Monday, September 30, 2019

Eustress Is Your Friend

Eustress is your Friend Not all stress is bad. There are positive effects of stress and it has its own unique characteristics. When it comes to feelings such as anxiety, worry, fear, pain or anger then these are linked to negative stress and this is what many people associate stress with. However, the positive effects of stress are something that can help motivate individuals to accomplish something good. Positive stress helps an individual to make any necessary changes in their lives. So therefore, in my own personal opinion, stress is not such a bad thing. According to thefreedictionary. om, eustress by definition is a positive form of stress. Eustress is a balance between selfishness and altruism through which an individual develops the drive and energy to care for others. This refers to the constructive stress that helps keep you motivated and driven in all aspects of your life. For example, positive stress gives us a feeling of excitement when presented with a demanding situatio n in an area in which we are comfortable like runners on the track, taking a ride on the roller coaster, taking up a challenging project at workplace. Positive stress may fill you with energy to tackle the demands of your task. Positive stress helps to keep us healthy and fills us with contentment. Eustress also reminds us that we can view many of the stressors in our lives as ‘challenges' rather than ‘threats', and have extra vital energy to handle these stressors, without a feeling of being overwhelmed or unhappy. There are many positive effects of stress including the ability to realize when things are wrong and need to be fixed. Positive stress also helps our body tell us when we need to do things such as put a sweater on when it is too cold, scratch an itch, move to a new location when necessary and other needs of everyday life. Positive stress is also an excellent way of initiating the invention and problem solving process by providing more creative solutions. As a result positive stress has been linked to many scientific discoveries, technological advances and creative designs. Positive stress can also help us to know when we need medical care by altering us to when we are experiencing discomfort or other medical concerns. There are many examples of positive stressors. College students face a major stressor at the end of semesters. For instance, Megan is a freshman in a local community college. She is the first in her family to attend school at this level. Her schedule is overwhelming but it is to be expected in order to obtain an associate’s degree. The semester is quickly closing in and Megan is having difficulties with her math class. She is already maintaining a C average and in order to pass, she must make an A on her final. Megan knows that she is feeling stress about this final but realizes that she needs to buckle down and concentrate. Approaching exams enhance a student's concentration and learning capability. Therefore, this stress she is feeling is considered a ‘eustress. If Megan is able to obtain an A on this final, she will pass the class. But in passing the class, Megan will also be able to advance into the next math needed to obtain her degree. In the end, the stressors that Megan is dealing with will have positive effects on her life and future. Stay-at-home moms may seem to have an easy job, but in reality, it's a wonderful job that includes q uite a bit of stress. Many people may think that the life of a stay-at-home mom is all Everyone has their own personal opinion in regards to this statement, ‘Stress is always bad. I feel that stress always begins as positive stress. You just have to be willing to give your best and try to step up to the challenge. Almost all of the life’s important moments are experienced under positive stress. Your positive stress can turn to negative, but you must be willing to accept responsibility for the role you play in creating or maintaining that stress. So in my own personal opinion, I would have to disagree. Stress is only considered bad if you handle and cope with it badly. In the end, stress isn’t always bad.

Sunday, September 29, 2019

Community Health Assessment Essay

Riverside County is a vast geographical area in Southern California with a diverse population. It represents a melding area of different cultures, ideals and median income, resulting in a community full of variety. Geographically, Riverside County covers 7200 sq. stretches eastward from the Orange County border of Southern California to the border of Arizona. There is a variety of climate within the county, as it includes a section of the Cleveland National Forest including Mount San Jacinto Mountains with a peak of 10,800’ and the eastern portion of the county is made up of the arid Mojave and Colorado deserts. (Wikipedia) Population Economic Status Assessment The population of 2.3 million is made up of 46.5% Hispanics, 7% African Americans, 1.9% Native American’s 6.6% Asians and 38.5% whites. 27% of the population is made up of those under 18 years old, over 12% is over 65 and over 7% is under 5 years. Over 50% of the population is female. (Citydata) Healthcare challenges include a large population of Spanish speaking immigrants that often lack an understanding of resources available. There are over 54,000 people in the county enrolled in Low Income Health Plans but over 15% of the population, 620,000 people are uninsured. The county developed healthcare program for those individuals that do not qualify for Medi-Cal has 25,000 enrollees. In 2013 there were 33 reported non-business related bankruptcies filed, with a national average of 25% citing medical expenses directly as cause. Home sales peaked in 2008 in both median price and number of home sales. Following the recession, sale prices fell but has steadily risen since the end o f 2012, nearing the early high numbers. Neighborhood/Community Safety Inventory Several types of crime present problems for the community. In 2005 there were 39 murders, 115 rapes, 416 robberies, 1577 assaults, 3829 burglaries, 8215 thefts and 3910 auto-thefts. Over 15,000 people are incarcerated in Riverside County. (Citydata)There is significant drug problems in the county increasing crime and resulting in family disruption. The manufacturing of  methamphetamines plagues the area especially in the rural areas and desert regions, which make it easier to perform unnoticed. Drug related crime is common in the inner city areas of the county including Riverside City, Jurupa Valley, Banning, Moreno valley and Perris. Air quality presents the primary environmental hazard due to smog and other pollutants that often exceed the state averages. Ozone 1 and 8 hour exposure, PM 2.5, PM 10, Carbon Monoxide and Nitrogen Oxide levels all exceed the US average significantly. In 2005, Riverside County had the second highest levels of PM 2.5 and Ozone 8 hour exposure in the st ate of California. Other environmental hazards include heat exposure in the arid regions during summer months and the poisonous plants found in the region. Poison Oak, Oleander, Stinging Nettles, Jimson Weed and mushrooms are all poisonous plants identified in Riverside County. (Citydata) Vectors contributing to possible disease transmission include ticks, fleas, rats and squirrels. Plague has been identified in isolated squirrels, Hanta virus has been confirmed in mice and rats. The county does battle a considerable West Nile Virus risk with mosquito larva populations in stagnant water sources. (Vector) 2011 had 30,611 live births, with 2.9% late or no prenatal care in Riverside County. (CDPH) Birth rates have remained steady over the last ten years averaging 10-12 per 1000 persons annually. Deaths have followed a slight decrease in tend over the last ten years, as have infant deaths. Population growth has grown sharply over the last ten years, almost doubling the state average. (Citydata) Disaster As sessment Tool Because of the population makeup of Riverside County, with near half of Hispanic descent and many having Spanish as their primary language, there is a high likelihood that disaster response in this community will require a large Spanish speaking component. Another group that will require special planning for disaster response is the disabled. Riverside County has over 20,000 sensory disabled individuals between the ages of 21-64, 39,000 mentally disabled in the same age group and 55,000 physically disabled also in this age group. Because of the large immigrant population and the large number of imprisoned or jailed individuals, there is a higher risk for TB transmission which could affect persons staying at shelters in close proximity to one another during a disaster. Riverside County has a robust  Emergency Response Plan which is detailed in the two part document found on the Riverside County Fire Department webpage. The arid desert regions present flash flood risks when sudden rainstorms deliver water levels above that which the soil can absorb. Because of the overall arid environment, wildfires are a seasonal risk and have plagued the county considerable in recent years. The county is dissected by the San Andreas fault line, resulting in a 4711% rate of earthquakes over the US average. Natural disasters over the last 60 years include 22 fires, 15 floods and 7 severe storms. (Geology) Many of the rural areas of the county are adjacent to areas of denser population, and house communities based around having horses and other livestock. Disaster management in these areas will require additional resources and cooperation to facilitate moving personal animals, including horses, goats and other medium size livestock, to safe areas. These areas, usually possessing a strong cohesiveness, will likely work well together in such situations. Significant preparations have been made for notification of disast er information, utilizing state level disaster comms down to the local HAM radio operators, as well as satellite communications and personal cell phone notifications. Cultural Assessment Tool The majority immigrants come from Mexico at 66%. Just under half of the population identify with a specific religion at 43%, and by far the majority report as Catholic at 66%. Additionally 5% associate as Mormons, leaving 29% as members of all other religious sects and denominations. In all of California, Latinas overwhelmingly make up the group of mothers seeking late prenatal care, with white and blacks following. In 2002 this number was 41,000 for Latinas, 15,000 for whites and 5,100 for blacks. Riverside County has a considerable Lesbian, Gay, Bisexual, Pansexual and Transgender population at 70,747 persons. By far the most dense makeup of this group is in Palm Springs where the LGBPT population is estimated at 40% of the cities entire makeup.

Saturday, September 28, 2019

Cyberbullying Assignment Example | Topics and Well Written Essays - 500 words

Cyberbullying - Assignment Example It will also gather information on the students experiences with the vice and the extent of damage it caused. It will then gather their opinions on how well to address the issue. The modern day freshman is a victim of the new and insidious form of bulling that also involves social media. This research will focus on a quantitative study as the basis of the assessment of the prevalence of the problem. It will be informed by the actual opinions of the students based on the constructivist paradigm. The research will adopt a mixed methods approach to analyse the hypothesis that cyber bulling is a controllable concern among high schools in the United Kingdom. The mixed methods approach will allow the study to develop a complete picture of the research question. The triangular design will merge the qualitative and quantitative data as a means to understanding the research question. The embedded design in its part will create the auxiliary role of interpreting the quantitative data. The explanatory design will help in developing relationships and formulating solutions (Creswell, 2008). The students will be selected randomly from high schools across the nation and issued with open ended questionnaires and involved in interviews that will allow the researcher to document observations and also make content analysis. The sample size will be large to offer a more comprehensive result. This approach presents certain ethical limitations such as the relation between the personal opinions and the actual experiences of the students. The possibility of the students affecting their narration of the experiences with their personal opinion puts the research at the danger of being an analysis of opinion rather than experience. The approach requires the researcher to play the role of a moderator to the free flow of information. This, however, runs the risk of a bias by the researcher who may offer cues or leading information which acts to affect the

Friday, September 27, 2019

Strategic Management Procedures Case Study Example | Topics and Well Written Essays - 2500 words

Strategic Management Procedures - Case Study Example Strategic planning is viewed to possess many advantages in the management aspect of the institution. These advantages manifest as this approach generally maintains the focus of the group towards their objectives and goals. Also, strategic planning also ensures that the different factors involved in the group's action are indeed incorporated and be well regarded in their plan ahead of time. Management who uses this approach becomes fully aware of the things and aspect that must be dealt with thus minimizing the certain issues of uncertainty and disconcertment. In addition to that, the efforts of the groups are well distributed to all the works and issues that must be addressed thus, minimizing waste and worthless efforts. However, strategic planning also do posts several disadvantages to the group and this is mainly related to cultural changes and ambiguity in the plan. Commonly, strategic planning comes in contrast with prevalent cultural trend in a certain locality thus, this approa ch also require change and adaptation when it comes to its implementation. Another is the ambiguity regarding the planning part where the strategy is mainly formulated with underestimation and overestimation, coordination failure, failure in following the created plan, resistance to the implementation of the plan, and others. If critically analyzed, it is evidently true that the advantages of strategic planning do outweigh is disadvantages regarding the achievement of the goals and objective of the group. The main roots this approach flaws can actual be viewed to be in relation to the culture trend and the planning itself. Strategic planning is indeed relevant because it can actually focus the efforts of the groups to the objective and keep all pertinent issues and aspect at perspective however, the plan itself must be created with the participation of every individual in the group for it for efficiently function. The group itself is composed of different individual and that their presence and support is indeed valuable thus they must all be regarded in the aspect of planning. If this concept if significant implemented in the formulation of the strategic management approach then the said value can actually be advantageous for the group towards the achievement of their primary goals and objectives. Case Based Analysis Today's business world is totally different form what the business industries were about ten years ago. Indeed, with the introduction of Information Technology to the globe, along came the different innovations for the business activities in the present system of global trade. This is the reason why many traditional organizations take the option in changing the way they approach the business world in attaining their goals of gaining profit. Among the corporations usually changing their systems are publishing business corporations. This is mainly due to the fact, that with the business of information distribution, a larger scale of customers is needed to support the said industry. Surely, with the traditional set up of business industries, a corporation's aim of reaching the most number of customers may not be that possible. But because of the emerging of virtual business and e-commerce, reaching a worldwide range of different customers had been possible for publishing companies in t he present

Thursday, September 26, 2019

Write a paper which reflects your understanding of the relation Essay

Write a paper which reflects your understanding of the relation between religious views of creation and the way that humans based on these views think - Essay Example The definite stand of Christian left for instance, is to go for same-sex marriage, has become controversial, contrary to the Christian right’s beliefs, but this group has remarkable explanation appealing to the human intellect and reason for justification. According to the Christian left, God has created everyone equal and it is the ultimate goal of Jesus Christ to liberate the oppressed and give freedom to those who are in bondage of sin. From their own interpretation of some Biblical texts associated with this thought, Christian left remakably reflected that Jesus would want to end the oppression against the third gender, and so legalizing the same-sex marriage as they believe would substantially end the repression against the homosexuals. Christian views nowadays are therefore trying to create a way to justify the human actions, unlike from the past which the literal interpretation of the Bible was most likely emphasized. Today, Christian views are still remarkably placing higher authority on God’s Word, but some views are susceptible to create justification leading to the belief system that is highly intellectualize and rich in substantial reasons. However, no matter how diverse these doctrines are, Christians have been united with the basic idea that God from the start would want to ensure a good plan for his creation, but as the humanity failed, he wants restoration and this was made possible through the death of Christ at the cross. This is the basic foundation of the Christian belief, as Christians remain to believe that God is the ultimate creator and source of everything. Furthermore, as creator of all things, God allows calamities at present to inflict remarkable consequences and pains on the humanity. A Christian view concerning this may lead to the very characteristic Jesus would want to show to the mankind. With his

Wednesday, September 25, 2019

The Iraq War 2003 in Western media and public opinion Essay

The Iraq War 2003 in Western media and public opinion - Essay Example Although opinion polls indicated a shift in the British public opinion about the war, the public opinion did not actually change during the entire period. Though the polls conducted by different agencies in the UK indicated an increase in the level of support for the war, it did not reflect the true opinion of the public. The public opinion only appeared to change because of the shortfalls in the polling process. In any opinion poll, there are priority issues that can alter the respondents’ answer depending on the way they are presented. If such priority issues are overshadowed by time or other events, the pollsters can ignore them in subsequent polls. For instance, in the British case, the pollsters left out the key issues because of time and other events that had occurred. Thus, if it were possible to incorporate the key events in the polls disregarding other events that had occurred, the polls could have otherwise suggested a different result. Apart from ignoring the real i ssues that initially determined people’s attitude, opinion polls possibly misidentified the respondents’ support for related issues as the support of the war. For instance, a respondent could have identified with one side of the conflict for personal reasons without necessarily supporting the war. In such situation, the polls deceptively indicated the support of the war. As a result, the outcome became unreliable. According to Baines and Worcester (2005), the public opinion changed during the war because of three major reasons.

Tuesday, September 24, 2019

Battle of Algeria Essay Example | Topics and Well Written Essays - 500 words

Battle of Algeria - Essay Example Instead, it brings out the working practices of institutional structures, the aesthetic strategies associated with that as well as related cultural politics. One good example of Third Cinema is The Battle of Algiers, which is a departure from the characteristic Hollywood style of drama. In its creation of a false sense of documentary, it makes use of simple tools. It has a background of the reporting styles of the 1960s. The production employs such tools as a flashback narrative structure, grainy black and white stock, handheld camera, zoom lens as well as long lenses. The film achieved both commercial success as well as an aesthetic success. Its success at the Venice Film Festival surprised many. It received a lot of praises especially in Europe and the United States. The climax of the success, it enjoyed globally was the eleven cinema awards it won between 1966 and 1967. During that time, it also got three Oscar nominations. The Battle of Algiers was a 1965 production of Italian director Gillo Pontecorvo with cooperation from the revolutionary government of Algeria. The film goes against conventional Hollywood procedures. Shooting in a studio with the use of popular professional actors was not a consideration. Instead, it uses a real life set up with only one actor. That led to its classification as a quasi-documentary. The choice of scenes for the film serves Pontecorvo’s objective. His aim is to give it a realistic touch. The film captures Casbah, a traditionally Muslim part of Algiers, as the scenes are in its marketplaces and narrow streets. Jean Martin, the only professional actor, plays the role of Colonel Mathieu. The fact that the producer was Italian may have led to the film’s similarities to Italian Neo-realism. Pontecorvo elects to use simple equipment so as to create a visual effect similar to that of a documentary. The

Monday, September 23, 2019

Recollection. Socrates Essay Example | Topics and Well Written Essays - 1000 words

Recollection. Socrates - Essay Example According to Socrates, the body acts as a prison confining the souls. In this state, the soul is limited in its quest to explore knowledge which is unchanging, unpredictable, and eternal. This is because when the soul is imprisoned within the body, it is forced to explore truth through the reception organs of the body which has its deficiency that prevents the soul from seeing what is real (Plato and Jowett 70). This article presents a critical response of the argument that Socrates puts forth for supporting his premise - since learning is a by-means of recollection, the soul must have existed separately before being joined to the body. Step in Socrates Argument Socrates shows that it is possible for the soul to exist before the body. He explains this through the theory of recollection. He bases his argument on the fact that it is possible for a person to give a correct answer when asked a question which he may not have had prior knowledge about the issue. This implies that people ar e born with some knowledge within them, and this means that the soul or the mind existed before birth. He illustrates this in a number of steps. First, he gives his opinion on how it would be wonderful if the soul is dissipated to nothingness in death. This is because death would be an eternal sleep undisturbed with worrying dreams; death would be a big blessing to humankind. But he argues that this is not the case. He illustrate that the soul is immortal existing before birth, and it continues to live even when the mortal body dies. He says that the belief in dispersion of the soul is a childish belief. He initially shows the immortality of the soul by outlining the cynical argument. He asserts that if it is true that the living originated from the dead, then it must be that the souls of people live in the other world. If they did not, then it would not be possible for them to be born again. He further gives examples of how opposite originates from the opposite (Plato and Jowett 71 ). For example, hot from cold, awake and asleep, up and down. One has to fall asleep in order to wake up, cold things can become hot and vice versa. This means that opposite must come from the opposites. This means that for the life to come from the dead there should be some aspect of life in the dead. He thus concludes that the dead are generated from the living through the process of death. The living, on the other hand, is generated from the dead through the process of birth. It is therefore prudent to conclude that the soul of the dead must exit somewhere when the person dies and they come back to the living when a new child is born. From this Socrates affirms his theory of learning through recollection. This is due to the fact that the soul has been reborn several times and has lived in this universe for many years; therefore, it has amassed a lot of knowledge. He concluded that all learning is just but recollection and no new knowledge is added to the mind since the soul knows it all. He further illustrates this through the use of the Mono slave boy who showed to have geometric knowledge even though they had not had this kind of learning before. He thus asserts that the body and soul are two separate entities. The body, he says, is mortal and after death is seen as the corpse. The soul, on the other hand, is divine, immortal and invisible; therefore, it outlasts the body. During the period when the soul is separated from the body (after death before rebirth), the soul is able to see life in its fullness without being limited by the body (Plato and Jowett 72). Socrates therefore sees death as a form of liberation which, for a philosophical mind, is a major

Sunday, September 22, 2019

Irans Nuclear Ambitions Essay Example for Free

Irans Nuclear Ambitions Essay Behind the Irans Nuclear ambitions lay the fundamental issue: Do third world countries have the permission and the right to develop and enrich all nuclear technology including enrichment of nuclear material? Iranians Iranians claimed that they have the right to develop and enriching the nuclear material as authorized, and they would not tolerate the prospects of abdicating their right of enriching uranium which is abundant in Iran as allowed in the Non Proliferation Treatys article 4. Iran has repeatedly claim that their purpose of enriching nuclear material is always for the nuclear reactors which will provide much needed power, as Iran is already spending billions of dollars on gasoline imports. Iran also say that it has abide by all the regulations of NPT, and in 2004 it signed Paris Agreement with France, England and Germany the European Union Troika (EU-3) and as a result of which it has temporarily suspended its uranium enrichment as agreed during that Paris Agreement. Iranians also argue that under the regime of Shah which is the ally of US at that time, Washington firmly supported plans of Iran to build up to 23 atomic reactors by 1994. United States The United States asserted that Iranians are not trustworthy and their enrichments clearly intends to the development of Nuclear weapons. US often says that Iran is also the number 2 producer of oil in OPEC and also sits on the second biggest natural reserves, which is enough to make desires for enriching nuclear material suspicious. United States also points out that one set of risk is that it will set off a falling domino sequence of proliferation in the region, and Egypt, Turkey and Saudi Arabia as those countries that might feel that they should pursue their own nuclear program in response, which will start a nuclear race in the region. Americans also believe that a militant, oil rich Muslim theocracy of around 70 million people, with a Holocaust denying president who yearns for Israels disappearance and calls America and Britain the greater and lesser Satans, poses a great sort of problem. Another problem is the bold Iranian problem which will bring the world into danger by Iran arming terrorists with nuclear weapons that will bring the whole world into danger especially American and Israelis. Russians and Chinese Moscow says that Irans plans to develop a full atomic fuel cycle and to enrich uranium for its nuclear reactors are not economically viable. The head of Russias Atomic Energy Agency said that he has a technically proven data that tells that Iran plans to build 10 reactors worth 1,000 megawatts each is not the most feasible option but is rather ruinous. But Russians and Chinese have always not backed any movement by the US that undermine Irans capabilities to develop Nuclear Fuel but also Russia and China along with other countries that have economic interests in Iran such as Britain, France and Germany have stepped back from any direct confrontation with the US. All of these powers have voted for the IAEA resolution in February to refer Iran to the UN and then in March for a non-binding presidential statement in the UN Security Council setting a 30-day deadline for Iran to cease uranium enrichment. In all likelihood, Moscow and Beijing will again seek to mollify Washington in forthcoming meetings on Iran and try to limit the scope of any UN actions on Iran.

Saturday, September 21, 2019

Theatre HL Theatre Arts Research Investigation Essay Example for Free

Theatre HL Theatre Arts Research Investigation Essay Research Question: Which methods could a theatre company use while performing Jean Anouilhs Antigone, keeping true to and supporting the style of the Theatre of the Absurd? Theatre of the Absurd is a term that was coined by Hungarian-born theatre critic Martin Esslin, who made it the title of his 1962 book on the subject. It is refers to a particular style of theatre and the work of a number of mainly European playwrights, mostly written in the 1950s and 1960s. These plays are all related through the theme of the Absurd, first presented in this way by the French philosopher Albert Camus in his 1942 essay, â€Å"The Myth of Sisyphus† in which he deals with the meaninglessness and absurdity of the human existence and states the belief that life has no purpose. Subsequently he poses the question if the realization and acceptance of this fact must necessarily result in suicide. You can see a clear reflection of this thought in Esslins definition of the Theatre of the Absurd as that which â€Å"strives to express its sense of the senselessness of the human condition and the inadequacy of the rational approach by the open abandonment of rational devices and discursive thought.† The most well-know absurdist playwrights are Samuel Beckett, Eugene Ionesco, Jean Genet, Harold Pinter and Arthur Adamov. It is believed that the uprising of this philosophical movement during this specific time period was triggered by the death, grief and pure misery brought upon the people by World War II, which demonstrated the total brevity of any values and emphasized the precariousness and arbitrariness of human life. The population of Europe had been experiencing terror, hunger and disease on such a traumatizing level of the trench warfare and the holocaust, that they lost all hope in humanity and faith in their god. Thats why this philosophy of meaninglessness developed because people failed to see any reason in life anymore. The psychic trauma of living under the threat of nuclear annihilation has probably also had a great effect on the development of this new form of theatre. Although World War II is thought to have been the catalyst for his movement there are a number of predecessors which are thought to have contributed to its development. Theatre of the Absurd is thought to have originated from the ancient Greece between 550 and 220 BCE from what was know as Old Comedy, particularly from playwrights such as Aristophanes. In Old Comedy there was a satirical treatment of domestic situations and myths on society, politics, literature and the Peloponnesian War that was happening between Athenian Empire and the Peloponnesian league, led by sparta. The Absurdist plays share many of these most important characteristics: extensive comedy, mixed with horrific or tragic images; unconventional dialogue full of clichà ©s, wordplay, and nonsense; characters caught in hopeless and illogical situations forced to do repetitive or meaningless actions; plots that are cyclical or absurdly expansive and either a parody or dismissal of realism, in attempt to reflect the absurdity of human existence. The aim of absurd plays is to startle, confuse and shock the viewer, waking him up from his boring and conventional life of everyday concerns. The Theatre of the Absurd was something completely new and rebellious to the viewers and was indeed, like some of the playwrights liked to call it, anti-theatre. It was surreal, illogical, conflictless and plotless. The dialogue was total baloney and seemingly without meaning. Unsurprisingly, it was first received with disapproval and lack of understanding. Jean Anouilhs play Antigone, originally produced in Paris in 1942, is a tragedy inspired by and adapted from the ancient greek classic Antigone by Sophocles which was first performed in Athens in the 5th century B.C. The changes he made to the plot, may seem slight in some cases, but create a very different work and theatrical experience with a new taste of political and moral criticism. The main difference is that in Anouilhs version, from the very beginning, a member of the chorus steps forward to perform the prologue, introducing the audience to the plot and the characters of the play. Anouilhs chorus has a very different purpose though than Sophocles had and is of vital significance for the play, ceating a detachment from the play at times in order to address the audience directly. At one point he indicates the difference between melodrama and tragedy, suggesting that Antigone be part of the latter, meaning that her fate is clear and unavoidable. Walter Ince, asks the following philosophical question with an absurd feeling, responding to Anouilhs tragedy: â€Å"If life evokes such complete hopelessness, where is the tragedy in leaving it?†. When performing this play while applying absurdist theatre techniques, we want to keep this feeling of hopelessness alive and demonstrate the absurdity of life. Anouilh has already created a slight absurd feeling making things easier already. His sophisticated distancing of the plot and constant reminder to the audience of the fact that they are merely watching actors in a play seems to me very absurd and â€Å"anti-theatrical†. I imagine this would confuse the viewer and alienate, maybe even irritate and annoy the viewer, as it definitely did in the time of the original performance. Additionally, applying some of the standard absurdist techniques such as having the characters repeat meaningless actions or make the situations seem hopeless absurd. Especially aspects from the play that already seem slightly absurd should be promoted, such as Queen Eurydice knitting until she goes to her room and dies or the three guards that play cards, completely oblivious to the tragedy enrolling before them. On that point, the director would have to decide if he wants to stay true to Anouilhs original text or if he wants to change the dialogues, in which case one could take the meaning out of conversations or insert nonsensical sentences, make the characters talk past each other, without completely losing the plot. The stage setting could be either overly surrealistic, further contributing to the audiences confusion or completely simplistic going as far as not having a setting at all, further emphasizing the anti-theatrical aspects and adding to the alienation of the viewer. Sources: Carlson, Marvin. 1993. Theories of the Theatre: A Historical and Critical Survey from the Greeks to the Present. Expanded ed. Ithaca and London: Cornell University Press Ince, Walter. 1968. Forum for Modern Language Studies: Prologue and Chorus in Anouilhs Antigone IV, pp. 277 – 84 Freeman, Ted. 2000. Antigone: Commentary, Anouilhs Antigone. Methuen Drama Student Edition, London, Methuen Publishing

Friday, September 20, 2019

Education Essays Distance Education Learning

Education Essays Distance Education Learning Distance Education Learning Information Technology and Distance Learning Introduction Distance education, or distance learning, is a field of education that depends on the Information technology, and instructional systems that plan to provide learning to students who are physically not present in a class room setting. In stead of attending courses personally, teachers and students communicate at times of their convenience and choosing and exchange printed or electronic material through any suitable technology. Online education can be as recognized as a tangible and interactive learning experience through which students can earn even a doctoral degree. Virtual classrooms use the internet to have a mutual multimedia experience where one can have video conferences, video lessons and other stimulating learning prospects. Concept f distant learning is not new as it was University of London that first offered distance learning degrees, establishing its External Program in 1858[ Key Facts]. Distance learning is the delivery of instruction and the fulfillment of course work from remote locations; allowing instructors and students to interact without being in the same place. New technologies have made distance learning an increasingly popular option for institutions and students alike. The Internet, e-mail, video conferencing, and other interactive systems allow schools to experiment with unique modes of teaching and learning, use resources that do not reside on their own campuses, and attract faculty and students who are far from campus or cannot travel to campus very often. The first Open University is United Kingdom Open University (UKOU) that was established in the late 1960s and initially utilized television and radio as its main methodologies. Now a days almost all open universities use distance education technologies as basic teaching approach [Moore, Michael G (33-36)]. Advantages of Distance learning Although there is no substitute for regular education system but distance learning is contributing considerably in the field of education. A distance learning program has a number of advantages. It provides opportunity to the learners to have little interference in the professional life. It is an excellent alternative for those who look for improving their careers or who require some special form of training. Online distance education is rapidly increasing among mainstream universities in the United States, where online doctoral programs have even developed at prestigious research institutions [Hebert, D. G.2007]. Some people who work cannot afford to spare time for regular classes and at the same time need to enhance their skills for further development in career. Some people who want to study in prestigious institutions and do not get opportunity to physically join such institute for want of finances or inter government permissions also make us e of this system to obtain the required education. Distance learning can offer them experience to learn through new technologies, methods and approaches and gain knowledge and practical experience. Distance learning programs are easier to be planned as it needs a smaller amount of time and commitment. Distance learning programs present more geographic flexibility. They also offer introduce the learners to students of various origins and afford them an opportunity to have interaction. Distance learning programs offer access to faculty in many different locations where as class work can be scheduled according to personal and professional availability. Distance learning does not involve travel and saves time that otherwise was to be spent on going and driving back. A learner can complete a large amount of the classes at convenience. Most of the classes under distance learning programs don’t require even to attend a session at a particular time and place. A learner can do and review the assignments and can do homework at its convenience. Distance learning programs make it extremely comfortable for ladies in particular and parents in general that have kids. This allows such parents not to look for care arrangements because they can take of both kids and classes from home at the same time. Information technology made the whole affairs very easy as online classes solved all possible convenience concerns. It is extremely useful for disabled persons and senior citizens who feel it hard to attend customary regular classes. They now are not much worried and concerned about having access to a classroom. Instead they can use comfortable settings in their home making the learning environments more convenient. As a result people with restricted mobility also have a chance to develop their education and shills. Virtual education is now an integral element of the planning by most institutions and training organizations. The worth of distance learning has greatly improved over a period of time in last many years, because both students and educators feel more relaxed with the technology. While quality of distance learning has improved at the same time distance learning programs also significantly increased. It is heartening to find out that distance learning organizations are now being fully recognized by the proper government agencies. The objective of official approval is to make sure that education provided by such virtual institutions meets satisfactory standard of excellence. Distance learning offers a number of advantages and opportunities for non resident students from other countries seeking an accredited degree of some high standard institutes. Possibly the most pertinent advantage involves easy approach of learning as a result keep away from the hassle of applying for a student visa to study in a specific country . Distance learning provides geographic flexibility to study in any convenient location with an internet connection and involves setting self tempo for learning [Distance Learning MBA]. Through use of technology it becomes easier to quickly look through study materials and can be well mastered. Distance learning is so designed that it allows a learner focus more strongly on curriculum, time and effort in fields that contain new information and proficiency. Distance learning also allows a learner to obtain study materials at convenience and amount at a faster speed against that of slow pace of the normal classroom settings. The learners join conversations in the communiquà © board discussion areas with flexibility and get instant feed back in form of reviews from online classmates’ comments. Distance learning is just in time learning method that offers prospect to study the up to date study material available. The most significant feature of distance learning is helping students to do well in Web base classes by creating ability to administer and manage time. A normal student can easily spend 2 to 3 hours each week for every one hour of credit for a class. Disadvantages of Distance Learning Where Distance learning has a large number of advantages it posses some inherent weaknesses as well. Basic aspect being that it is not for everyone, since it presents inadequate or rather no physical contact with associate classmates and staff. It also does not offer any social interaction and its all formal [Randall S. Hansen, Ph. D]. Distance learning at the same time does not offer the networking chance making distance learning a less vital option for career development. It is also not a good choice for someone who works in better interactive environment. The distance learning does not contain analysis of personality of a student as career placement. Distance learning programs do not offer all study disciplines making choices very limited since the technology and form of learning are comparatively new and does not go with all requirements of curriculums. Distance learning programs do not offer scholarship because learners are expected to work during the program over a long time with no much expense. Where as the distance learning is costly and involves intricate technology. Regardless of the lot of openings through distance education, there are foreseeable associated costs. Live video communication requires cautious setting up of the equipment and services. For online learning a computer with accessories and link to the internet and camera is essential. Both the instructors and students require much advance planning and while joining distance learning may require adjustments of normal activities. Distance learning does not offer realistic feedback. In a usual classroom situation, a students routine can be right away reviewed during questions and informal tests. But With distance learning, a student gets instructor’s feedback till the instructor has evaluated the work and sends a reply to. As distance learning does not always offer all the necessary courses online many students desirous to obtain specific certificate or degree program may not attain the required qualifications. No discipline requiring practical can be offered through online programs as one can study a biology lesson completely online, but cannot perform clinical practical online. Although the majority of employers do recognize distance learning but certain employers do not. Students who desire to work for an employer after graduation are required to be certain of such employers viewpoint about online distance education. Another weakness associated with distance learning is that it does not provide the learners any opportunity to work on spoken communication ability. Although it is some what possible with voice chat or conferencing but is still quite tough to understand in a voice conference settings. More over learners in distance learning courses do not get sufficient practice of verbal interaction with professors and other students though written ability improves. Challenges and Future of Distance Learning Distance learning is becoming increasingly a leading study approach particularly in office and workplace education settings in organization of different fields and dimension. Universities all over the world are improving their techniques of edification and considering enduring education and eventual learning as an essential element in teaching learning environment. Almost all education institutions of that level are using Information and Communication Technology as a means of knowledge delivery. Customary learning is also being restructured in the form of virtual learning or web-based knowledge. In countries where education is one of the neglected field distances and technology-based education is given least precedence. The large educational institutions and those who are involved in rule making do not think towards this end. Such countries face noteworthy challenges to make a way through new challenges in modern education with their ever growing populace, remoteness and vast scattered areas with non availability of modern information technology resources and limited funding as well. Despite the difficulties, where nations have a will to progress make their educational institutions expand sufficiently to accommodate the increasing number of on line students who will be looking for admission in such kind of education. Introducing web-based learning being one of the predictable solutions will continue to expand in future as well. Challenges to distance learning are normal components of any system, method, practice and without challenges there is little or no scope for perfection. Distance learning is widely used in developed countries to support education and eventual learning. This approach will continue and will be adopted by those countries as well which are not yet developed. Distance learning will remain distinctive in future as well as an innovative approach for electronically delivering, well-designed, learner oriented at anywhere, anytime through use of the internet. Distance learning will remain as part of E learning , web based learning through virtual classrooms and digital teamwork, where contents will continue to be delivered through internet, audio, video tape, and conferencing through video; satellite and etc(Hedge 2004:128-145). T he rapid and intense use of Information and communication Technology in education will continue to play a role in developed countries facilitating them to establish more and more information and communication technology based universities. Although the arrangement of information and communication technology in the developing or the least developed countries is very weak and thus, concentrated use of e-learning in Distance Education is still a dream for their high education universities (Toor 2005: 67-76). Conclusion Although distance education is not a new trend, but has got a huge increase due to developing technology. Distance education delivery will finally emerge as strong education approach with use of phone, desktop and TV at a same time in future. When distance learning commenced using information technology, it was not well accepted and the equipment needed to provide it was expensive. That has now radically changed. And technology is being well used in video, audio text, graphics, animation, and simulation. Distance education is undergoing huge transformation and has and will never reach to a stage of saturation as much is yet to be explored and presented in this field. New and well established institutions are coming up with latest equipment and large data base to provide distance learning to a growing population that wants higher education out of traditional classroom setting. Work cited Key Facts, University of London External Program Website http://www.londonexternal.ac.uk/about_us/facts.shtml Moore, Michael G.; Greg Kearsley (2005) Distance Education: A Systems View, Second, Belmont, CA: Wadsworth.  , (33-36) Hebert, D. G. (2007). â€Å"Five Challenges and Solutions in Online Music Teacher Education,† Research and Issues in Music Education, Vol.5 Web: http://www.stthomas.edu/rimeonline/ Distance Learning MBA http://www.mba.com/mba/FindYourProgram/ChooseAProgramType/DistanceLearning.htm Randall S. Hansen, Ph. D Distance Learning Pros and Cons http://www.quintcareers.com/distance_learning_pros-cons.html Hedge, N. and Hayward, L. 2004 â€Å"Redefining roles: University e-learning contributing to Life long learning in a networked world.† E-Leaning, 1: (128-145) Toor S K, 2005 â€Å"Hybrid Model for e-Learning at Virtual University of Pakistan† The Electronic Journal of e-Learning Volume 3 Issue 1, (67-76).

Thursday, September 19, 2019

Mother’s Last Days :: Personal Narrative Profile Essays

Mother’s Last Days Welcome to the Glenbrook Retirement Home. May I ask who you are visiting? Oh yes, you must be Mrs. Mitchell’s son. She talks about you so often. Right this way. Ignore the other patients peeking from behind their doors. Walk past them, down the long hallway. You are the outsider here. Don’t forget that; you are now the crazy one, not them. In this place, sanity is like a dream that you struggle to remember throughout the day. Scott, so nice to see you again. It’s been a while since your last visit. She asks about you every day. She’s just inside, go on in. How is she today doctor? Ask anyway, even though the answer never changes. Touch and go, really, no way to tell what will set her off. Honestly, she’s had better days. You don’t have to stay long. Just let her know you’re here and then you can be on your way. Open the door; that is the first step. Open it slowly, don’t frighten her. She is like a child, and you the careful parent. Try not to cringe as you walk into the small room that your mother now calls home. Try not to smell the musty odor that pervades everything. Try not to wonder what sort of purgatory you have confined her to. Who the hell do you think you are? Get out of my room! Doctor, doctor! Caress her hand as she whimpers. Stroke her wispy white hair and wonder why no one bothers to brush it anymore. It’s me, mom. It’s me. Deep breaths. Just start talking, that’s the only way to get through this visit. Tell her one more time who you are. Tell her one more time about her grandchildren, her grandchildren who are too afraid of her screaming fits to come with you anymore. Tell her about your job and your new house. Tell her all of these things so she can forget them again. Know that is all that she can do. I don’t know you. I’ve never seen you before. Away†¦get away from me. Tell her your name, tell her that you love her, that you’re here for her. Show her pictures of the kids, tell her about Lisa’s school play and Taylor’s soccer game. She was the star. He scored the winning goal. Stay for as long as you can this time, before saying, I really have to go now mother.

Wednesday, September 18, 2019

Review of Literature on Abortion in the Family Essay -- Abortion Pregn

Review of Literature on Abortion in the Family Abortion is a very controversial subject that has been continuously argued over for the past few years and probably for many more years to come. Women who are making the decision are effected emotionally, mentally, and physically since their bodies are going through many changes which it is not accustomed to. The main controversy is, who's right is it to abort? Many will argue and say it is the woman's right to chose what she does with her own body, but what about the father's right? The man's involvement in the abortion decision is not about the woman's choice, it is about his own responsibility to her and the child (Arthur 1999). There are two sides to this abortion topic: the pro-life, which is those who are against abortion altogether, and the pro-choice, or those who believe it is the woman's right to choose if she wants to have an abortion. These two groups offer different solutions to the problem. The pro-life solution is to have the child and basically live with him/her. They believe abortion is not an answer. The pro-choice solution is abortion because of reasons they feel are appropriate. When pregnancy is unwanted women perceive the choice of abortion as the least of three evils: abortion, adoption, or keeping the child (Smith, 2000). Pregnancy changes a woman's life, regardless of whether or not it ends in abortion. The woman making the abortion decision looks at a variety of relationships to help her make the decision. Often, she will discuss her options with a physician or counselor. If she does decide to get an abortion, there are many factors she will have to face. According to an article in Business 2.0, written by David Shribman (2000), women who have had abortions are at greater risk of suffering emotional and psychological problems which may interfere with their ability to concentrate, make decisions, and interact with others. As a result, it reduces the woman's level of job skills and employment opportunities. Post-abortion women are more likely to engage in drug and alcohol abuse, often as a result of the guilt and negative feelings held inside of the m after the abortion. This may prevent them from entering other meaningful relationships. They are likely to become pregnant again and undergo additional abortions and are more likely to never marry, more likely divorce, and m... ... Legal abortion may help parents limit their families to the number of children they want and can afford, both financially and emotionally. Many unwanted babies are abused, neglected, or even killed by uncaring or immature parents (Smith 2000). There is a lack of babies up for adoption because abortion is legal. Perhaps if abortion was illegal, women could go ahead with the pregnancy and then give the baby up for adoption. Abortion is a significant issue in society that has a lot of conflicts. There is still no conclusion because one can see this problem from many different perspectives. If a person supports a pro-life or pro-choice group, they cannot judge objectively if the other group has a different way of thinking. Society cannot judge pro-life activists as a group who have no respect for a woman's right. On the other hand, one cannot say that pro-choice is a better group because they are more aware of human needs. Society will never understand the feelings of a woman who has had an abortion unless they are in her place. To solve this problem, society needs to spend some time to think carefully and to weigh both sides of the issue to make the best decision possible.

Tuesday, September 17, 2019

Home Security System

ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM MIOR MOHAMMAD HAFIIZH BIN ABD. RANI UNIVERSITI MALAYSIA PAHANG ABSTRACT Nowadays, house security system becomes the best solution to overcome house intrusion problem when user is not in house. As we know, there are many types of house security system which is too expensive and difficult to use. For that reason, an effective house security system at low cost is built where user can also program the security system by their own.This project is focusing on developing a house security system with an active infrared motion detector which is controlled by microcontroller Intel 8051. The overall project is divided into two parts. The first part is concern on the hardware development where all electronics component are connected via the circuit design using wrapping technique. An active infrared, the magnetic sensor, and keypad are the input components while buzzer, indicator, and LCD display are the output components where it’ s all controlled by controller circuit. The second part is base on software programming to operate the hardware structure.Program for security system based on microcontroller Intel 8051 assembly language is assemble using ASM51 assembler to get the binary file thus, to load into external memory of the hardware structure via serial communication. The process of downloading and executing the program is done using HyperTerminal’s communication software to the microcontroller serial port. In order to achieve the best house security system, more detectors or sensors can be connected to the microcontroller output port where it can be reprogram by user using their personal computer at home. Read this  Chapter 2 – Why Security is NeededAs the result, the infrared motion detector is capable to detect motion while the microcontroller is capable to control the whole operation of the security system. CHAPTER 1 INTRODUCTION 1. 1 Background Motion detection is the action of sensing physical movement in a given area. Motion can be detected by measuring change in speed or vector of an object in the field of view. This can be achieved either by mechanical devices that physically interact with the field or by electronic devices that quantifies and measures changes in the given environment.There are two device of motion detection which is the mechanical device, and the other one is electronic device. In the mechanical device, a tripwire is a simple form of motion detection. If a moving objects steps into the tripwire's field of view then a simple sound device like bells may alert the user. Mechanical motion detection devices can be simple to implement, but at the same time , it can be defeated easily by interrupting the devices' mechanics like â€Å"cutting the wire†. While in electronic device, the electronic motion sensing such as motion detectors, can prevent such mechanical intervention.The principal methods by which motion can be electronically identified are optical detection and acoustical detection. Infrared light or laser technology may be used for optical detection. Motion detection devices, such as motion detectors, have sensors that detect movement and send a signal to a sound device that produces an alarm or switch on an image recording device. There are motions detector which employ cameras connected to a computer which stores and manages captured images to be viewed over a computer network.The applications for such detection are detection of unauthorized entry, detection of cessation of occupancy of an area to extinguish lighting, and detection of a moving object which triggers a camera to record subsequent events. The motion det ector is thus a basic idea of electronic security systems. 1. 2 Project objective The objective of this project is to build a house security system using microcontroller Intel 8051 based on active infrared motion detection. 1. 3 Project scope This project concentrates on a development of an active infrared motion detector for house security system.To develop the whole project, it consists of three methods which are the concept of security system, the electrical structure, and the software programming. The concept of security system is on the detection of movement using active sensor to trigger alarm controlled by the microcontroller Intel 8051. The electrical structure consist of two systems which are the active infrared circuit that used to detect or sense motion and the microcontroller Intel 8051 circuit, used to control the whole operation of the security system. While the software programming is base on the microcontroller Intel 8051 instruction sets.It contains a program design ed for a security system as an interaction to operate the electrical structure. 1. 4 Literature review Motion detectors are mainly used in security systems [4]. It is typically positioned near exterior doorways or windows of a building to monitor the area around it. Since motion detectors are so flexible and have so many uses, it offers feelings of protection and security for the average homeowner as well as commercial organizations [4]. An electronic motion detector is a device used to detect any physical movement in a given area and transforms motion into an electric signal.It consist of sensor that electrically connected to other devices such as security system, lighting, audio alarms, and other applications. Motion sensors are used in a wide variety of applications and as a result, many different types of motion sensors are available including the infrared sensor. Infrared sensors are widely known in the arts of intrusion detection and in fire or smoke detection. It is a device that often used in automatic light switches and security systems to turn on a light or to activate some other form of alarm or warning indicator when a person enters a monitored area [4].The infrared sensors have basically two forms: active and passive. [4] An active infrared detector includes a radiation source and an infrared sensor which is sensitive to interruptions in the radiation sensed from the source. [4] These detectors are used as intrusion detectors by providing a path of radiation from the source to the sensor in a place where the path is likely to be interrupted by an intruder. The proposed active infrared method of motion detection has the advantage of fast speed response of a relatively large sensor.This advantage permits simpler optical system design, especially for wide fields of view. Besides, it is insensitivity to mechanical and acoustic noise, which presents substantial problems in the passive infrared (PIR) sensors. Low production cost is another advantage of these active infrared detectors. [4] Passive infrared motion detection detects heat energy radiated or emitted by an object, such as a body of a person, moving across a field of view of a heat sensor of the motion detection system. It is generally use an optical ollection system and multiple sensing elements of alternating polarity to create a detection pattern in the volume of interest. PIR detectors employ a group of radiation sensors coupled through amplifiers to a logic circuit. The radiation sensors detect changes in ambient infrared radiation. The detection system has an electrical circuit operatively coupled to the heat sensor for producing a detection signal in response to the heat sensor detecting a change of temperature caused by the body heat of a person entering the detection pattern. PIR motion detectors are perhaps the most frequently used home security device. 4] Passive IR motion detectors are usually designed to provide an indication to an alarm panel in response to detecting IR that is indicative of motion of the object. The alarm panel is responsive to receipt of the breach indication to cause an alarm condition to occur. The other motion detector used in security system is an ultrasonic motion detector. It is commonly used for automatic door openers and security alarms [4]. It is inexpensive and can operate with narrow beam-widths. The ultrasonic transducers are the sensor that used in ultrasonic motion detector.It can be used to detect motion in an area where there are not supposed to be any moving objects. This type of motion detector is most commonly used in burglar alarm systems since they are very effective in this application [4]. In an ultrasonic motion detector, there are two transducers; one emits an ultrasonic wave and the other picks up reflections from the different objects in the area. The reflected waves arrive at the receiver in constant phase if none of the objects in the area are moving. If something moves, the received sig nal is shifted in phase. A phase comparator detects the shifted phase and sends a triggering pulse to the alarm.Ultrasonic motion detectors have certain advantages and disadvantages when compared with other types of motion detectors. The main advantage is that they are very sensitive and extremely fast acting. However, the largest problem with this type of motion detector is that it sometimes responds to normal environmental vibration that can be caused by a passing car or a plane overhead. Besides, the installation options on this type of motion detector are limited because ultrasonic beams are easily blocked by thin materials, including paper. False triggering is easily caused by reflections from blowing curtains, pets, and flying insects.While the passive infrared motion detectors offers problem where it can be falsely triggered by warm air movement or other disturbances that can alter the infrared radiation levels in an area. In order to prevent this problem, newer systems use t wo infrared sensors, which monitor different zones within a protected area. Logic within system triggers the alarm only when the two zones are activated in sequence, as would occur if a person walked through the protected area. For that reason, the purpose of using the active infrared as a sensor to detect motion for this project is surely on the advantage offers by the sensor.Its capability on detecting motion with a simple design at lowest cost is needed to build an effective house security system based on motion detection. 1. 5 Thesis outline Chapter 1 explains the background of motion detection, the project objective, the project scope, and the literature review of motion detector for security system. The concepts of motion detector are the major element as a guide for the development of the security system. Chapter 2 explains the systems involved for the development of the active infrared motion detector for house security system.The understanding of three systems which are the active infrared, motion detector, and house security system stated in this chapter needed for the development of the whole project. Chapter 3 focuses on the methodologies for the development of the electrical structure and the implementations of microcontroller programming. It gives a brief review on the concept of active infrared motion detector, the electrical structure for hardware development, and the programming for the operation of the security system. Chapter 4 discusses on the results obtained of the whole project.All discussions are concentrating on the result and performance of the security system. The discussion is valuable for future development of the security system. Chapter 5 discusses about the conclusion on development of the active infrared motion detector for house security system. The recommendations and modification required on this project is stated in this chapter for further development. CHAPTER 2 ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM 2. 1 Introduction There are two systems on a development of the active infrared motion detector for house security system.The first system is an active infrared motion detector and the other one is the controller system. The first system concentrates on a development of an active infrared motion detector. It is consists of three element, which are the active infrared, the motion detector, and the house security system. The motion detector circuit will be control by the second system which is the microcontroller Intel 8051 based system. The combination between this two systems will built a project called an active infrared motion detector for house security system. 2. 2 Active infrared (IR)Infrared is an electromagnetic spectrum at a wavelength that is longer than visible light. It cannot be seen but it can be detected. Objects that generate heat also generate infrared radiation and those objects include animals and the human body whose radiation is strongest at a wavelength of 9. 4 µ meter. Infrared in this range will not pass through many types of material that pass visible light such as ordinary window glass and plastic. However it can pass through, with some attenuation, material that is opaque to visible light such as germanium and silicon. The active infrared sensors use invisible light to scan a defined area.In active infrared systems, there are two-piece elements which are consisting of an infrared transmitter and an infrared receiver. There is a 3/8 inch infrared beam between the transmitter which is placed on one side of the trail and the receiver which is placed on the other side of the trail. The transmitter and the receiver can be separated by as much as 150 feet. The transmitter emits a beam of light into the scan zone. The light, which is reflected by the background returns to the receiver, which constantly monitors the scan zone. When a person or object enters the zone the infrared light is interrupted.It then sends a signal to the controller sys tem, which is wired into the door controls. One variation of this operating mode is called ‘background suppression’. This is when the receiver only detects a change in the reflected light when a person or object enters the scan zone thus causing a reflectance variation of the light, sending a signal to the microcontroller thus trigger the alarm of the security system. 2. 3 Motion detector A motion detector is a device that contains a motion sensor and is either integrated with or connected to other devices that alert the user of the pre-sense of motion.An electronic motion detector contains a motion sensor that transforms the detection of motion into an electric signal. The electric signal can be connected to a burglar alarm system which is used to alert the home owner or security service after it detects motion. An example of sensor that used in security system is an active sensor. Active sensors in motion detectors system are commonly used inside homes for a security system. An active motion detector emits optics or sound waves and measures feedback to detect motion. The simplest type of active motion detector is commonly used in commercial doorways to trigger a doorbell.A device is fixed to one side of the doorway, an optical sensor to the other. A beam of light will passes from the device through the sensor. When someone enters the establishment, the beam is broken, triggering the doorbell thus warn user for the intrusion. For that reason, active motion detectors can be purchased for home improvement security system. It is inexpensive devices that can add for more security to a home and provide peace of mind for home owners. 2. 4 House security system House security system is one of security that truly related to burglar or safety alarm system.Burglar and safety alarms are found in electronic form nowadays. Sensors are connected to a control unit via either a low-voltage hardwire which in turn connects to a means for announcing the alarm to el icit response. In a new construction systems are predominately hardwired for economy while in retrofits wireless systems may be more economical and certainly quicker to install. Some systems are dedicated to one mission; handle fire, intrusion, and safety alarms simultaneously. In common security system, the lights are triggered by motion gives the impression to user that someone is at home and able to see the burglar.Infrared motion detectors placed in house security system in crucial areas of the house can detect any burglars and alert the home owner or police. The first security system invented, house alarms were triggered by the release of a pressure button fitted into a door or window frame. This basic alarm was fundamentally flawed as the entire intruder needed to do to silence the alarm was to close the door or window. While various systems on the market ranging from inexpensive house security alarms to highly sophisticated systems requiring professional installation.All mode rn alarms are based on the same foundation, the electric circuit which is completed either when the door is opened or closed depending on the security system designed. The alarm is triggered when the circuit is altered and will not be silenced until a code is punched into the control panel. The most expensive and complicated alarm systems might also involve a combination of motion sensors and pressure pads to ensure even the most cunning intruder doesn’t get his hands on treasures. 2. 5 Microcontroller Intel 8051 The microcontroller 8051 is an 8-bit machine.Its memory is organized in bytes and practically all its instruction deal with byte quantities. It uses an Accumulator as the primary register for instruction results. Other operands can be accessed using one of the four different addressing modes available: register implicit, direct, indirect or immediate. Operands reside in one of the five memory spaces of the 8051. The five memory spaces of the 8051 are the Program Memo ry, External Data Memory, Internal Data Memory, Special Function Registers and Bit Memory. The Program Memory space contains all the instructions, immediate data and constant tables and strings.It is principally addressed by the 16-bit Program Counter (PC), but it can also be accessed by a few instructions using the 16-bit Data Pointer (DPTR). The maximum size of the Program Memory space is 64K bytes. The External Data Memory space contains all the variables, buffers and data structures that can not fit on-chip. It is principally addressed by the 16-bit Data Pointer (DPTR), although the first two general purposes register R0 and R1 of the currently selected register bank can access a 256-byte bank of External Data Memory. The maximum size of the External Data Memory space is 64K bytes.The external data memory can only be accessed using the indirect addressing mode with the DPTR, R0 or R1. The Internal Data Memory space is functionally the most important data memory space. In it resi des up to four banks of general purpose registers, the program stack, 128 bits of the 256-bit memory, and all the variables and data structures that are operated on directly by the program. The maximum size of the Internal Data Memory space is 256-bytes. The register, indirect and direct addressing modes can be used in different parts of the Internal Data Memory space.The Special Function Register space contains all the on-chip peripheral input and output registers as well as particular registers that need program access. The maximum number of Special Function Registers (SFRs) is 128, though the actual number on an 8051 family member depends on the number and type of peripheral functions integrated on. The SFRs can only be accessed using the direct addressing mode while the upper 128 bytes of the Internal Data Memory can only be accessed using the Indirect addressing mode. The Bit Memory space is used for storing bit variables and flags.There are specific instructions in the 8051 th at operate only in the Bit Memory space. The maximum size of the Bit Memory space is 256-bits. Bits can only be accessed using the bit instructions and the direct addressing mode. 2. 6 Summary The understanding on the elements of the systems involved for this project which are the active infrared, the motion detector, and the house security system is needed before proceed for the design and development process. This is important to ensure the project done according to the main idea of each part discuss in this chapter. CHAPTER 3 METHODOLOGY 3. 1 IntroductionThere are several steps to be applied in designing an active infrared motion detector for house security system. The relevant information is gathered through literature review from previous chapter. Data on motion detection and security system projects has been collected where the theoretical design is studied based on the motion detector for security concept. The understanding on the electrical structure for the hardware develop ment is needed for the design circuit process of the motion detector and the basic security circuit. The next is the hardware development according to the circuit designed.This process is just only being proceed if each part of the circuit being improved is valid, else, it will be repeated until it is valid as the theoretical. Once the hardware development circuits have the output as the expected, then, the comparison for both hardware and theoretical analysis will be done. Next is the step where software structure is developed for the security system to be interface with the hardware development. While the final step of this research is on applying the whole project to the real house entrance like doors and windows. 3. 2 The concept of motion detector for security systemFigure 3. 1 Active infrared motion detectors Figure 3. 2 shows the concept of an active infrared motion detector for a security system. In the active system each sensor consists of two housings. The first housing co ntains an infrared-emitting diode and an infrared-sensitive phototransistor as the infrared detector. The other housing contains an infrared reflector to reflect the infrared signal. When positioned in front of an entrance to a protected area, the two housings establish an invisible beam. Figure 3. 2 The concept of infrared motion detector for security systemA person who enters the area will interrupts the beam causing an alarm to be triggered. For this type of motion detector uses the basic concept of the active infrared motion detector. An interruption in the signal modulated pulsating beam transmit by an infrared diode while receive by an infrared detector will set ‘on’ or ‘off’ the alarm of the security system. 3. 3 Hardware development Figure 3. 3 Block diagram for the house security system The hardware development is divided into three stages as shown in block diagram above. The inputs stage of the security system is the motion detector circuit, keypa d, and magnetic sensor.The second stage is the controller unit which is the microcontroller Intel 8051. The purpose of using microcontroller is to control the whole system operation by sending data to the output stage which is the LCD display, indicator, and buzzers. 3. 3. 1 Motion detector circuit In designing the infrared motion detector circuit, it is based on two basic principle of active infrared motion detector which is the infrared transmitter and infrared receiver as shown in Figure 3. 4. Figure 3. 4 Basic principle of infrared operation 3. 3. 2 Infrared transmitterFor the infrared transmitter which is also known as emitter circuit, it is on a basic design of timer 555 astable operation. The output of timer is connected to the infrared transmitter is used to produce pulse using an astable timer circuit. In astable circuit operation, pulse will continually generated until the power supplied through the circuit is removed. The astable circuit produces a continuous train of pul ses at any frequency required. This means that the 555 timer can operate repeatedly; it will switch ‘on’ and ‘off’ continually to generate data for the infrared transmission. . 3. 3 Infrared receiver The infrared receiver which is also known as infrared detector receives the data transmitted by the infrared transmitter circuit. It is a simple electronics device on detecting infrared signal. This infrared detector can be directly connected into the controller circuit to produce logic high ‘1’ or low ‘0’ from the output terminal thus activate or deactivate the controller system operation. The range of infrared detector components according to datasheet stated that the infrared detector can fully operates on detecting the infrared signal of 38 to 45 kHz. . 3. 4 4 ? 4 hexadecimal keypad The purpose of using 4 ? 4 hexadecimal keypad in the project is as an input where secure code entries to activate of deactivate the security system ope ration. The keypad provides eight interface pins, where one pin for each row and column of the keypad matrix. This 4 ? 4 hexadecimal keypad is connected to the keypad encoder (MM74C922) to control the keypad bouncing in the hardware development. 3. 3. 5 Keypad encoder (MM74C922) The MM74C922 key encoders provide all the necessary logic to fully encode an array of 4 ? hexadecimal keypad. It is used to encode the data received from the keypad code entry thus convert into binary code. These binary code is in hexadecimal number is required in data bus of the microcontroller system. Figure 3. 5 Interaction between keypad, keypad encoder, and octal buffer The figure 3. 5 above shows the block diagram on the interaction between the 4 ? 4 hexadecimal keypad, keypad encoder (MM74C922), and the octal buffer (74LS244). The keypad is used as a switch to give logic configuration to the keypad encoder.While the encoder will encode the data configuration from the keypad into the binary code based on datasheet of the encoder. These binary codes will be stabilized using the octal buffer to be process in the microcontroller system. These data will be process by the microcontroller thus running the system operation based on software designed for the security system. 3. 3. 6 Octal buffer (74LS244) A buffer is simply a unity-gain amplifier, usually with very high input impedance and very low output impedance. It allows a connection of heavily loaded to another load which requires a lot of current like capacitive load.The octal buffer is used to isolate one device from another by eliminating loading effects. It provides a ‘buffer’ between the two devices. The 74LS244 are octal buffers and line drivers designed to be employed as the memory address drivers, clock drivers, and bus-oriented transmitters/ receivers which provide improvement on the controller board density. 3. 3. 7 Microcontroller circuit (Intel 8051 – expended mode) The controller systems that use to control the motion detector system and other electronic devices are the microcontroller Intel 8051 – expended mode.In expended mode configuration, external ROM and RAM are used to add the data memory to be more than internal memory provided by the Intel manufacturer. The purpose of using an expended mode for the project is to expend more data available on developing and designing an excellent operation of the security system. Figure 3. 6 Intel 8051 block diagram The microcontroller Intel 8051 is a widely used on controlling devices and instruments due to its flexibility, existence of multiple producers. It consists of a simple architecture introduced by Intel in the year of 80’s.It produced with 128 bytes of RAM, 4K bytes of on-chip ROM, 2 timers, one serial port, and 8-bits wide of ports. This type of microcontroller become very popular after Intel allowed another manufacturer to make and market any flavor of the 8051, and still remains compatible with 8051. There ar e various versions of 8051 with different speeds and amount of the on-chip ROM which is valuable on controlling a system designed. 3. 4 Software development The software structure is using the assembly language where a set of program based on security system is assembled using ASM51 assembler.The 8051 Cross Assembler (ASM51) takes an assembly language source file created with a text editor and translates it into a machine language object file. This translation process is done in two passes over the source file. During the first pass, the Cross Assembler builds a symbol table and labels that used in the source file. While the second pass of the Cross Assembler is actually translates the source file into the machine language object file. During the second pass, the listing file of the assembled is generated for the analysis purpose.A security program as shown in flow chart below were written in notepad based on 8051 instruction set before assembling process to get the binary code. Thi s binary code is then used to be load into the location of the memory thus operates the hardware developed. The flowchart as shown in Figure 3. 7 is a basic designed for the security system operation. In this security system, the security code is set as ‘1985’ to activate or deactivate security system. When user closed the door, the system will activate where the magnetic switch and infrared is in active condition.To deactivate the system where opening door without alarm, user must enter the deactivation code. The chance to deactivate the system is once before keypad locked, where user can not enter the code anymore. If deactivation code was correct, green LED will ‘on’ while alarm will ‘off’ condition. System at this time is successfully deactivated and user can open the door without alarm. Figure 3. 7 Flow chart of software design for the security system If deactivation code enters was incorrect, system is still activate and for that, red LED and alarm will ‘on’ where the system is in a warning mode.The system will keep in this mode until the correct deactivation code entered. When the correct deactivation codes enter, the reconfirm code is needed where user need to reenter the correct deactivation code before the system successfully deactivate; the green LED will ‘on’ and the alarm will ‘off’ condition. The reconfirm code is designed in the system to make more security for the system developed. If intruder open the magnetic switch without entered the correct security code, thus the alarm will ‘on’. User must enter the correct deactivation code to turn ‘off’ the alarm system.The activation and deactivate code for this system are ‘1985’ and the ‘enter’ button codes are ‘A’ for every codes entered. 3. 5 Summary There are three elements discussed in this chapter which are the concept of motion detector for security syste m, the hardware development, and the software designed for the security system. Each part of these elements is related to each other. The understanding of the concepts and methods on developing the project is very important to achieve the main objective for the whole project. CHAPTER 4 RESULTS AND DISCUSSIONS 4. 1 IntroductionThis chapter will briefly discuss on the results and discussions of the hardware development. There are three major modules in developing the hardware structure which are the active infrared motion detector circuit, keypad module circuit, and the most important; the controller circuit 4. 2 Motion detector circuit The hardware development of the active infrared motion detector system is divided into two parts, which are the infrared emitter circuit and the infrared detector component. 4. 2. 1 The emitter The emitter which also known as infrared transmitter circuit was build as shown in Figure 4. . A probe or the oscilloscope is attached to the infrared LED while the adjustable resistor is varied to calibrate the emitter to transmit 38 kHz square wave. The Figure 4. 1 shows the final configuration of the emitter circuit: Figure 4. 1 The emitter circuit Figure 4. 2 shows the result obtained from the oscilloscope where the frequency generated by the emitter circuit is 38. 67 kHz square wave. At this generated frequency, the voltage maximum produced is 1. 60V and the peak to peak voltage is 1. 16V. Figure 4. 2 The 38 kHz frequency generated by the emitter circuit

Monday, September 16, 2019

“Whitebook”: Cross-Marketing Platform for Luxury Brands in Japan

Ad-comm Group â€Å"Whitebook†: Cross-marketing Platform for Luxury Brands in Japan 1. What is a Whitebook? What role(s) does it play in the Marketing strategy of Ad-comm’s client companies? Answers 15 lines maximum. Whitebook is a cross marketing platform, a magazine that is published in Japan every 4 months and which displays nine luxury brands in nine diverse types of product. The magazine is customized for each luxury sponsors. The Whitebook plays an important role in terms of marketing strategy as it is a brand ambassador and CRM tool.As the Whitebook is mainly distributed through sponsors, the Whitebook targets a prequalified small group of costumers but right ones, right at the beginning. Being displayed in the magazine can be seen a recognition of being a top luxury brand and be therefore an award. The Magazine creates a strong relationship between the brands and the costumers, as the costumers feel privileged to receive special attention from the brand. Moreove r the Whitebook organizes event as well, which gathers customers and one brand.Those events gives the opportunity for luxury brands to create a personal relationship (â€Å"face-to-face† relationship) with its customers, by telling its heritage and answering questions. 2. Take the perspective of the general manager of Porsche Japan. How would you assess the cost effectiveness or ROI of investing 20 million Yen a year to sponsor Whitbook? Would you be willing to be a sponsor? Why or why not? Answer by using a break-even analysis, and by calculating the expected customer lifetime value (i. e. oday’s expected value of a customer’s purchases over the course of his/her life as a Porsche customer). 1 to 2 pages. a. You must know what a break-even analysis is: this is when your return/revenue covers your investment – in other words: how many cars to sell to repay for the investment in Whitebook? b. Customer Lifetime value: refer to the last class definition â₠¬â€œ expected value of a customer over the course of his/her life as a customer = selling price of a Porsche x number of Porsches purchased in a lifetime.Be creative by using the data of the case and common sense. There is no magic formula. I will take your assumptions into consideration. c. Then the cost effectiveness can be assessed by comparing to competitive offerings Porsche sales increased by 4. 55 ( 3000/658= 4. 55 – p. 8) in 6 years. For a luxury brand, democratization of the product also means loss of prestige and exclusivity. Whitebook is a way to keep the luxury image of the brand by creating a special relationship with the best costumers. 20 million Yen represents 2. % of the total marketing budget (p. 8). Assuming that an average price of Porsche is 75 000$ USD , in 6 years they have sold for 175 650 000$ (75 000 x 2320) . 20 million Yen is equal to 214 241. 04$ USD which corresponds to 1 285 446. 24$ USD in 6 years. In terms of break-even analysis and still assu ming the average price of 75 000 $, they need to sell 3 cars (2. 86) (214 241. 04 / 75 000) per year to repay their investment in Whitebook. However, the case mentions that â€Å"10% of the VIP customers own 8-9 Porsches† (p. ), therefore we can assume that Porsche company sells at least 3 cars per year and therefore sponsoring Whitebook is profitable. In terms of Costumer Lifetime value, we shall still assume the average price of 75 000$ USD per car and the number of Porsches purchased in a lifetime of 8. 5 (â€Å"8-9 Porsches† own over lifetime – p. 8). The Costumer Lifetime Value is therefore equal to 637 500 (75 000 x 8. 5). Finally, in terms of cost effectiveness, if we look at exhibit 9, we see that the manufacturer's suggested retail price of Whitebook is best advantageous compared to other selected print media in Japan.The manufacturer's suggested retail price is relatively low (5 000 000 Yen) compared to the number of pages and the location. Let’ s take 25ans’. The MSRP is 4 200 000 Yen for 2 pages on the back cover; compared to 800 000Yen more for Whitebook (therefore 1. 19 more expensive (5 000 000 / 4 200 000 = 1. 19) ) for 3 times more pages inside the magazine for Whitebook. It is then clear that Whitebook is more profitable compared to less expensive magazines in terms of cost effectiveness. Moreover 25ans’ targets women’s luxury, however Porsche and fast cars are commonly known to be of mainly great interest for men.Concerning Esquire, the MSRP is 3 200 000 Yen of 2 pages on the back cover, Whitebook is 1 800 000 more (therefore 1. 5626 more expensive (5 000 000 / 32 000 000)) for 3 times more pages inside the magazine. Thus, Whitebook magazine is more profitable than Esquire. Moreover Esquire targets Men’s fashion/lifestyle only, however purchasing a Porsche can also involve women (Porsche Cayenne for example). Concerning Nikkei Business, the MSRP is 5 680 000 Yen of 2 pages on the back co ver which target business customers. Compare to Whitebook, Nikkei Business is 1. 36 more expensive than Whitebook for less pages. Moreover the Nikkei Business target only business Concerning Asahi Newspaper, the MSRP is 22 500 000 Yen for full page. Compare toe Whitebook, Asahi Newspaper is 4. 5 more expensive. Moreover, Asahi Newspaper targets general public, however Porsche wants to keep the luxury prestige and exclusive image of the brand by investing in a magazine, the target readers doesn’t therefore correspond to the main aim of Porsche. In conclusion, Whitebook is the best investment in terms of cost effectiveness compared to competitive offerings. . Put yourself in the shoes of Andreas Dannenberg. Whitebook exploits opportunities (and leverages strength, addresses weaknesses, and counter threats) in the luxury market and advertising industry, and it helps Ad-comm stay ahead of potential capability improvements by Japanese and multinational competitors. What is Whitebo ok to you? What role(s) does it play in the marketing strategy of Ad-comm itself? Answer by using a SWOT analysis (for Ad-comm) to understand internal and external strategic position. 1 to 2 pages. In terms of Strengths: Whitebook enables to be independent from Japanese Players * Doesn’t have to be subcontracted by Japanese agencies * Target the right costumers * Plays a role of CRM tool * Create privilege relationships between the brands and the costumers * Maintain the luxury and exclusive image of the sponsors * Create events to build a face to face relationship and build a trust relationship in the long run with VIP costumers -> the brand tells stories and heritage to the customer and the Japanese consumption, customers are choosing a brand mainly because of its heritage, recommendations of experts and experiences of family and friends. Plays a role of brand ambassador * Enable luxury companies to display the corporate portfolio * Enable luxury brands to make their cash f lows easier In terms of Weaknesses: * Limited to Japanese market * Limited to the Japanese market * Implementation on international market requires global corporate decision In terms of Opportunities: * Cross-marketing platform * Select prequalified targeted and top-tier customer Create a unique virtual experience for privilege guests as well trough its website and entry key * Track behaviors of target customers * The website tracks behaviors of target customers * Create events which can be an opportunity to launch a new product to a right target costumer * Enable luxury companies to get new costumers * Work as a CRM tool In terms of Threats: * No competitors at the moment because is very selective and the nurture the relationship with the brand. However, competitors can come in the market, target also luxury clientele with more luxury brands or more subcategories * New competitors can come and create other type of cross-marketing platform like a privilege club which enables the bra nds to meet * New competitors can come an create the same magazine suited for the global market or USA market which number of customers are greater 4. What would you do with the expansion opportunities described at the end of the case (pp. 10-13)? Would you pursue: (a) increasing the number of sponsors I the current Whitebook? b) replicating the current Whitebook in overseas market; or (c) developing an alternative Whitebook focused on the new â€Å"edgy† brand market? Why? Answer with Pros and Cons in 1 to 2 pages. (a) Increasing the number of sponsors I the current Whitebook Pros: * Increase flexibility when planning events * Increase quantity of events (number of events) * Increase quality of events, as more VIP customers and sponsor companies are available * Increase the use of CRM tool * Make the relationship between brand and consumer more visible Cons: Additional cost could offset the fixed costs of production * Losing credibility * Losing trust with the brands * Losin g luxury appeal because luxury is based on scarcity and exclusivity (b) Replicating the current Whitebook in overseas market (the best option because:) Pros: * Minimize additional effort and attention required to Whitebook * Provide learning opportunity for the account managers * Can introduce new categories in the book * Multinational sponsor already present in the Japanese version can be included in the overseas version * Already implemented in US, SingaporeCons: * There’s a small budget required by sponsors * The decisions so fare are regional and not on corporate level * Changing the marketing strategy at a global level will be uncontrollable for Whitebook unless they change the whole corporate structure, which possible (c) Developing an alternative Whitebook focused on the new â€Å"edgy† brand market Pros: * Maintain most loyal costumers * Help to acquire innovative customers * Guarantee of 50 000 targeted customers * Involves high-margin brand segments Developin g new relationships with new companies Cons: * Should redirect the target customers on young customers * Being part of a community takes out their own personality and uniqueness * Because edgy brands target young customers and customers prefer interactive marketing tools so edgy brand prefer to invest their marketing budget and events or promotions rather that printing marketing * Change the value of luxury image of the book * Because luxury is based on exclusivity and scarcity, including edgy brands will damage this luxury image

Sunday, September 15, 2019

Evaluating Strengths and Weaknesses of Reason as a Way of Knowing Essay

This paper that I am writing on is a piece of paper; that is undeniable fact. Hundreds of years of development and definition also back up this statement as do any scientific experiments carried out upon it in an effort to prove that this piece of paper is indeed a piece of paper. Yet through reasoning the fact that this is a piece of paper can be disputed and even proved wrong. Reason seems like an excellent way to work out the world around us. It uses all of the facts available to come up with a suitable hypothesis which can be tested and either proved or disproved through experimentation. This is the foundation of science, which is what the majority of people would trust. So anything proved through scientific means is therefore and irrefutable fact. Of course, in every experiment write up there is an acknowledgement that the data collected might not be completely accurate or that the interpretation of results might be wayward but again this is perfectly reasonable. It is reasonabl e to assume that despite your best efforts you may have got the answer wrong and another answer, no matter how unlikely, may be correct. As well as reason being proved by scientific experiment it can also be proved by historical fact. For example, it is undisputable fact that on 30th May 1431 Joan of Arc was burned at the stake. That cannot be argued with, it was that date and will always be that date no matter what happens in the future and every history text or website would agree with that fact. So it is therefore illogical to start claiming that Joan of Arc died last week as historical facts, which are perfectly reasonable, tell us otherwise. However, does reason really help us in our quest for knowledge or is it a poor way of finding out about the world? Despite much scientific investigation and historical knowledge there are many questions in the world that are left unanswered and unexplained. These questions are sometimes fundamental to life itself. For example, how are we conscious beings that can interact with the world beyond purely animal instincts? This question could possibly be explained by the electrica l impulses in the brain that form our thoughts but how can we have developed into any kind society purely through electrical impulses? In this case, using reason to explain what is happening almost seems unreasonable as the potential answer seems not to be able to completely cover the question. After all, if it is only electrical impulses, then what need is there for a person to be able to be able to create a symphony with an orchestra? As well as reason not being able to answer some questions there are some problems with following logical arguments. Logical fallacies are the main example of this. This is where through looking at two or more facts a conclusion is drawn which is false. For example: Cake is food, food is tasty, and therefore cake is tasty. However, this is obviously not true as whilst some cake may be tasty, perhaps even the majority; this does not mean to say that all cake is tasty. After all a burnt cake is not that tasty! Also not only is the conclusion false the two facts through which the conclusion is derived can also be said to be false. After all, any cake that I bake should not be classed as food and not all food is tasty. This statement is far too general and is a large problem with logical fallacies as they generally come to a wrong conclusion, both through the ignorance of other factors as well as the fact that often the facts are not completely accurate in the first place. Lateral thinking is also something which at first seems illogical yet (often) in hindsight becomes logical. It is creative thinking which does not merely follow the most logical steps to reach an answer. For example a suggested solution to the Arab-Israeli conflict in the Middle East was to ship vast amounts of Marmite to the area. This seems utterly senseless, as surely holding talks and making agreements between the two sides would be the best steps forward. However, on examining the idea further it becomes logical, if creative! In the typical diet of people in the Middle Eastern area there is a lack of zinc due to the main diet of unleavened bread. This lack of zinc creates aggression. Marmite contains a lot of zinc and therefore could be used to solve the problem in the Middle East. Whilst this solution does not seem reasonable it would work and so shows that reason is not always the best policy. There is also a difference in opinion between what people may think is logical and illogical. Many people in the world take illogical decisions and believe illogical knowledge. Or they seem to do so. Religion is a major factor in many people’s lives and it affects many of the things that they think and do. Due to this people may make a decision that seems illogical to secular people which is perfectly logical to religious people. This brings up the question of; what is reason? After all if two different decisions about the same thing are made and are both reasonable to those people it begs the question of whether or not reason itself can be defined. Is reason just a matter of opinion or is there a yardstick by which all reasonable decisions can be made. If we look back at the British Empire one of the purposes of that was to; â€Å"Make the world England† rather then to respect what other cultures thought and did. In many small islands in the Far East a warrior culture was common and often tribes would fight each other for prestige rather then for anything else. However, to the British this seemed barbaric, yet without it the culture fell apart. For them it was reasonable for this to take place, the knowledge they had seemed to point to the fact that this was a good thing. But not for the British who had a very different opinion through the knowledge that they had acquired. To conclude reason as a way of knowing has both strengths and weaknesses. The weaknesses are that a difference of opinion means that people will reason differently too making it an irregular method of making decisions and acquiring knowledge. Reason may also not be the best policy as more creative solutions may be better which can be derived through latera l thinking. Also logical fallacies call into question the validity of reason as they produce false results through logical steps. As well as this we cannot answer some fundamental questions through reason. However, reason is often the best way that we can make decisions in the world. Scientific experiment and historical knowledge are two very good examples of how reason cannot be changed and is therefore very valuable as it allows us to have consistency with our knowledge. Of course religion means that some inconsistency comes into play with our knowledge but on the whole reason is often the best policy.