Thursday, October 31, 2019

Good Faith and English Contract Law Essay Example | Topics and Well Written Essays - 3500 words

Good Faith and English Contract Law - Essay Example Good faith is vital concept in law and it is a prime essence in contractual dealings. Persons are expected to act in good faith for fair dealings in day-to-day business contracts. The concept of good faith has a large bearing on contract law as well as law of obligations. In contract law good faith is indispensable element. Though the contract is formed with free consent or free will good faith is inseparable from contract1. 1. An institutional competent dimension: When good faith is viewed from this dimension in England the institutions of the law, which are the courts, interpret good faith according to needs for rendering justice. Thereby giving room for arbitrary decisions. If the doctrine of good faith introduced in law of contract there would be judicial restraint, judges loose the liberty of interpreting the concept. Their discretionary powers are restricted. Simultaneously equitable flexibility is also affected. 2. Formal dimension: When we view the good faith in formal dimension it appears as vague. When it is vague it is difficult to define the good faith to introduce into contract law. The term good faith has vague meaning, lot of efforts are to made to define the good faith to make it as a statute. ... Presently the Judges use this term in various occasions in rendering the justice using their profound experience and after legitimate study of the case. The vagueness of the term is cured with their professional knowledge and profound experience before the benefit of good faith is extended to the deserved. 3. Substantive dimension: Substantive dimension refers to the contractual ethics. Contractual ethics imposes duty of good faith on the contracting parties. When such ethics are broken what is remedy Like any ethics contracting ethics are moral of the individuals, which they are supposed to keep up. The contract law does not interfere on morals. When good faith, which is vital element in business contracts is left to the ethics, which is not protected under the contract law the interest of the parties is at risk. This risk can be avoided by introducing the doctrine of good faith into contract law. Historically good faith functioned as a binding element between people by formless contracts (pacta nuda) even if there was no written contracts, to confer priority to the intention of parties and contractual terms than their literal meaning. Such contracts inclined to substantive fairness qua the intended meaning of the contract. Contract is defined in English contract law: Since the good faith is a vital element in all contracts it is essential to have a brief view of what how contract is confined under the definition in English law. As per this definition, the essential ingredients of contract are a) consensus ad idem, b) consideration, c) legal object, d) capacity to contract. Apart from these, another ingredient i.e. intention of the parties is also important

Tuesday, October 29, 2019

Winters Bone Essay Example | Topics and Well Written Essays - 500 words

Winters Bone - Essay Example Ree sets out to look for her father, where she goes through the world of a drug user as his father is a drug producer, and Ree ends up consulting the local crime boss. She is told that her father died in a met lab fire or could have left town to avoid the trial for which he is out on bail. Ree’s father fails to show up for trial and the bondsman looks for Ree and informs her that there is about a week before their property is seized, where she then explains her findings about her father being dead. Ree then visits the local crime boss again to ask about her father and gets a beating by the boss’s women, who then offer to show her dad’s bones. They take him to the place where takes her father’s badly decaying body, which she takes to the sheriff, and she receives the bond and her uncle Teardrop tells her he knows who killed her father. This sad movie dwells on the issues of family and drugs, as well as crime as a whole and how the two vices affect a family. The drugs affect Ree’s family in that her family becomes dysfunctional following the charging of his father on account of being part of a methamphetamine manufacturing ring. The effects on the family go deeper in that even Ree’s uncles are part of the drugs world to the point that they cannot play a part in assisting Ree to find her father. In addition, the theme of drugs is also seen in the role of the local crime boss whose women are on drugs too, for which Ree’s father is killed. In relation to crime, the local crime boss, seems to be aware of all occurrences revolving the activities and whereabouts of Ree’s father. This is as seen in the case where he refers to Ree’s father as having died in a fire or even left town to avoid charges. Crime goes on to be portrayed in the murder of Ree’s father, where they find his remains under a boat. The issue of family is also shown in how Ree is dedicated to protecting her family even at a young age, where she

Sunday, October 27, 2019

Library Management System Based On Finger Prints And RFID

Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit Library Management System Based On Finger Prints And RFID Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit

Friday, October 25, 2019

J.B. Religion Essay -- essays papers

J.B. Religion At the end of Baldwin's 1952 novel Go Tell It on the Mountain, John Grimes, the young protagonist, has an epiphany or what is more commonly referred to as a visionary conversion experience, a staple of American religious life. He embraces Jesus and endures a state of ecstatic mysticism in which he experiences "his drifting soul ... anchored in the love of God" (204). John's rebirth in Christ, his being "saved," is an affirmation of one of the strongest bulwarks in the African American community during slavery, and especially since its abolition: the black church. (2) Baldwin has said that "everything in Black history comes out of the church." It is "not a redemptive force but a `bridge across troubled water,'" Kalamu ya Salaam interviewing Baldwin responded. "It is how we forged our identity" (Pratt and Stanley 182). The church is the African American's inheritance. Black writers and the characters they create are not so easily divested of it, nor should they be. Though John Gri mes's commitment to Christ is representative of black assimilation into American (white) culture, this adoption of Christian beliefs not only helped the community forge a stronger connection to their country and society, but it also enabled slaves and then emancipated Africans to shore up their sense of self-worth and value. African American literature, according to Abena P. A. Busia, "has therefore become a drive for self-definition and redefinition, and any discussion of this drive must recognize this, its proper context: We are speaking from a state of siege" (2). John Grimes's journey over the course of Go Tell It on the Mountain mirrors this movement from imprisonment to freedom, from a vague sense of self to a greater consciousn... ... dilemma of his protagonist, but also exposing the moral foundations of the institutional pillars in the black community" (Bell 224). While criticism of the church's role in supporting subtle racism is justified, it is also true that John cleverly utilizes the rich resources of the church that were available to him. Would he be better off following Roy into the streets? Or Royal, Gabriel's first son, who also found his way into the streets and the reendured a violent death? John "wanted to be with these boys in the street, heedless and thoughtless, wearing out his treacherous and bewildering body" (30). He recognizes, however, even in the semi-transparent consciousness of a man-child, that he is being forced to make "so cruel a choice" (40) between the ways of the world, which in his community can too often lead to violence and self-destruction, and the ways of God.

Thursday, October 24, 2019

Religion Terms Chapter 3 (Social Justice)

1. Praxis: Living according to one’s belief, not just in private, but also in a way that affects the world. a. Through this critical appropriation critical praxis becomes a possibility.2. Circle of faith in action: The approach to doing justice that we will examine, which borrows the aspects of the circle of praxis and A Call to Action. b. People all around are called to follow the circle of faith in action to help make the world a better place.3. Awareness: Seeing, hearing, and knowing the world in a spirit of friendship, as God does. c. We are called to spread awareness of the problems people are facing in the world, so we can help them.4. Worldview: The beliefs that guide the way someone relates to the world. d. People around the world have different worldviews on how things may affect them, good or bad.5. Culture: All of the shared values, beliefs, and ways of relating and living together that characterizes a particular group of people. e. Understanding another’s cu lture is one way to bring people closer.6. Respect: To look beyond the outer appearances and first impressions to see the goodness that is the foundation of all God’s creation f. If we want to be respected, we must first respects ourselves.7. Analysis: The process of understanding how people’s lives are affected by the relationships that shape the society in which they live. g. Before we try to approach the problem, we must first go through the process of analysis.8. Interdependent: Depending on one another for our existence. h. We live in an interdependent world where everyone need one another.9. Relationship map: Shows the connection between people that shape our society. i. Everyone’s relationship can be seen in the link of the relationship map. 10. Social structure: The patterns that shape any society. j. Many people say that the social structure of out society are somewhat corrupted.11. Structure of sin: The individuals’ decisions that contribute to the social structure that block justice. k. Our bad decisions are the structures of sin.12. Power: God-given ability everyone has to affect their own lives; lives of others, and the world around them in either positive or negative ways. l. Everyone thirsts for power over others, but little do they know that sometimes is brings pain to them.13. Power-over: The belief that human beings are the source of their own power recalls the Original Sin of the first humans, who believe that they could become their own God. (If power is given, it can also be taken) m. Many corporations long for power-over, because they are always fighting to become the top company in the world.14. Power-with: Everyone has God-given power, because we live in an interdependent world, that power is mean t to be shared in relationships with others. n. God wants his creations to have power-with instead of longing to have all the power to their selves because power-with can help bring the relationship between everyone stronger.15. Boycott: Withdrawal from commercial or social relations with (a country, organization, or person) as a punishment or protest. o. Throughout history, there have been many boycotts regarding because people have been treated unfairly.16. Strike: Refusal to work as a form of organized protest, typically in an attempt to obtain a particular concession or concessions from their employer. p. Many strikes have taken place because employees are not happy with the way they are treated by their employers,17. Action: To change the situation in a way that allows all the people who are involved to experience the good life that the Creator planned for them. q. People should take the action of helping to increase peace and health in the world.18. Direct action: Action that occurs on the level of individual relationships and is aimed at meeting an immediate need. r. When we do direct action, we can immediately help those in need.19. Social action: Action that occurs on a level of social structure. s. When social action is taking place, we can spread the awareness of the problem to people who pay no attention to such horrors in the world.20. Basic ecclesial communities: Small groups of Christians who gather to celebrate the liturgy, hear the Scripture, discuss problems they face in society, and find solutions through inspiration of the Gospel. t. Basic ecclesial communities gather together to help those in need through ideas from the Gospel.21. Mohandas Karamchand Gandhi: Took seriously Jesus’ instructions to love the enemy; developed own ideas about how to act on Jesus’ teachings. u. M.K. Gandhi was a very influential man from India.22. Non-violent non-cooperation: Gandhi’s approach of protesting, striking, and boycotting. v. Gandh i’s non-violent non-cooperation was a way of protesting without aggression of the protestors that may start violence.23. Civil disobedience: intentionally breaking laws that are unjust. w. Civil disobedience can be seen as breaking a law but not actually breaking a law because it was already broken in the first place.

Wednesday, October 23, 2019

Did the Arabs Injustice Huntington?

Samuel Huntington is the author of the article entitled â€Å"The Clash of Civilizations? † which discusses or narrates concepts that explicates world politics. According to Huntington, international conflicts that concerns politics may be justified by rational arguments or issues that are left unresolved. However, Huntington reiterates that these particular conflicts are founded on underlying issues or matters that naturally lead to political conflicts – that is culture.According to Huntington, culture is threatening to divide nations instead of leading the way to support unity and oneness in handling international problems or issues, since culture is the primary source of irreconcilable differences and conflicts that do not provide opportunities for nations to meet in middle ground. As a means of representing concrete structures of culture, Huntingon has labeled seven civilizations being the Confucian, Hindu, Islamic, Japanese, Latin American, Slavic-Orthodox, and Wes tern. One may notice that Huntington left out the African populace as one of the identified civilizations.This is because Huntington was unsure about the state of the African nation, that is, whether it meets the standards and guidelines of development that is attributed to a mindful and responsive civilization. The classification of Huntington of the world population into civilizations was primary influenced by prominent religious affiliations that are a major identifier of culture. Personally, I would have to agree with Huntington on this matter, since I sincerely believe that cultural affiliations among individuals are largely influenced by the religious beliefs that they share.Huntington believes that the strong ties of individuals to their culture and religion which grants them a sense of self or identity as an individual and as a nation, is difficult to break apart when it comes to promoting rational politics and relations that necessitates the disregard of personal worldviews as directed by a civilization’s culture. However, Huntington’s establishment of seven civilizations has also been a source of contradicting information that he has presented in his article since the classification of civilizations is complicated and inconsistent.Moreover, Huntington mentioned that differences between people, as supported by his theory of the seven civilizations in the world, do not necessarily mean that there will be conflict, and conflict does not necessarily mean that it will lead to violence. However, the gist of Huntington’s article clearly displays how differences, particularly in culture and religion, is the primary cause of conflict and violence around the world as he studied the Cold War and the succeeding world events after it.These contradicting thoughts that Huntington shared in his work, he also contradicted by stating how culture and religion are two important factors in promoting unity. In this case, Huntington mentioned how non-A rab Muslims were able to unite as one despite differences of culture and religion and through shared culture and religion. Upon the establishment of the seven civilizations, Huntington continued to discuss various historical evidences that support his claim. This particular issue led to the discussion of the politics between the Arabs and the West which raised violent reactions from the former.Huntington wrote that at present time, the major players in world politics are the West and the Arab nation. Despite internal clashes between different factions or minority groups within the Arab nations, Huntington believes that in the end, it will still find a way to reconcile differences among them and be counter-reactive to the West. Although the statements of Huntington caused a stir within the Arab nation, I believe that Huntington was not pressing violent, hateful, derogatory, or discriminatory issues against the Arab nation.Huntington magnified his discussion on the issue between the A rabs and the West since it is the current international issue or problem – the power struggle between the two civilizations which people often hear in the news. Although majority of Huntington’s arguments were based on theories, I believe that everything he said were reflective of the current situations, straying away from the assumption that he wrote the article to present his prejudiced or biased sentiments against the Arab nation.His article was based on decades of historical evidences that created an obvious pattern relaying motivations of war in the past, which was further supported by the 9/11 incident that led to the destruction of the Twin Towers in New York. Huntington was simply observant and articulates enough to present a logical explanation of countless conflicts between nations, which may or may not have some truth to it. Frankly, I believe that major truths are embedded within theories, especially those that lend themselves to conspiratorial issues.Setti ng my personal opinions aside, Huntington’s criticisms of other civilization validates the fact that he was not anti-Arab, but simple a man who wanted to illustrate world politics under a cultural context. Huntington criticized the immorality and hypocrisy of the West, stating how the Western civilization has achieved its superiority over other civilizations due to its mindful submission to organized violence in order to achieve its goals and objectives. Moreover, Huntington reiterates that the West does not promote universalism but rather act for world domination.Moreover, Huntington believes that Christian views which originated from the West could not have influenced numerous people around the world if Christians had not come into contact with individuals from the East. Huntington then criticized Western Christianity; and then continued to criticize Western Europe. According to Huntington, some of the concepts of politics and economics claimed by the Western Civilization, particularly Western Europe, did not actually originate from it but from non-Western civilizations in other parts of the world.In general, Huntington’s article was a seemingly balanced representation of his theories on how international conflicts, then and now, were products of cultural and religious differences. The criticisms he posed were not one-sided, attacking the Middle East or the West, or any other civilization for that matter, solely. In fact, Huntington’s theories were open discussions and arguments about the Arab and Western perspectives. Huntington acknowledged how the West is trying to portray a super power estate that works to promote unity, solidarity, democracy, diplomacy, peace, and such.This, he identified as the Western perspective. However, Huntington argued that the West’s interests are politically motivated, geared toward staying in power and obtaining control of the majority populations. On one hand, Huntington discussed how the Arab popu lations are trying to overthrow the influence of the West in their land, moving them to resort to threats and violence toward non-Arab and Western nations. For Huntington, the Arab perspective is just patterned after the â€Å"us-versus-them† mentality.

Tuesday, October 22, 2019

Individual Behavior and Processes Essay Example

Individual Behavior and Processes Essay Example Individual Behavior and Processes Essay Individual Behavior and Processes Essay Introduction Mgt provided us with a good basis for understanding organizational behavior by exploring the most essential elements of organizations and how they function. In Week Two our exploration of organizations will become more specific by examining the most basic working elements of the workplace: people. This course will eventually ask us to contemplate the complexities of people working together in groups and teams but, in order to get our studies off to the best start we will begin by considering how individuals function within the workplace. Most students can easily describe themselves however their descriptions are often based upon their internal view of how they see themselves or how they hope others view them. In order for a person to improve their relationships they must gain an accurate understanding of how others see them. Week Two will examine the diversity among individuals and how our differences affect the way we interact with others in the workplace. Most of todays employees want to be involved and expect to have some level of responsibility in helping to meet organizational goals. They want more autonomy to make their own decisions and to accomplish their own goals. Still, employees want to have a personal life and place a very high value on their personal freedoms. More and more employers report that today’s workers often turn down overtime wages in order to spend more time doing what they enjoy! This fact demonstrates how important individual freedoms are. Each worker is different in the way they view the workplace and each has a unique set of expectations for what makes them feel happy and successful in their work. Success in the new workplace requires a set of skills for working successfully with a broad mix of people from different racial and ethnic backgrounds, different ages and genders, and different domestic and national cultures. When people think of diversity they primarily think of differences in age, race, ethnicity, gender, physical ability, and sexual orientation – but diversity is much broader than that. Diversity also includes things like religious beliefs, education, experience, socio-economic class, family values, and more. Consider your own workplace: think about where people grew up, where they went to school, and how many other ways they are different. How many differences can you count among the five people with whom you work most closely? How well do you know these people and how many unknown differences might there be? These differences make people act and think in very different ways. Diversity is everywhere and organizations have two clear choices: to manage and utilize diversity or to suffer from it. Valuing diversity is extremely important for today’s organizations. Truly valuing diversity is characterized by managing and working with others while fully respecting their individual differences. Many organizations are providing training designed to help people understand and respect differences. Heres the key: instead of fearing or dreading the differences in our workforces, lets try to take advantage of them. A diverse workforce offers a rich pool of talents, ideas, and viewpoints for solving complex problems. Diversity, if managed properly, can provide a competitive advantage for an organization. Good managers understand that diversity, like conflict, can be looked upon as a barrier to success or as an opportunity for success. If an employer lets differences interfere with hiring and developing someones ability, it becomes some other companys gain. Leading employers and managers are aware that this can be used to their gain. They make an effort to understand and tap into those differences and prevent erroneous perceptions or stereotyping. In the end, their ability to understand and motivate a diverse workforce results in increased organization success. Respecting diversity is really quite simple. If an individual feels respected and understood then they are most likely to be happy in their work. Similarly, if they feel that they can effectively communicate with others then they feel important. By respecting the differences among people and enabling a positive environment for communication, effectiveness in the workplace may be significantly increased. Effective communication begins with a willingness to listen and think critically about what another person has said. People often misinterpret the messages sent by others and respond in ways that are inappropriate – we’ve all seen examples of misunderstandings in our lives. Effective communication depends on the ability of two people to send and receive messages in a way that allows their intentions to be accurately interpreted. Communication is a very dynamic process that is continually challenged by factors called â€Å"noise. † Noise is defined as anything that can interfere with effective communication (Schermerhorn, Hunt, Osborn, 2005, p. 295). Communicative noise is not necessarily audible; for example, noise can include a person’s mood or attitude. A lack of contextual basis can also act as a barrier to effective communication. This type of noise commonly occurs in the workplace when workers communicate via email. The mode we choose to send a message is called a channel. Email is a relatively new channel to people, so miscommunication frequently occurs because the people receiving our messages are not able to judge our intended meaning as clearly as they can in person. Practical Application and Questions for Thought How many times have you hit the â€Å"send† button on your email only to have someone call you to ask why your response was so negative? Consider what your boss would think if you sent the following email message on a payday: â€Å"Gee boss, I’m so happy with my paycheck that I feel like I’m cheating the company! † If you gave me a raise, I don’t know what I would do! † Would the response from your boss be positive or negative? What future implications might this message have for you? The answers to those questions depend on several factors like how well the boss knows you, what type of mood the boss is in, and how much money you earn compared to others in the company. That is exactly the point – you cannot know how the message will be perceived because you are not able to convey it in a way that lets the boss know you are joking. If you were to see your boss in the hallway and if you knew that he/she was in a good mood, you might smile and whisper the statement. Under those conditions, the boss is much more likely to understand that you are kidding. Youll recall that in Week One we discussed a workplace scenario in which a new director was faced with the task of fixing a supply department that was riddled with problems. Of course the director’s tasks include researching, identifying, and planning solutions for a number of procedural problems. Because the central problem was defined as a cultural deficiency, it is certain that one of the director’s first actions was to gather the middle managers and institute a culture change. This has a profound effect on the workplace, beginning with the way the employees viewed their place in the organization. Instead of being afraid of taking action for fear of making things worse or being reprimanded, they will soon take an active part in process improvement. They will also realize that they are the keys to success and that they are expected to be proactive in all areas of their jobs. Because management is openly communicating with them they understand what the standards are and how departmental success will be defined. The employees are active participants in discussions about where we need to go and how were going to get there. Most importantly they are told that above all else they are all in this situation together and that they will all succeed or fail together. The increase in motivation caused by this new culture will be instantly noticeable. When dramatic cultural change like this occurs you see the positive changes in the employees’ expressions and you can actually feel it as you walk through the department.

Monday, October 21, 2019

Free Essays on Adaptation Of Historic Costuming

Mesopotamia The Mesopotamians wore the use of tassels, fringe and wrapped garments. Today Harpers Bazaar shows the same style garments, which are now considered the â€Å"Winter Wonders† of the Fall/Winter collection in the 21st century. History of Costume, pg.19 Bazaar Magazine, Oct `02 pg.228 Pg.119 Egyptian Egyptians used a plain, basic yet classical style of sheer draping linen for their garments. In today’s fashion world we wear the same garments to awards ceremonies that are designed by the top designers of this today’s fashion industry. History of Costume, pg.40 In Style, Aug `02 pg.101 Cretan The Cretans were known for their open bodices and tiered skirts, the pictures that are shown above are the same type of garments designed for the 21st century, I think that the open bodices are becoming extremely popular along with the short skirts in today’s world of appeal. History of Costume, pg.63 Bazaar, Sept `02 pg.17 IN Style, Aug `02 pg.264 Grecian â€Å" It’s not about what you wear; it’s about how you wear it and interpret it,† Greek garments were made of fine linen that was very clingy to the body without being too revealing. Belting and blousing can shorten the Chilton; Christian Dior portrays this classic draping fashion. History of Costume, pg.83 Bazaar, Jul `02 pg.311 Oct `02 pg.253 Roman â€Å"This artfully draped dress is nothing short of a Greek myth.† That was a quote by a designer on this particular garment above. The roman toga is a about six to eight feet long, the garment often has many layers, a fine look that was adapted so long ago in the Romans era. History of Costume, pg.102 Elle, Jun `02 pg.111 Jun `02 cover Byzantine Britney Spears is wearing beautiful garments that are covered with jewels, embroidery and brocades, just as the Byzantines wore, although it was a sign a luxury then, in some ways I guess it still... Free Essays on Adaptation Of Historic Costuming Free Essays on Adaptation Of Historic Costuming Mesopotamia The Mesopotamians wore the use of tassels, fringe and wrapped garments. Today Harpers Bazaar shows the same style garments, which are now considered the â€Å"Winter Wonders† of the Fall/Winter collection in the 21st century. History of Costume, pg.19 Bazaar Magazine, Oct `02 pg.228 Pg.119 Egyptian Egyptians used a plain, basic yet classical style of sheer draping linen for their garments. In today’s fashion world we wear the same garments to awards ceremonies that are designed by the top designers of this today’s fashion industry. History of Costume, pg.40 In Style, Aug `02 pg.101 Cretan The Cretans were known for their open bodices and tiered skirts, the pictures that are shown above are the same type of garments designed for the 21st century, I think that the open bodices are becoming extremely popular along with the short skirts in today’s world of appeal. History of Costume, pg.63 Bazaar, Sept `02 pg.17 IN Style, Aug `02 pg.264 Grecian â€Å" It’s not about what you wear; it’s about how you wear it and interpret it,† Greek garments were made of fine linen that was very clingy to the body without being too revealing. Belting and blousing can shorten the Chilton; Christian Dior portrays this classic draping fashion. History of Costume, pg.83 Bazaar, Jul `02 pg.311 Oct `02 pg.253 Roman â€Å"This artfully draped dress is nothing short of a Greek myth.† That was a quote by a designer on this particular garment above. The roman toga is a about six to eight feet long, the garment often has many layers, a fine look that was adapted so long ago in the Romans era. History of Costume, pg.102 Elle, Jun `02 pg.111 Jun `02 cover Byzantine Britney Spears is wearing beautiful garments that are covered with jewels, embroidery and brocades, just as the Byzantines wore, although it was a sign a luxury then, in some ways I guess it still...

Sunday, October 20, 2019

Minimalism or Minimal Art Mid-1960s to the Present

Minimalism or Minimal Art Mid-1960s to the Present Minimalism or Minimal Art is a form of  abstraction. It focuses on the most essential and elemental aspects of an object. The art critic Barbara Rose explained in her groundbreaking article ABC Art, Art in America (October-November 1965), that this empty, repetitious, uninflected aesthetic could be found in the visual arts, dance, and music. (Merce Cunningham and   John Cage  would be examples in dance and music.) Minimal art aims to reduce its content to rigorous clarity. It may try to rid itself of evocative effect, but it does not always succeed. Agnes Martins faint graphite lines drawn on pale flat surfaces seem to radiate with human delicacy and humility. In a small room with low light, they can be exceptionally moving. How Long Minimalism Has Been a Movement Minimalism reached its peak during the mid-1960s to the mid-1970s, but many of its practitioners are still alive and well today. Dia Beacon, a museum of mainly Minimalist pieces, exhibits a permanent collection of the best-known artists in the movement. For example, Michael Heizers North, East, South, West (1967/2002) is permanently installed on the premises. Some artists, such as Richard Tuttle and Richard Serra, are now considered Post-Minimalists. What Are the Key Characteristics of Minimalism? Clarity and simplicity of form.No narrative.No anecdotal content or references.Emphasis on pure shapes.Often monochromatic surfaces. Best Known Minimalists: Agnes MartinDonald JuddMichael HeizerRobert MorrisRobert SerraRichard TuttleTony SmithAnn TruitRonald BladenDan FlavinSol LeWittRobert MangoldDorothea Rockburne Suggested Reading Battcock, Gregory (ed.). Minimal Art: A Critical Anthology.New York: Dutton, 1968.

Saturday, October 19, 2019

Describe and Evaluate the main Macro Economic Policies used by the Essay

Describe and Evaluate the main Macro Economic Policies used by the Australian Government and Reserve Bank over the last two year - Essay Example In the last two years, the government’s goal has achieved economic growth, internal and external balance within an economy thereby maintaining economic growth and low inflation as well as ensuring low foreign debt and liabilities. Although economic growth has not been constant for the last two years due to international business cycles, the government has reduced the fluctuations via influencing demand. In as much as the economy has had several ups and downs, her improved international demands and rich natural resources such as iron ore and coal. According to â€Å"International Monetary Fund,† Reserve Bank of Australia has strengthened financial system in such a way that the macroeconomic policy is devised to curb recession instead of controlling inflation (Web). Macroeconomic aggregates which include rate of inflation, GDP growth and unemployment rate can possibly reflect the performance of a country’s economy. ... even as other countries such as U.S are struggling to recover from recession, the Australian government has boosted the economy by encouraging export to Asia (125-128). The government’s move to incorporate interest rate is aimed at promoting non-mining and housing investments which play integral role in spurring economic growth. Reserve Bank of Australia further made some great efforts in controlling money supply through the open market operations which involves purchasing or selling of financial instruments (Web). This has stabilized the Australian economy for the last two years because of their eventual effect on consumption and investment. According to Soliman RBA’s monetary policy for the last two years has been directed to achieve 2-3% inflation rate on the average over the cycle and this has really stimulated economic activities without interfering with economic decisions in the economy (98-100). It is apparent that both the government and the RBA have instituted strong fiscal and monetary policies that have successfully countered the economic recession. Theoretically, reduction of interest rate would enhance aggregate demand by influencing the aggregate components such as stimulation of investments projects as borrowing would be less expensive. The attraction or creation of a good investment environment has been one of the core activities that the government has dealt with in the previous years as this will deal with unemployment issues. Soliman explains that low interest rate has enabled Australia to increase her export while reducing their imports thus enhancing net export (101-102). The monetary policy decision process in Australia which includes the RBA board has been frequently meeting to discuss new developments in both Australia and international

Friday, October 18, 2019

Individual Reflective Report Essay Example | Topics and Well Written Essays - 2000 words

Individual Reflective Report - Essay Example More than half of the workforce employed on temporary basis with limited or no perks and benefits i.e. employee discounts, lunches, T&D allowance etc, offered other than market competitive salary. Lack of contractual obligations often resulted in unannounced resignations from junior employees with no notice period. Also, as a result of major policy changes, middle managers mainly store managers were made contractual and course of career progression within ABC was made restricted. Therefore, the interest of such managers in developing and retaining basic talent as a business leader was rather limited due to their own limited career growth. The store owners who were the founders and directors of the store were the only stable position holders in the organization and maintained a distant relationship with rest of the workforce with communication mainly through emails or meetings at head office. Resultant was no communication of management’s values, beliefs and goals to rest of th e employees. Furthermore, HR department was responsible for providing menial support in terms of recruitment, payroll and employee management instead of playing a role of HR business partner. A critical analysis of the situation illustrates that there were eminent issues faced by ABC in terms of lack of leadership display, employee motivation, managerial control, communication of vision and strategic partnership between HR department and rest of the business. The given situation was observed by senior management when a surprise visit was paid by one of the partners to the store which was met by a series of change in some basic policies. During an open meeting with senior managers, I shared my views by stating that that most of the employees perceive their compensation and benefits to be highly uncompetitive and was willing to switch for minor raises. With the help of this input, management increased some of the benefits while keeping the basic salary structure same and also began th e regime of employee recognition through best sales man of the quarter and monthly birthday celebrations etc. Despite the fact that these strategies were expected to increase employee’s morale, there was a limited increase in employee retention rate. Therefore, the interventions designed were not addressing the root causes of the problems faced by ABC. Self-Evaluation and Application of Organizational Theory Analyzing this scenario in the light of organizational change models, it was found that internal formal and informal subsystems along with industry related factors were triggering this change in employee retention (Waddell et al., 2011). The management identified lack of reasonable perks as the key factor behind low employee motivation and retention ignoring lack of leadership and managerial control at ground level. The change that was induced by the senior management had an episodic impact with no continuation in betterment of existing policies. Resultant was a convergen t change followed by small adaptation to existing market practices, loose support from managers and leaders along with small positive output. Analyzing this progress in the light of change offered by Plowman et al (2007), it was observed that ABC needed a continuous and radical change since the internal system was undergoing major instabilities. The discrepancies were existing organization wide and a frame-bending adaptation was required. Another major lacking observed in

Vanley Burk and the authentic Birmingham experience Essay

Vanley Burk and the authentic Birmingham experience - Essay Example Burke has been the part of the community which was struggling for better living conditions, better education and better life. On the basis of Norman Fairclough’s frame work the work of Burke has been analysed and explained. Vanely Burke on the other hand developed his skills and sensitivity towards authentic photography to present human life and emotions. He emphasised more on the human aspects of images than the material aspects. His presentations indicates that the authentic presentations of photography does not require an individual to belong to the particular community rather it requires the sensitivity in the presentations towards the subject matter. The paper is based on the qualitative analysis of Vanley Burk and the authentic Birmingham experience on the basis of Norman Fairclough’s work. The interview of Vanley Burke has been utilised as a source of analysis. The African and Caribbean community have come to Britain due to various reasons. Some have been brought as slaves while others have been invited to fill the gap of demand and supply of labour class. This community had come for better perspective of life. These communities have their own cultural identity and social structures where they had norms, values and social relations. The identity they had in their native country and the identity they have been receiving in Britain was different. The British media had presented the negative images of this community. This led to build up negative perceptions among the mass about these people. The identity of any section of society can build up or tarnished on the way they are presented by media. The language, images, conte xt and the timings of the appearance of particular news or information is crucial in the image building process. Apart from that lack of knowledge about the culture and the living of one community can be the other factor of believing in what is

The Power of the Media Tycoon Essay Example | Topics and Well Written Essays - 2250 words

The Power of the Media Tycoon - Essay Example Today, the power of the media and the few people that control it, have been compared to world leaders in their ability to sway opinion and effect change. How does this power compare to the power of a US President While the media tycoons have the legal limitations of any business owner that answers to stockholders and a board of directors, they have the power to move public opinion, initiate social change, and influence foreign policy to an extent greater than any elected public official. In the United States almost all the information available comes from a media outlet. Academic research is generally reserved for the small circle of specialists that have a position that offers them an interest and gives them exposure to the topic. These articles will occasionally get anecdotally quoted by the media, but the reports can be used for the outlet's own self-serving agenda. Selected quotes taken out of context can mislead the viewers in an attempt to sway public opinion. These opinion-centric newscasts exert enormous control over what people think and how they think about it. The ability to slant the news is even more significant in light of the increasing concentration of media ownership. The period of 1984 - 1999 saw the number of major owners go from 50 to 15 (Hasen 1626). The reduced number of outlets translates to an increased numbers of viewers and more influence. Media owners such as Rupert Murdoch can stack ... Reporters and pundits can be richly rewarded by presenting material in line with the network's political views. They can also be summarily punished and fired for developing a politically unpopular story of a scandal or major corruption. The network owner leverages these strengths to highlight or diminish a story's importance in the viewer's mind. The president is unable to cap a story or keep facts out of the viewer's homes. The recent events surrounding the investigation into the firings of the US Attorneys is evidence of the president's lack of ability to control the news. It is solely in the hands of the network and the network leadership. When comparing a media tycoon's power in regards to public opinion to a president, it is helpful to consider the information disseminated during a national presidential election. Presidents and candidates are limited to advertising and 'free' news spots. They are limited in the amount of time and coverage they can get. News conferences can help a president get exposure for a program or to promote a political stance, but television news can paint the portrayal with an opinionated slant. The news is not simply responding to a market and giving viewers 'what they want'; they are actively promoting a social agenda. During a recent national election, coverage varied widely from Fox to NBC to CBS. They varied in the amount of coverage on issues such as race and gender and according to Larson, "...although network news shows generally compete for the same audience, have the same operating procedures, and have similarly trained workers, their stories differed" (23). News presentation has the ability to focus attention on a given event and make the event important

Thursday, October 17, 2019

Intellectual Property Rights Essay Example | Topics and Well Written Essays - 1250 words - 1

Intellectual Property Rights - Essay Example (Drucker). Again, other eminent writers also speak about entrepreneurship, in terms of its wealth creation abilities. Through innovation, the business creates demand for its products or services, which meets customer or market acceptance and satisfaction. This market acceptance is translated into greater demand for goods, which in turn, over a period of time, results in profits for the entrepreneurs. Thus, as the noted economist, Joseph Schumpeter has said, "from a steady economy, a technical innovation by a single entrepreneur opens up new profitable avenues - therefore, more entrepreneurs are induced to innovate, thereby increasing the profits in the economy as a whole, thereby driving growth." (After Marx: Structural Change and Steady States). This process has to be strategically dealt with, since it has serious market ramifications and could affect market positioning of competitive products, and is of importance in the ultimate success or failure of the product. The legal aspects notwithstanding, it is imperative that innovation to market creates value addition to products/services and delivers aspects or improvements on contemporary products or services. This is important, since new product should justify their position in the market and should consider issues and provide solutions that may not have been addressed by other products. Nobel laureate in economics, Ronald Coase had said that the boundaries of the firm are defined by its transaction costs. It sometimes happens that abstruse information contributes to high track costs, which in turn, leads in many instances of vertically integration. (Davenport et al 2006). Question 2: What forms of protection are available for innovation through Intellectual Property Rights. The forms of protection that are available through intellectual property Rights is in terms of the fact that the patentee enjoys exclusive rights over the patented product(s) and nobody else could seek use of such products without the prior consent of the registered patentee for a period of 20 years. However, the discretion for granting of patent lies with the Patent Office, and it is quite likely that grant of the patent could be delayed , or refused, if the concerned department is of the considered opinion that it could be detrimental to competitive products or could be perceived to enhance monopolistic trends. Financial implications of Patent registry: It needs to be said that patent registration is a financially challenging one, especially in EU countries: (McGinness 2001, P.13). From the table above it is manifest that while the total costs (excluding renewals) are a whooping 49,900 in EU countries, it is just a modest 16,450 in

Identify the components and interfaces commonly present in J2EE Essay

Identify the components and interfaces commonly present in J2EE projects as they progress through the development and design of the distributed architecture - Essay Example In a distributed computing environment, J2EE uses a multi-tiered application model. There are the (1) the web-tier components that run on the J2EE server; (2) the business-tier components run on the J2EE server; the (3) client-tier components that run on the client machine and (4) the Enterprise information system or EIS-tier software which runs on the EIS server. A J2EE component may be defined as a self-contained functional software unit that is assembled into a J2EE application along with its related classes and files and which is able to communicate with other components using programming logic (java.sun.com). In a J2EE distributed enterprise application model therefore, the application logic is usually divided into components according to their function, and the various application components that make up a J2EE application are installed on different machines depending on the tier in the multi-tiered J2EE environment to which the application component belongs. I believe that the RUP or Rational Unified Process is the best approach for J2EE applications. This consists of the following phases: Requirements Analysis, Object Oriented Analysis, Architecture Specification, Object Design, Implementation, Validation, Assembly and Deployment, and Operation and Maintenance (Kurniawan, 2002). All in all, we see can that the main usage of the J2EE environment is to develop and deploy enterprise applications. The modern J2EE platform consists of a set of services, application programming interfaces and protocols that provide the functionality for developing multi-tiered, web-based applications in a distributed computing

Wednesday, October 16, 2019

Intellectual Property Rights Essay Example | Topics and Well Written Essays - 1250 words - 1

Intellectual Property Rights - Essay Example (Drucker). Again, other eminent writers also speak about entrepreneurship, in terms of its wealth creation abilities. Through innovation, the business creates demand for its products or services, which meets customer or market acceptance and satisfaction. This market acceptance is translated into greater demand for goods, which in turn, over a period of time, results in profits for the entrepreneurs. Thus, as the noted economist, Joseph Schumpeter has said, "from a steady economy, a technical innovation by a single entrepreneur opens up new profitable avenues - therefore, more entrepreneurs are induced to innovate, thereby increasing the profits in the economy as a whole, thereby driving growth." (After Marx: Structural Change and Steady States). This process has to be strategically dealt with, since it has serious market ramifications and could affect market positioning of competitive products, and is of importance in the ultimate success or failure of the product. The legal aspects notwithstanding, it is imperative that innovation to market creates value addition to products/services and delivers aspects or improvements on contemporary products or services. This is important, since new product should justify their position in the market and should consider issues and provide solutions that may not have been addressed by other products. Nobel laureate in economics, Ronald Coase had said that the boundaries of the firm are defined by its transaction costs. It sometimes happens that abstruse information contributes to high track costs, which in turn, leads in many instances of vertically integration. (Davenport et al 2006). Question 2: What forms of protection are available for innovation through Intellectual Property Rights. The forms of protection that are available through intellectual property Rights is in terms of the fact that the patentee enjoys exclusive rights over the patented product(s) and nobody else could seek use of such products without the prior consent of the registered patentee for a period of 20 years. However, the discretion for granting of patent lies with the Patent Office, and it is quite likely that grant of the patent could be delayed , or refused, if the concerned department is of the considered opinion that it could be detrimental to competitive products or could be perceived to enhance monopolistic trends. Financial implications of Patent registry: It needs to be said that patent registration is a financially challenging one, especially in EU countries: (McGinness 2001, P.13). From the table above it is manifest that while the total costs (excluding renewals) are a whooping 49,900 in EU countries, it is just a modest 16,450 in

Tuesday, October 15, 2019

The Good and Evil Desire of Macbeth Essay Example for Free

The Good and Evil Desire of Macbeth Essay Desire in itself is a powerful force. In fact, almost every action we take, good or evil, is prompted by desire. Success and advancement is also something we all seem to want. It is something people spend hours, days, and years of their life either preparing for, or chasing after. It is a desire that we are often striving for, and the things acquired or accomplished along the way are how we define our lives. Ultimately, at one’s funeral people will remember a person by how their lives summed up in the good or the bad that has been contributed, and the actions took in doing so. In William Shakespeare’s play, The Tragedy of Macbeth, depicts the story of an individual’s desire for success and advancement. In this case, a heroic man’s desire becomes something evil that causes tragic events, including murderous acts committed by Macbeth in a bloody rise to power and eventually leads to his complete and utter destruction. In considering any moral question one must use rational thinking to come to a logical conclusion of what is right verse wrong, or good verse evil. In Macbeth’s case, his lack of using rationality, common sense and logic caused a normally healthy emotion of desire for success and advancement into a self destructive one because, it continually led him to make terrible decision. American writer and philosopher Aryn Rand asserts, â€Å"Man must obtain his knowledge and choose his actions by a process of thinking† otherwise, â€Å"Man has the power to act as his own destroyer† (534). Taking into consideration Rand’s moral philosophy of ethical egoism, a person ought to do what is in his or her own best interest further proves that Macbeth desire became evil or was wrong because it led to his death. While Rand’s quote in itself is rational and quite fitting considering Macbeth’s died due to his actions, on the other hand, moral questions cannot be decided alone by appealing to moral authority. For example, take into consideration, German philosopher Frederick Nietzsche. According to Oscar Levy, desire for success and advancement can relate to how â€Å"Nietzsche believes that the fundamental creative force that motivates all creation is the will to power. We all seek to affirm ourselves, to flourish and dominate. † (122). Many people in today’s society can also agree with that belief and how it relates to the story of Macbeth. A person in today’s society could measure their success and accomplishments in a job title, valuable contributions on projects and the feelings of joy from recognition or respect from peers thus leading to a promotion to a higher position, monetary raises, and authority over others. In The Tragedy of Macbeth, Macbeth is Thane of Glamis. This social title indicates him as a baron. This is a position in the upper class of aristocracy that includes owning a castle and lands. In addition, his valuable and heroic contribution as a valiant soldier in a recent battle has given him respect and recognition among his peers. This furthers his advancement and success by King Duncan, thus granting him an additional title, Thane of Cawdor. However, the problem with Nietzsche’s belief, no matter how fitting, is that it is an unsound argument because it is a hasty generalization. Not â€Å"all creation† seeks to â€Å"affirm ourselves, to flourish and dominate† (122). For example, take a person in today’s society who is offered a promotion. This promotion comes with a more responsibilities such as, managing a department of people. It is quite possible that this person is currently happy with their position and does not wish to have the extra responsibilities of exercising control over other staff members. Therefore, in Nietzsche terms they do not want to â€Å"dominate† other people. It is an illogical statement to include all creation in the premise. Another problem in appealing to Nietzsche’s moral authority is that a person could simple disagree with his reasoning of good and bad. According to Nietzsche in Goodness and the Will To Power, Good is â€Å"all that heightens the feeling of power, the Will To Power, and the power itself in a man,† bad is â€Å" all that proceeds as weakness,† and happiness is â€Å"the feeling that power is growing, that resistance is overcome† (134). In Macbeth’s case, his desire for the crown and to remain in power led to him committing regicide, killing the groomsman, hiring murderers to kill his friend Banquo, and ordering the death of Macduff’s wife and children. While Nietzsche would agree that all of those actions are good, society would not look too kindly upon the act of murdering innocents. Even if a person has the credentials to be an authority of a subject, there should be ways of testing the truth or reasonableness of moral judgments. As a matter of fact, Macbeth would fail any test of happiness because he consistently had what Nietzsche considered as bad or weak reactions. For example, instead of being happy that his power was growing after killing King Duncan, Macbeth stated he was, â€Å"afraid to think what I have done† (2. 2. 64). His bloody rise to power to gain and secure the crown may of produced a brief flicker of pleasure but resulted in the enormous price of his conscious destroying him. This included insanity in where his guilt and paranoia led to hallucinations in such as severe nature that he couldn’t distinguish reality from fantasy. As I previously stated, people will remember a person at their funeral by how their lives summed up in the good or the bad that they contributed, and the actions took in doing so. Ultimately, Macbeth will be remembered as a man who committed regicide and a murderer of a woman, children, and his kinsmen. His lack of using rationality, common sense and logic led him to make terrible decision and began a vicious circle causing a chain reaction of horrendous acts and consequences resulting in the suicide of his wife and ultimately his own death. Overall, Macbeth’s desire for success and advancement became truly evil that had severe consequences on not just himself and his wife but of innocents. Works Cited Nietzsche, Friedrich. Beyond Good and Evil. The Moral Life: An Introductory Reader in Ethics and Literature. Ed. Louis Pojman and Lewis Vaughn. 4th. New York: Oxford UP, 2011. 121-134. Print. Rand, Ayn. In Defense of Ethical Egoism. The Moral Life: An Introductory Reader in Ethics and Literature. Ed. Louis Pojman and Lewis Vaughn. 4th. New York: Oxford UP, 2011. 531-541. Print. Shakespeare, William. â€Å"The tragedy of Macbeth. † Ed. Paul Werstine and Barbara A. Mowat. New York: Simon Schuster Paperbacks, 1992. Print.