack of external stimuli led to migratory restlessness thus suggesting there is endogenous control. However, it may be triggered by the availability of food, an exogenous cue. As the wild birds were kept in cages, they also experienced harm because they were not in their natural setting either. Pengelly and Fisher conducted research into hibernation. Similar to Gwinner, they controlled squirrels artificially by exposing them to light 12 hours a day followed by 12 hours of darkness, keeping the temperature at 0 degrees. The squirrels hibernated from October to April. However, as the animals were not in their natural habitat, the studies lacked ecological validity because it was artificial. The research findings are positive as they have established the existence of endogenous pacemakers regulated by exogenous zeitgebers. However, to an extent the findings are deterministic because we need exogenous zeitebers to help our endogenous pacemakers as it has been found in studies by Siffre and Aschoff and Weber that without external cues, our biological rhythms are slower than what they need to be. In addition, some of the research is idiographic because they are small samples and or case studies meaning they lack population validity.

Friday, November 8, 2019

A Comparison of My Papas Waltz and Those Winter Sundays Essay Example

A Comparison of My Papas Waltz and Those Winter Sundays Essay Example A Comparison of My Papas Waltz and Those Winter Sundays Paper A Comparison of My Papas Waltz and Those Winter Sundays Paper Essay Topic: Literature Literature offers insight into human relationships. Poems, in particular, may uncover deep and often unresolved struggles that one may have with a loved one. In Theodore Roethkes My Papas Waltz and Robert Haydens Those Winter Sundays, the protagonists each have a troubled relationship with his father. It is evident that there is a central conflict between father and son, despite a genuine love for the former, which ultimately leads to an ironic response from the son. Both narrators in My Papas Waltz and Those Winter Sundays appear to have a conflict with their father. This can be seen in My Papas Waltz in that the narrator must cope with an apparent drunken father: The whiskey on your breath / Could make a small boy dizzy; (1-2). And when they waltz together, it is tragic, too, that the son must pay for his fathers mistakes: At every step you missed / My right ear scraped a buckle. (Roethke 11-12). The title of the poem itself in using the word My in My Papas Waltz rather than Our symbolizes his father being intoxicated, in that the waltz is actually his own drunken walk. The apparent agon is developed in to more than just a psychological struggle, in to what appears to be physical abuse: The hand that held my wrist was battered on one knuckle (Roethke 9-10). Breaking this statement in to two parts and with no further explanation as to why the fathers knuckle is battered, it implies that not only does he hit his loved ones, he moreover shows no love; The father should be holding his sons hand when they dance, yet he holds his wrist as if to say let go of me. Having a troubled father is evident as well in the eyes of the narrator of Those Winter Sundays, when after working hard all week, his father comes home to an ungrateful family: Sundays too my father got up early and put his clothes on in the blueblack cold, then with cracked hands that ached from labor in the weekday weather made blanked fires blaze. No one ever thanked him. (Hayden 1-5) There appears to be a conflict between members of the household, further illustrated by the statement which reveals there are chronic angers of that house. (Hayden 9). However, it is important to note that the narrator himself never once shows ingratitude for his fathers hard work he refers to the tension of that house, and may not have been referring to himself in pointing out that No one ever thanked him. (Hayden 5). Otherwise, he may have continued in the first person point of view and emphasized rather I never thanked him. Regardless, there appears to be a struggle at hand for both narrators. Despite conflicts of the household and obvious troubled fathers, the sons of each poem still have a genuine love for their dads. In My Papas Waltz, the son/narrator recognizes that his dad works hard for the family with a palm caked hard by dirt (14), and in turn wants to help his drinking problem. For this purpose, he dances with his dad willingly. He acknowledges his mothers presence, yet chooses not to dance with her. And although he claims Such waltzing was not easy (Roethke 4), he hung on like death (Roethke 3) in fear of what may happen if he falls asleep possibly, his father may drink again and physically abuse his mother. It is not until the final stanza of Those Winter Sundays where the son, too, shows appreciation for his fathers hard work, and in effect, a genuine love for him. He firstly emphasizes the word too in line 1: Sundays too my father got up early to acknowledge the fact that not only did he work during the blueblack cold (Hayden 2) days of winter, but even on Sundays a day reserved by most, to rest. Tone and order in this stanza are particularly important to demonstrate the sons love: Speaking indifferently to him, who had driven out the cold and polished my good shoes as well. What did I know, what did I know of loves austere and lonely offices? (Hayden 10-14) Naturally, if he had still wanted to show hatred toward his father, he would have put line two and line three of this stanza before line one, as if to say even though his father did good deeds, he still spoke cruelly to him. And although this one insensitive gesture of speaking indifferently to him is made known, the tone is immediately changed (as a sort of bildungsroman) to that of regret, shown by repetition (verse 13) in his look back at the way he treated his father. In truth, the narrator repeatedly acknowledges his fathers hard work, an irrefutable sign of love for him. Yet it is only the fear of that angry household mentioned earlier, which makes him act hostile toward his father. Both narrators seemingly love their father, yet their behavior ironically shows otherwise. An incongruity between expectation and reality is present in both poems. The son in My Papas Waltz speaks of an alcoholic and domineering father. The latter is ascertaining when the boy says: My mothers countenance could not unfrown itself. (Roethke 7-8). Using the words could not as opposed to did not explains a certain predicament the mother holds against her spouse that she has no choice but to show a distressing face and likely has no control over the unpleasant situation of the kitchen rumble. It seems the case that a small child would be fearful of this type of father figure, and consequently run away or repress from the burdens of a not-so-ideal relationship. However, he does just the opposite as he explains whilst his father brings him to bed, (I was) Still clinging to your shirt. (Roethke 16). Whereas the final line of this poem is the quite shocking denouement and petty resolution to a seemingly continuous agon, the conflict is resolved in Those Winter Sundays, yet not withstanding irony. Expectation holds that when a son realizes the warmth (figuratively and literally, in this case) his father brings, he will show sincere gratitude. Yet the reality of this case reveals that even while having a transparent love for his father, a negative demeanor is displayed. In the same way, the statement, When the rooms were warm, hed call, / and slowly I would rise and dress (Hayden 7-8) further illustrates paradoxical behavior; obviously there is the realization that a warm room had derived from his fathers hard work to set the fire ablaze. Still, the son shows no thanks by slowly responding to this kind gesture. It is not until after over three-quarters of the narrative is through does the author show remorse for his actions. He realizes he should have firstly overcome the disapproval that would have came from his family, and secondly, shown the love to his father that he truthfully felt as expected, rather than act antagonistic. The narrator of My Papas Waltz shows love toward an incompetent father, whereas the narrator of Those Winter Sundays shows a lack of appreciation to a hardworking father. In both Theodore Roethkes My Papas Waltz and Robert Haydens Those Winter Sundays, the narrators must each cope with a conflict with his father, and in spite of a sincere love for him, the son behaves ironically toward his parent as a result of this conflict. Just like these authors, many people are faced with family ordeals. The manner in which they are overcome, however, depends both on the weight of the problem at hand, and the internal strength of the person who chooses to manage such tribulations.

Wednesday, November 6, 2019

The Factors of Diversity in Organizational Behavior

The Factors of Diversity in Organizational Behavior Introduction International trade, globalization, enhanced movement factors of production have resulted to diverse labor market where companies can deploy from countries different from their country of incorporation (home country).Advertising We will write a custom report sample on The Factors of Diversity in Organizational Behavior specifically for you for only $16.05 $11/page Learn More Companies employing from diverse communities, societies, and nationality enjoy advantages brought about by diversity; however there are some challenges that come with managing diverse human capital. Workplace diversity is about creating an inclusive working environment, which incorporates people of different caste, nationality, gender, skin color, and ethnicity. Other than the social and physical diversity, workplace diversity also incorporates differences in ideas, skills, perspectives, and backgrounds (Jackson, 1992). This paper discusses some of the factors that a company that values diversity need as far as organizational behavior is concerned. Managing diversity Human resources management has the role of ensuring that an orchestrate team is developed within its organization, when they are addressing diversity, human resources management are expected to understand the scope that the diversity is likely to be attained as well as the definition of diversity within their organizations. Definition of what diversity within an organization can have different meanings depending with nature and industry of the particular company. For instance at Apple Inc, the world greatest electronic company, the definition of diversity include among others corporate culture, the crucial role of the human capital and global perspective; while other companies like Perisher Blue hotel in Australia defines diversity in the line of difference in cultures of employees and visitors. After getting a clear meaning of diversity within an organization, the next crucial step is to manage human resources; the human resource department has the role of establishing the differences of beliefs, races, intellectualism and ideas among the team and aim at creating a team that incorporates the strength of the diverse human capital in teams. An effective human resource manager should be able to combine the strengths and weak-points offered by diversity in a team such that they will reinforce each other and have a winning team.Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More This calls for a wide human resources research and putting on measures that can assist in determining what is best for the team. Some of the factors to consider when making efforts to know ones employees include their motivation, the way they handle situations, some cultural beliefs and the values that they uphold. With the teams of the right combination in place, the next step is to motivate and blend the teams together; when blending them then coaching, mentoring and training on how they should be there to reinforce each other for the benefit of the company should follow. Team members should be trained on how they should respect the views and beliefs of others, they should be meant to understand that people are different, thus their opinions, standpoints and views may be different; however, they can embrace the diversity of views for their own benefit. When coaching members on how they should stay together, the main emphasis should be on respect to the other persons culture and way of life. A company should have its own organizational culture that at times may seem to conflict the ethical culture and diversity within individual team members, the management should emphasis that organizational culture remains superior and should be followed within the organization regardless of whether its inline with one’s believe. With such structures, then human resources will res pect each other and have a common source of identity, organizational culture (Borkowski, 2009). Conclusion Organizations require physical and human resources carry on their businesses; personnel must be managed professionally and their human fundamental rights and freedom respected despite their nationality, ethnicity, race, or cultural belief. The human resources department assisted by line managers has the mandate of ensuring that adequate employees are available at all times and have created a positive organizational behavior. References Borkowski, N. (2009). Organizational behavior, theory and design in healthcare. London: Jones and Bartlett.Advertising We will write a custom report sample on The Factors of Diversity in Organizational Behavior specifically for you for only $16.05 $11/page Learn More Jackson, S. (1992). Diversity in the workplace: human resources initiatives. New York: The Guilford Press.

Sunday, November 3, 2019

Playworkers' Responsibilities with Regard to Common Forms of Abuse Essay

Playworkers' Responsibilities with Regard to Common Forms of Abuse - Essay Example They should be able to make full and correct records of everything and also know the laws which demand the required action (e.g. Children Act 1989) Finally, their greatest responsibility is to the child first, so the attitudes of caring kindness, empathy, and support must be present. They need to listen, question appropriately (for age), offer help and support. Thus a knowledge of support systems and services is necessary. Identification, Consultation, Referral, Initial Assessment, Planning, Strategy Planning Meetings, and after all these, either of two strategies may be put in place: 1. Services offered to child and family to ensure its future welfare is secured, or 2. Child's name is placed on the Child Protection Register and further assessments, meetings and reviews of progress will continue. Flowcharts 1 5 The playworker will have input, as someone who knows the child and its circumstances. If they have raised the concerns, they should make clear and correct records, consult with managers and colleagues, and those in other child protection roles, usually beginning with Social Services.

Friday, November 1, 2019

Green criminology Essay Example | Topics and Well Written Essays - 1750 words

Green criminology - Essay Example These new categories are crimes of air pollution, crimes of deforestation, crimes of species decline and against animal rights, and crimes of water pollution. Crimes of deforestation Our area of consideration will focus on deforestation a category of green crime and we subject it to green criminology test. Deforestation as a crime against environment can be defined as the removal of a forest or stand of trees where the land is thereafter converted to a non forest use for example conversion of forestland to agriculture or urban use. Deforestation is often misused to include any activity where all trees in an area are removed but in temperate climates, the removal of all trees in an area in conformance with sustainable forestry practices is correctly described as regeneration harvest (Butler, 2009). People engage in deforestation for many reasons but the removal of trees without sufficient reforestation has resulted in damage to habitat, biodiversity loss and aridity it also causes ext inction, changes to climatic conditions, desertification, and displacement of populations. Disregard or ignorance of the value, weak forest management and lack of environmental laws are some of the factors that contribute to deforestation. deforestation has a number of causes, including corruption of government institutions, the inequitable distribution of wealth and power, population growth and overpopulation, and urbanization. Globalization is viewed as another root cause of deforestation. In 2000 the United Nations Food and Agriculture Organization (FAO) found that deforestation can result from "a combination of population pressure and stagnating economic, social and technological conditions. According to the United Nations Framework Convention on Climate Change (UNFCCC) secretariat, the direct cause of deforestation is agriculture. The degradation of forest ecosystems has also been traced to economic incentives that make forest conversion appear more profitable than forest conse rvation. Many important forest functions have no markets, and hence, no economic value that is readily apparent to the forests' owners or the communities that rely on forests for their well-being. From the perspective of the developing world, the benefits of forest as carbon sinks or biodiversity reserves go primarily to richer developed nations and there is insufficient compensation for these services. Developing countries feel that some countries in the developed world, such as the United States of America, cut down their forests centuries ago and benefited greatly from this deforestation, and that it is hypocritical to deny developing countries the same opportunities that the poor shouldn't have to bear the cost of preservation when the rich created the problem. This is one of the major problems with green crimes where the developed nations are reluctant in implementing them (Patel-Weynand, 2002). Logging operations, which provide the world’s wood and paper products, also cut countless trees each year. Loggers, some of them acting illegally, also build roads to access more and more remote forests which lead to further deforestation. New crimes and criminals here would include those who deal in the destruction of rainforests and valuable lands; those who exploit natural resources for their own ends; and ‘black markets’ that develop around the sale of many of these valuable commodities. An example of a new kind of environmental crime may be