Saturday, August 31, 2019

Speech on Belonging

Belonging is usually defined as being accepted into and by members of a family, group, class, race, community or school. The term belonging means something different to everyone but most people will come up with the words acceptance, security and identity. In this speech I have chosen to talk about the aspects of belonging and not belonging in two of Peter Skrzynecki’s Poems, Migrant Hostel and 10 Mary Street and also in the 1997 film ‘Titanic’. In Peter Skrzynecki’s Migrant Hostel, he talks about the 2 years of his life that he and most of his family lived in a Migrant hostel in Parkes after coming to Australia after World War 2 from Poland and leaving most of his family and polish heritage behind. This poem gives the responder a sense of confusion about whether he belongs or not to this migrant hostel. Skrzynecki creates this confusion by contrasting the family’s sense of belonging to the hostel with the family’s confusion about whether or not they actually belonged to the Australian soil. Although the migrant hostel was their home for 2 years there was always so many people coming and going that it didn’t really feel like a home which made it really hard to create a sense of belonging as a community. Techniques used by Skrzynecki to create this sense of confusion about belonging are juxtaposition or contrast for example in the last stanza on the 6th line â€Å"Needing its sanction To pass in and out of lives That had only begun Or were dying† This can be referred to as when people arrive at the hostel their lives are just beginning as they have a second chance to start their lives over again and forget about the past and what has happened and concentrate on the future and then when they leave the hostel they feel lost because they are on unknown land and they feel they don’t really fit in with the Australian lifestyle as they have their own background and heritage to maintain. This uote could also mean the opposite when they leave they have a chance to start over and renew there lives again and when they are in the hostel they are trapped and don’t know what to do or who they are. Symbolism is another technique Skrzynecki uses in this poem. In ‘Migrant hostel’ he uses birds as a symbol of being trapped. For example the third stanza ‘For over two years We lived like birds of passage- Always sensing a change In the weather: Unaware of the season Whose track we would follow’ This example shows how the people in the hostel where hardly allowed outside, which shows that they were basically trapped inside and away from everyone else. Another technique Skrzynecki uses is rhetorical device; this technique shows the confusion of the people inside the hostel, for example in the first stanza 6th line â€Å"That left us wondering who would be coming next. † This example shows the confusion the people had, and how uncertain things were for them, they didn’t know who was going to come through the gate next or who was going to leave. Also in this poem Skrzynecki uses an extended metaphor. In this poem the bird symbol is also used as the extended metaphor. In this poem he uses refers to a homing pigeon to deepen the sense of instinctual behavior for example in the second stanza 1st line ‘Nationalities sought Each other out instinctively Like a homing pigeon Circling to get its bearings’ this example shows how the people are coming together and finding each other through their background and where they came from. The last technique that Skrzynecki uses in this poem is similes. For example n the last stanza 4th line ‘As it rose and fell like a finger’ this particular simile refers to the gate out the front of the hostel, it shows how they were isolated from the rest of the country by that gate and that they had no control over when that gate opened or closed. It makes the hostel sound like a jail. In Skrzynecki’s poem ‘10 Mary Street’ he is describing his life in his fir st ever home on Australian soil, this poem has a greater sense of belonging as he is more comfortable in Mary street, and he has a greater sense of belonging to his family, his home, his school, his community and is comfortable with his migrant past. Skrzynecki and his family lived at 10 Mary Street for 19 years before the house got knocked down. During this poem Skrzynecki has no sense of doubt or uncertainty about who he is or where he is going. This poem gives a strong sense of happiness and content within his life as the language is light and joyful, as he remembers certain things about that house and life within it. Skrzynecki uses techniques such as personification

Friday, August 30, 2019

Minorities Should Have the Same Civil Rights as Everyone Else

Most of us are used to being part of the larger portion of the society. We are so used with the manner of which democracy makes decisions, that is through the decision of the majority. This is our viewpoint of decision making, but an alarming issue is that we fail to see and hear what smaller groups in the society would want to say. If this is the case, then our society will remain unjust and unequal to the majority and the minorities. Therefore, we all live in an imperfect society. Therefore if we want to achieve a society that could even come close to being perfect, we have to give equal civil rights to minorities.There exist variations of types of minorities or smaller groups within the society. They could be racial or ethnic, religious, gender and sexual, age, disabled, and other small groups within the society. As we can see here, there is a wide range of minority types. That just means that they are distributed within the society. If we also give it more thought, if these minor ities were to count as one, the sum of them all could be greater than the majority. That could just meant that they should be treated equally as the society treats the majority. But why does the society do not treat the minorities as it should?There are many factors that prevent the society to grant equality to the minorities. One of the major problems of this issue is ethics. Universalism, Utilitarianism, natural law ethics, Kantian ethics, and other ethics that are in favor to the majority are much more popular than ethics that favors a particular group in the society. For me, the society seems to be configured in such a way that it only works for the many and is willing to sacrifice the small groups. Actually, the way society treats minorities contradicts the functions that the society was originally designed for. (Morigiwa 102)Inequality of rights between the majority and the minorities certainly contradicts the United States Declaration of Independence. The Declaration of Indep endence explicitly communicates to us that we should always bear in mind that all men are should treat each other as equals. It also tells us that each and every one us are given rights by God himself. (Boyd & Gawalt)It seems that the whole of society itself is the main source of the problem why minorities are treated unequally. The designers of the Declaration of Independence had foreseen that inequalities (like what minorities are experiencing right now) are the whole country’s problem. So that is why they have formulated laws to tell us to treat each other equally. It seems that inequality or marginalization is inevitable in a society. We always fail to treat others fair as we treat ourselves.Even though our society claims to be a religious and ethical one, again it seems to contradict itself. Even the holy books of word religions want to communicate to us something about this topic. For Christians, the Bible has told its readers to treat others as they would have wanted o thers to treat them. The Koran also teaches us to be fair with our fellow men. The message of every world religion seems to be equality. The Buddhist’s golden rule is almost synonymous what the Bible has to say about treating others.Marginalization of minorities is prevalent in the society. Little do most of us know that this marginalization has certain effects to the society. We may have been suffering unknowingly suffering from consequences of marginalization of minorities.  It seems that depriving civil rights to minorities will cause everyone within the society certain problems. Inequality in civil rights causes the whole system not to function smoothly.Mullaly has explored through this problem to give us some sort of much needed clarity regarding the issue of minorities. He had shown us how the personal becomes political. He pointed out that there is a need to recognize that social problems are certainly related to the larger structures of the society, this causes vary ing forms of oppression of members of the society. This will lead them to reject the ideas of those who aren’t familiar to them, thus resulting to marginalization of minorities. (Mullaly)He also pointed out that it is very important for us to recognize that oppression exists in the society. There is a great need for a non-judgmental and unbiased attitude by every members of the society. (Mullaly) Marginalization of minorities clearly hampers the productivity of the workforce. We should always bear in mind that these minorities make up more than half of our workforce, the workforce that all of us are deeply dependent on.As a conclusion, it seems that everyone doesn’t want marginalization of minorities. The society has laws that are carefully constructed to avoid such inequality in civil rights. But unfortunately, inequality of rights seems to be more prevalent in the society. Something must be done about the problem. It should be something that the whole of society shou ld be thinking over. We see everyday the implications of inequality in civil rights in the forms of poverty, political chaos, never-ending disputes. I’m sure that all of us want a better place to live in. We all want to improve our living conditions. We should start by eliminating the flaw that makes our society imperfect. Maybe if we all learn to treat others as our equals, then we maybe not really far from the perfect society that we all aspire for.Works CitedMullaly, B. Oppression: The Focus of Social Work. Don Mills: Oxford UniversityPress. 2007Boyd, Julian. The United States Declaration of Independence: The Evolution of Text. US: LIB OF CONGRESS. 1999 Morigawa, Yatsumoto. Universal Minority Rights?: A Transnational Approach. Franz SteinerVerlag. 2004

Thursday, August 29, 2019

Blood Brothers Theatre Review Essay Example for Free

Blood Brothers Theatre Review Essay We visited the Phoenix Theatre on the fourth of October and when we the play started I was drawn to the actual setting of the stage; firstly contrast in the set and how it represented the two side’s class divide. Mrs Johnstone’s huge family all cramped up in the small, crumbling, graffiti covered terraced council housing with the rest of the workers and Mrs Lyon’s large elegant suburban detached house with is wrought iron street lamp and large windows and also with the interior of the houses only the kitchen of Mrs Johnstone’s house is shown overflowing with cooking utensils and laundry and other domestic trivialities but not a chair in sight which means Mrs Johnstone is always either shown standing up or sitting on the step whereas Mrs Lyons living room is shown with its tasteful decorating, art deco lamps, corner pillars and a large sofa in the middle where she is often shown sitting on offering another contrast between her and Mrs Johnstone. Another feature of the setting I particularly enjoyed was the raked stage which allowed better levels for the actors the stage is heavily raked, meaning that a lot of the action is easy to see from all over the house. The set is simple and remains stationary, creating a focused performance space and emphasised certain scenes like when Mrs Lyons suggested Mrs Johnstone give her one of the twins she upstaged Mrs Johnstone who had to turn to respond and also allows for multiple scenes such as when Mrs Lyons revealed Eddie and Linda’s ‘affair’ she turned Micky to face upstage where Eddie and Linda are walking together, which emphasises the cross cutting of that scene and another feature of the raked stage is that it simply allowed a better view of the Performance for the audience. The Play began with a frozen image of the dead twins seen through a red gauze curtain and the narrator gives the lines he is to repeat at the end This use of Dramatic Irony means you sympathise more with the characters knowing the fate that awaits them and it is also a very dramatic way to begin the show immediately drawing you in making ask questions which of course are answered throughout the duration of the play. The dramatic irony also makes you play closer attention to the play as you are compelled to see how the situation could have been avoided and it is shown through foreshadowing that all that would happen was set in stone from when a seven year old micky pretended to shoot a seven year old Eddie to when a seventeen year old Sammy pulled a knife out on the bus. These glimpses into their future might have been missed if you weren’t completely Hooked on the play and so the use of framing and dramatic irony means you were absorbed in the play completely. The costume in the play is a strong representation of the social status of the characters and so everything about Eddie and Mickey’s clothes represents key parts of their life and how they have added to their character as their costumes are a large representative of the whole nature versus nurture theme of the play. Eddie as a seven year old wears very neatly pressed v neck sweater over an immaculately white shirt and short trousers whereas mickey was wearing a jumper so ragged and dirty its quite hard to determine what colour it is, it’s full of holes and stretches to well over his knees indicating it is most likely a hand me down. The contrast in the childhood upbringing of the two characters is apparent in their clothing, the closest Eddie has ever come to second hand clothes is when he meets mickey on the other hand mickey has probably grown up with his siblings old clothes and toys et cetera. The adolescent Mickey wears fashionable denim and leather. Which shows him at what was the peak of his life, the happiest his is to be in the play. The adolescent Eddie wears a very smart school uniform The adult Mickey again wears a baggy jumper. However this is when he is dominated by medicine. His clothing also illustrates the loss of that huge childhood energy he had at the beginning of the play. It is hard to determine what purpose the narrator serves. On stage he appears dressed in a smart black suit –reminiscent of funeral garb so sort of fore shadowing but the costume his gives him a neutral status, as we cannot identify anything about his character. It gives him a sense of anonymity throughout the show, and the fact that the other characters do not acknowledge him gives him a ghostlike quality except when he takes a picture of. His main role throughout the show is to act as a constant reminder to us of the Brothers’ tragic fate – exemplified in the musical number ‘Shoes upon the Table’, which is repeated Throughout both acts of the show. It is also notable that as the show commences with the scene of The finale, his attire is like that of somebody who is attending a funeral – and it seems that he is dressed for such an occasion throughout the entire play. The characters seem to look through him or just avoid him until Linda asks h im to take their photograph and it seems as soon as she does this their lives begin to go wrong, coincidence or were their lives touched by evil The use of sound is possibly the most powerful dramatic medium used in the play; the songs are extremely well written fit immaculately with the themes of the play and the lyrics and melody are re used throughout the play. Music was used to draw emotion from the audience. It also helped to move along the action and always conveyed a theme, message or feeling. Echo was also used in parts of songs. However it was recorded and therefore gave a very surreal and artificial effect. The music and lighting combined at the beginning of the play to create both a DRAMATIC EFFECT and a SAD ATMOSPHERE which worked very well to draw you in. The use of the orchestra collaborated well with the songs. The gunshot at the end of the play worked well as it shocked the audience despite them knowing the ending. There was a great contrast in lighting between the countryside and the city. In the countryside it was bright and the scenery consisted of typical green rolling hills and a crystal blue sky. However in the city the lighting was much darker and the scenery consisted buildings. When the front door of Mrs Johnstone house opened light flooded on to the stage. The purpose of this was to generate the idea of presence of Mrs Johnstone and her children living inside the house. The stage was lit up with a red light at the beginning of the end. This was used as an indicator of the bloodshed to follow. A red light also appeared when Mrs Lyons came on to the stage. This illustrated her madness and guilt stricken conscious. This was also done by the use of blackouts. A blue light appeared at the end when the narrator came on to the stage and sang. To illustrate the madness of Mrs Lyons in song flashing lights came on. This made the audience feel uneasy and uncomfortable with the character of Mrs Lyons. Blood Brothers Theatre Review. (2016, Dec 24).

Wednesday, August 28, 2019

Emergency response Research Paper Example | Topics and Well Written Essays - 500 words

Emergency response - Research Paper Example The decisions taken during the response phase in disaster management should help restore order and re-establish a state of normality mainly through rehabilitation and reconstruction. In the United States, the Department of Homeland Security is responsible for planning for and conducting emergency response services (Perry and Lindell, 2003). During the emergency response phase, first responders are posted in the disaster area, while the necessary emergency services are mobilized. Some of the core services during this phase include policing, ambulance and firefighting services. Recent research information shows that although the federal government has put measures in place to aid in efficient response during emergencies, there is much more that needs to be done to ensure that further loss of life and damage to property and the environment does not occur (Waugh and Streib, 2006). During recent times, the government’s response to disasters such as the Florida floods in 2004 and Hurricane Katrina a year later has drawn a lot of criticism from what is seen as lackluster efforts from government to respond to the disasters in time (Sene, 2008). For homeland security, scholars argue that since the country is at risk of domestic and internationals terrorist attacks, more should be done to enable quick response in case a S eptember 11 disaster occurs again (Radvanovsky, and McDougall, 2010). There is general concurrence that a lack of a strong response strategy for terrorism attacks in the country’s emergency management plans can lead to massive loss of lives and property. The Federal Emergency Management Agency or FEMA is the federal organization charged with the responsibility of dealing with emergencies. The agency coordinates government’s efforts in the preparation for, prevention and mitigation of the effects of disasters that occur on American soil (Sene, 2008). The body is also responsible for response and recovery measures from domestic disasters. The

Tuesday, August 27, 2019

Marketing research Paper Example | Topics and Well Written Essays - 8500 words

Marketing - Research Paper Example The new system created a good data warehousing and customer data-analysis systems. The new system resulted in the a 300% increase in returns on investment between 1998 and 2000 (Gamble et al, 2010). Through the system, Cathay Pacific got information to support decision making. This resulted in the consolidation of data, more personalized service and improved target marketing. The Airline also introduced the Marco Polo Club in 1995 which is a brand loyalty programme meant to reward customers and encourage them to get some kind of compensation to stick to the Cathay Pacific (Horner & Swarbrooke, 2012). Marco Polo Club is a part of One-World Alliance. The Marco Polo Club has four classes, Green, Silver, Gold and Diamond. Each class has its own benefits. Amongst the many benefits include the fact that Silver members can pay the rate of the economy class and check in at the business class. Gold members on the business class can check into One World Alliance Executive lounges in Airports a round the world. Diamond members can have some excess luggage when they travel in the business class. (Horner and Swarbrooke, 2012). This programme has worked successfully for Cathay Pacific for all these years. Research Question Questions Cathay Pacific is currently a very profitable business venture. It is successful in many different areas and parts of Asia and the Pacific region. The Airline continues to attract more customers and it remains competitive ahead of other regional players like Emirates and other players from different parts of the Southern continent world. This research would seek to examine some important elements and important components of the success of Cathay Pacific. This research would set off to ask: what customer relations management system does Cathay Pacific use? What is the role of the customer information system in promoting customer relations in the Airline? What is the system of operation of the One-World Alliance and Marco Polo Club? What do customer s say about these loyalty programmes and systems of Cathay Pacific? Research Aims and Objectives The aim of the research is to examine: the effectiveness of the customer relations management systems of Cathay Pacific in the promoting corporate image and enhancing customer loyalty. In doing this, the following objectives would be assessed: 1. A critical examination of the customer relations management (CRM) system of Cathay Pacific. 2. An assessment of the effectiveness of the Cathay Pacific loyalty programmes. 3. Effects of customer loyalty programmes of Cathay Pacific on customer loyalty and corporate image. 4. Examination of the impact of customer relationship management on Cathay Pacific. Research Method The research methodology is the approach that is used to enquire into a given matter to attain the objectives of a given research (Saunders et al, 2009). The research methodology refers to the various activities that are carried out in order to attain the aim of a research. In or der to attain the research results, there would be four distinctive phases that would be carried out to complete the study. The research would involve the collection of data, analysis of the data and conclusion. Data Collection Data would involve information collected from primary and secondary sources. This data would be collected in correspondence with the four objectives. In the first phase, data would be collected from secondary sources. This would involve inf

Monday, August 26, 2019

Case study questions Essay Example | Topics and Well Written Essays - 2000 words

Case study questions - Essay Example The recommendation for this business can be expand its business to many other countries of the world and make new business strategies for having greater competitive advantages. 1b. the biggest step taken by Tesco in its strategic planning is becoming an International operator. The advantageous strategic position of the company has made it a multinational operator. The company has the ability to retain and acquire more customers in the new market environment. Tesco’s expansion in the US market is also an important strategic decision. This strategy has contributed in the success of the firm in USA. The strategy of Tesco’s store operation of small format has positioned the brand in such a way that it threatens other retail firms. To hold its position in the competitive environment of the retail industry Tesco can make alliance with different international business for its business expansion. 2. The main strategic evaluation criteria are involved in understanding the goal of the company, its mission and vision. The growth of the business by implementing those strategies helps to evaluate the effectiveness of the business strategies. Tesco has set up different evaluation criteria for its different business strategies. The strategic decision of the company to expand in USA and South Korea helped to achieve huge success in its business. In this case the main strategic evaluation criteria are to generate a certain amount of revenue from those places which will help to generate a huge amount of profit. Tesco has a strategy of selling its product at a very low price. This strategy is evaluated on the basis of the amount of goods sold in its stores. The main objective of the company is to become the largest retail company of the world. The company’s strategy of offering value added services and products in its business operation helps to increase the growth of the busine ss. The firm has introduced

How is technology shaping the future of tertiary institutions and what Thesis Proposal

How is technology shaping the future of tertiary institutions and what must the do to survive - Thesis Proposal Example Technology is the skeleton, muscles and blood of higher education for the students in meeting the standards of excellence in scholastic merits, viable and sustainable productive skills for future, and adaptability to changing trends in real world. In order to keep pace with the changes around the globe, it is indispensable for the institutions to connect the teaching to technology so that the beliefs about future can be transformed to realities in their practical outcome. This paper is aimed at making an exploration of the various management challenges for rendering a tertiary education strategy in connection with the increasing demand for technology in the application level learning. The project will investigate, experiment and evaluate the information, factual data and chronological details related to the advancement of technology as a relationship with its viability and scope in the field of tertiary education by pursuing the following question - The paper will be an evaluation of the current system of education at higher levels with apt suggestions for improvement by highlighting the relevance of technology at learning process so as to enable the students find their place in the competitive world. It does not take strain to understand the inevitable role of technology in the present day world in connecting lives as a vicious cycle comprising various dynamic activities for growth and sustainability. Although the focus of technological advancement is mainly on the business sector, the fact that educational institutions are the suppliers of creative human resources is indisputable. This proposal will focus on underlining the importance of a discussion of management challenges before universities and institutions in framing a balanced course inclusive of technology at its core. Experimental approach to management challenge is important in tertiary institutions for various reasons. Most basically, it is

Sunday, August 25, 2019

How Do The Specific Course Materials Connect, Align, Support, and Term Paper

How Do The Specific Course Materials Connect, Align, Support, and Intersect With Concepts Addressed In The Book The Servant - Term Paper Example This research will begin with the statement that effective leadership is one of the major attributes of organizational success. Northouse has described leadership as a process that assists individual to influence a group of people in terms of achieving a common goal. Leadership acts as a catalyst to influence four fundamental factors of an organization’s productivity such as labor, land, entrepreneurship, and capital. The leadership style of management or owners is very important for effectively structuring the culture of the organization. There are a number of leadership styles that have been evaluated and examined by researchers overall period of time. As per Selznick, the style of leadership must differ according to the structure of the organization, work culture and personality as well as tolerance of subordinates. Hunter has described the effectiveness and importance of servant leadership for organizational management in his book â€Å"The Servant†. The theory of s ervant leadership illustrates that in order to increase the effectiveness of leadership activities a leader needs to serve first. Rather than a leadership style or technique, servant leadership can be described as a pattern of behavior that can assist management to gather long-term benefit. Hunter has described the impact and application of this leadership style through the tale of a business executive and his failure as a boss, coach, father, and husband.  

Saturday, August 24, 2019

Performance Evaluation Paper Essay Example | Topics and Well Written Essays - 750 words

Performance Evaluation Paper - Essay Example Secondly, in his evaluation the manager used terms that were not effective in the evaluation process. Instead of using the terms such as medium or low-medium, the manager could have used evaluation ratings such as outstanding, meets expectations, exceeds expectations, below expectations or unsatisfactorily (Robbins and Judge, 2007). In this way, it was possible for the manager to rate the engineer’s attitude. Thirdly, the current evaluation form used by the manager does not suggest methods of improving the negative aspects of the employees. Part A 1. Definition of the most commonly-used sets of evaluation criteria in organisations Productivity This is the volume of products or services that an employee produces during his or her duties. Employers mostly reward highly productive employees to motivate them and enhance higher productivity. Quality It means the originality of the work done by the employees. It portrays the innovativeness of an employee. Consistency This means prod uction of similar quality and quantity of work. Employers measure constituency by comparing the previous and the current evaluations. Attendance This is the rate at which the employees report to work. It involves checking the attendance records and valid reasons for absenteeism. Adherence to policy It means the extent to which the employees abide to the procedures that are set by the company. Part B. The relative value of the commonly-used evaluation criteria defined in Part A 1 As mentioned in the previous section, employers are keen to reward the employees who portray significant productivity thus motivating them to work hard. Even though the amount of products by the employees is a major evaluation criterion, it should not compromise the quality of the products. This is the major reason as to why managers evaluate the quality of the work done by employees. In the same way, consistency ensures that employees who depicts waxes and wanes during their duties are noted and adequate tr aining done to ensure they maintain unswerving performance (Robbins and Judge, 2007). Attendance ensures that employees are there when they are needed by their employers. Employees who are consistently at work are highly desired by the employers and their co-workers. Adhering to policies set by a company ensures employees’ safety and an improved working environment. Part C. Advantages of including supervisors, peers, and subordinates in the evaluation process It ensures that the ratings are anonymous. In this way, individuals provide open and honest evaluation that cannot be singled out from the multiple sources. In addition, inclusion of the various stakeholders ensures that ratings portray multiple perspectives that are ignored by the top-down technique of evaluation adopted by the traditional appraisals. In the same way, including supervisors, peers, and subordinates during evaluation saves time and it provides helpful performance feedback (Thomas, 1987). This is due to th e fact that there are no comparisons between workers, no goals and there are no figures involved in the process. Part D. Disadvantages of including supervisors, peers, and subordinates in the evaluation process One of the major disadvantages of including supervisors, peers, and subordinates in the evaluation process is that the possibility of giving dishonest feedback is high. For example, subordinates may give dishonest feedback

Friday, August 23, 2019

Womens oppression in womens perspective Essay Example | Topics and Well Written Essays - 1500 words

Womens oppression in womens perspective - Essay Example Simon de Beauvoir, Jeanne Hyvrard, Darina Al-Joundi, and Mary Wollstonecraft, even though a dedicated all-time existentialist, claim restrictions to the existentialist principle of self-definition and self-creation, reinforce the total freedom of Sartre. On the contrary, these feminists represents an unclear image of human freedom, where in women endures the evident weaknesses of the female body. In the novels of these feminists, namely, (1) La femme rompue by Hyvrard, (2) Le Jeune Morte En Robe De Dentelle by Al-Joundi, (3) and Le jour ou Nina Simone a cesse de chanter by Simon de Beavouir, they outline a form of existential development of a woman’s existence: a narrative of how an attitude of a woman towards her being, body, and societal roles transforms, and of how society shapes this belief. In their novels, they discuss the core of the central issue of female representation: Are the alleged weaknesses of the female body ‘real’ weaknesses which are present obj ectively in every society, or are they only ‘interpreted’ to be disadvantages by the human society? These feminists resolve this issue by examining empirical evidence of the different levels of female existence. In these pieces of empirical evidence the female body is embodied as both negative and positive, and females as both free and oppressed. The female body is the place of this uncertainty, because she can employ it as a means to here liberty and feel demoralised by it. There is no fundamental reality of the issue: it relies upon the degree to which a woman views herself as a liberated entity rather than society’s object of denigration. Hyvrard (1990) remarked that whatever we see, such as other individuals, is made an ‘object’ of our scrutiny and is stereotyped by us. De Beauvoir adopts this argument and relates it to men’s view of women. The core idea of ‘woman’, as argued by de Beauvoir (1997), is a masculine notion: the f emale is constantly the ‘other’ because the man is the ‘seer’ (Alison 2005, 81): ‘he is subject and she the object—the ‘meaning’ of what it is to be a woman is given by men’ (ibid, p. 81). In the aforementioned novels, which will be the sources of the analysis of feminist themes in French literature, it was argued that it is not the natural position of women as such that comprises a disadvantage: it is how a woman sees this situation which makes it negative or positive. As shown in Al-Joundi’s novel, none of the unique experiences of women, such as the menstruation, pregnancy, have a significance in themselves; however, in an oppressive or antagonistic society they can acquire an essence of being a disadvantage and a weakness, as women decide to accept the stereotypes of a patriarchal society. De Beauvoir (1997) stresses that pre-adolescent girls and boys are actually not especially different: they â€Å"have the sam e interests and the same pleasures† (ibid, p. 295).This essay will review the feminist themes of the French novels mentioned above, with an emphasis on the works of De Beauvoir and Wollstonecraft. The Oppression of the Female Body De Beauvoir (1997) claims that as the development of a female’s body takes place, each new phase is endured and separates her ever more roughly from the opposite sex. As the female body develops, society responds in a more and more aggressive and threatening way. Wollstonecraft (2004) refers to the dynamic of ‘becoming’, which is the mechanism whereby an individual understands oneself as a bodily, and sexual being open to the scrutiny of others. This does not have to be detrimental, but inopportunely, girls are frequently compelled to ‘become’ against their free will (De Beauvoir 1997): The young girl feels that her body is getting away from her... on the street men follow her with their eyes and comment on her anatom y. She would like to be invisible; it frightens her to become flesh and to show flesh (ibid, p. 333).

Thursday, August 22, 2019

A Classification Of Residential Neighbourhoods Essay Example for Free

A Classification Of Residential Neighbourhoods Essay Without customers, any business will fail so before setting up any firm we must be sure that there is sufficient demand on the market to keep the firm running. There are many ways of finding out about potential customers. One of these is to look at how many people there are living in the area of Stockbridge. This is useful because it would be convenient for the residents of that area to often have a quick snack or meal from a fast food restaurant. By using the Census Report of 2003, I have found that approximately 6,954 people live in the area with the postcode beginning with EH4, which is the Stockbridge area. This number of residents gives a promising outlook on the number of local potential customers. Stockbridge is an area near to the main part of Edinburgh so many businessmen will work in the local area so would visit Stockbridge at lunch for a quick meal. I feel those people would be the main type of consumer which the product is aimed at. This is because many of those young professionals want a fast lunch so that they can get back to their busy work and they also will want something healthy because young professionals are known to eat and exercise well to keep in shape. One lunchtime on a working day, I went out to Stockbridge and inspected the number of young people wearing a suit. The results were as expected as a lot of the people I saw were dressed in this way so we can assume they are young professionals. The main target market will, therefore, be young professionals. The ACORN (A Classification Of Residential Neighbourhoods) group performs vast amounts of research into different aspects of area, some of these include attitudes, housing, socio-economic profiles and media aspects. One of the pieces of data stated that the number of microwave purchases was low, this could mean either two things: people eat out often or people do not use the microwave to prepare meals. It also states that eating out is extremely popular in Stockbridge, particularly in the evenings, and all cuisines are popular except English. These two pieces of data are very useful because they show that many people do not eat at home but go out to restaurants. A Subway branch has potential to be one of these restaurants that people go out to eat at. The number of households in the area with two or more cars is rated high by the ACORN profile. This could mean that incomes may be fairly high and couples live together. If there are two cars then each one will probably be for each person in the couple, so at least one person in the relationship will work because they need two cars because they will be doing two different things at the same time. This will mean that there is at least one professional in each household and they will most likely be a young professional because 47. 6% of people in Stockbridge are 20-49 years of age. The socio-economic profile for the area is the population is well educated and there are nearly three times the amounts of professionals in Stockbridge than the national average. Young professionals are the target market for the Subway restaurant so this information is very promising in constructing a customer base. Attitudes are very important in every day life. They can determine what we buy, where we go and what we do. ACORN tells that there is a 60% greater chance of someone being a vegetarian in Stockbridge than the national average. This may be the cause for the low meat consumption in the area. The most popular grocery products are ground coffee, dog food, mineral water, fresh fish and fresh fruit. Subway provides its customers with a range of fresh products and almost all sandwiches bought have salad and other vegetables in them. It seems that people in Stockbridge enjoy fresh foods and do not eat much meat. Because of the customisability of the sandwiches, the customers can choose what they would like on their sandwich so if they do not want meat, it will not be added to their sandwich. Unfortunately, winter holidays are 73% more popular and long holidays are 2. 7 times more popular than the national average so sales may be expected to decrease in the winter and on holiday occasions. Many of the young professionals will not travel though because they will be hard working and want to spend lots of time on their job so may not want to travel far away, such as abroad. Stockbridge is a very affluent area with 3. 5 times more people earning i 40,000 per annum than the national average. This will mean there is more professionals in the area than in other places. Professionals take their jobs very seriously and do not have long lunch breaks so fast service is very important along with the healthy lifestyle the majority of people now lead. Leisure activities are very popular in the area as people are very active. According to ACORN, they do lots of sports so probably live by the attitude of a healthy body is a healthy mind. One part of having a healthy body is the food they eat, eating at Francos (an unhealthy restaurant in Stockbridge) would not be a common option for healthy eaters, instead they would probably prefer a healthy sandwich. The results of my survey indicated that most people questioned in my random sample were between the ages of 20 to 39 as shown in the below distribution graph. These ages are also the type of age which most commonly care about their general health, so it is very promising when these are the sorts of people the target market for the sandwich restaurant would be. Most of the people in the survey turned out to live in the area. Each person who answered that they would visit the restaurant if one were to open in Stockbridge and also said they lived in the area may become regular customers due to the ease of being able to reach the restaurant and they also expressed an interest in visiting the store. Repeat customers are vital to the success of a business and make up most of the total number of sales a business will receive. This market seems to have vast amounts of young professionals in it which are the main target market. The healthy choice Subway provides would well suit the healthy attitude that most of the people of Stockbridge seem to live on so therefore there is a fairly high demand for healthy fast-food but there is no supply. A niche has been found in the market.

Wednesday, August 21, 2019

Teenage Pregnancy Essay Example for Free

Teenage Pregnancy Essay Challenges of Teenage Parenthood A. Parenthood Options B. Continuing Education C. Financial Problems V. Conclusion Teenage pregnancy is a major concern in todays society ;there are many ways to prevent teenage pregnancy, many people to get advice from, and many decisions a teenage parent must make. The statistics tell that the U. S. has the highest rate of teen pregnancy Teen Pregnancy Teen Pregnancy ; Parenting You sit there tense, your face is turning cherry red, your eyes are fixed on the little white machine, and you feel like the suspense is and births. More than 4 out of ten young women become pregnant at least once before they reach the age of 20-nearly one billion a year(Teen Pregnancy Facts and Stats 1). Teenage pregnancy has declined slowly but steadily. These recent declines reverse the 24-percent rise in the teenage birth rate from 1986 to 1991 (Teen Pregnancy Facts and Stats 1). Usually only one-third of teenage mothers receive a high school diploma. The rest of the mothers usually end Teen Pregnancy You sit there tense, your face is turning cherry red, your eyes are fixed on the little white machine, and you feel like the suspense is killing you, two minutes p on welfare. A majority of both boys and girls who are sexually active wish they had waited. Eight in ten girls and six in ten boys say they wish they had waited (Teen Pregnancy Facts and Stats 1). Many people are concerned about the problems teenage parents and their children face. The health risks for a teenage girl who becomes pregnant increase sharply. One of the concerns of teenage mothers is the health risk. Usually young women have Teen Pregnancy Teen Pregnancy Over the past two decades, the rates of teen pregnancy have grown dramatically. According to the Prevention of Teen Pregnancy, approximately every thirty-one seconds teenage pregnant in the more complications in pregnancy than older women. The most hazardous complication is low birth weight. One out of seven babies born to teenage mothers have a low birth weight (Hildebrand 88). Poor eating habits, smoking, or using alcohol or drugs, cause low birth weight. Premature babies and babies with low birth weights often have organs that havent fully developed, such as lungs, heart and brain. These babies get sick easier than normal weight babies. As a result Teen Pregnancy The situation is as follow: A teen girl (anywhere from the age thirteen to eighteen) finds herself in a sexual relationship with a male. The end result is from what was motioned above, teenage mothers are considered to be in the high-risk health category. They need good prenatal care as soon as they find out they are pregnant. A doctor, nurse, or other medical practitioner gives most of the information about nutrition. Prenatal care can help prevent pregnancy complications and improve ones chances of having a healthy baby. The best way to prevent teenage pregnancy, which is 100% effective, is abstinence. Most teenagers have a whole Teen pregnancy Teen Pregnancy There are a lot of teen mothers growing up in this world wondering, what if I would have stayed in school? What could I have become? life ahead of them and having a child will cause a lot of complications in your goals. Its not impossible for teenage mothers to complete high school, or try to reach their goals in life, but having a child could very well interfere with these goals. Another way of protection is condoms. There are a lot of protections out there, but these protections are not 100-percent reliable. There are a lot of places and people to go to Teen Pregnancy Teen Pregnancy There are a lot of teen mothers growing up in this world wondering, what if I would have stayed in school? What could I have become? for support and advice. In addition there are many organizations and hotlines a teenage mother can contact for advice and assistance. Parents and family are one alternative. There are a lot of teenagers that are afraid of their parents reactions. However, most parents are calmer and more supportive than teenagers expect. Most parents are shocked when the teenager comes and tells them that they are pregnant. Just give the parents time and they will try to give their Teen pregnancy Teen Pregnancy There are a lot of teen mothers growing up in this world wondering, what if I would have stayed in school? What could I have become? teenager the best advice that they know. The school nurse or counselor is another place to get advice. The counselor usually can gather up pamphlets and brochures about pregnancy. The counselor can also help the teenager remain in school. They are very supportive and understanding. Doctors and clinics are very important for a teenage parent to go to. There are a lot of home pregnancy tests available, but the doctor is a lot more reliable and gives

Tuesday, August 20, 2019

The real-time transport protocol

The real-time transport protocol Abstract This paper describes the Real-time Transport Protocol (RTP) with the emphasis on the securities, confidentiality and authenticity. This system takes a media file as input, encrypt it and create a message digest on the encrypted data then transmit it to the user. On the other side the receiver again calculate digest and compare it with the received one, if match occurs then decrypt and play it in the real time player. In current specification of RFC1889, only the confidentiality is described and authenticity is left for lower layer protocols. This work made experiment both on authenticity and confidentiality. For authenticity MD5, SHA-1 and SHA-2 hash algorithms can be used and for confidentiality AES-128 and Triple DES cryptographic algorithms can be used. In fact, SHA-2 is better than other hash algorithms in terms of security but SHA-1 is better than SHA-2 in terms of time efficiency. On the other hand, AES-128 is better than Triple DES in terms of time efficiency and security. So SHA-1and AES-128 is chosen for authenticity and confidentiality respectively for the security of RTP. The experiment is performed on J2SDK1.5. Keywords: Real-time transport protocol; Transport control protocol; Cryptographic algorithm; Hash algorithm. 1. Introduction: In recent days Computer and Internet has become essential part of human life and people demanding more and more access and use data over the Internet in Real-time with efficient secure manner. A new protocol Real-time Transport Protocol (RTP) and its associated Protocols helping people to use data over the Internet in their real-time applications. In this paper, the analyses of the securities of RTP, an approach to modify RTP for authenticity are presented. Also the position of RTP in Computer Network Layers, its usage scenario and the importance of time consideration to transmit streams using RTP are discussed and shown their analytical results. RTP is intended to be malleable to provide the information required by a particular application and will often be integrated into the application processing rather than being implemented as a separate layer. RTP is a modular protocol. The usage of RTP for a specific purpose requires an application area specific RTP profile. RTP profiles are used for refining the basic RTP protocol to suit for a particular application area. RTP profiles define how and by which formats data is encapsulated to RTP packets. RFC 1889 defines basic fields for the transportation of real time data. It also defines Real-time Transport Control Protocol (RTCP), whose purpose is to provide feedback on transmission quality, information about pa rticipants of RTP session, and enable minimal session control services. RTP is an application level protocol that is intended for delivery of delay sensitive content, such as audio and video, through different networks. The purpose of RTP is to facilitate delivery, monitoring, reconstruction, mixing and synchronization of data streams. RTP provides end-to-end network transport functions suitable for applications transmitting real-time data. RTP is a protocol framework that is deliberately not complete. RTP dose not provide quality of service means that it has no flow control, no error control, no acknowledgement and no mechanism to request retransmission. It does not do so because if a missing packet is retransmitted then it might happen that the retransmitted packet reach to the user too late to use which may hamper real-time use of streams. If some packets are lost during transmission (it is very common for Real-time protocols) then the lost packets are generated by interpolation rather than retransmission. However to improve performance of RTP another protocol; Real-time Transport Control Protocol is used with RTP. It handles feedback on delay, jitter, bandwidth, congestion, and other network properties. RTCP also handles inter stream synchronization. The problem is that different streams may use different clocks, with different granularities and different drift rates. RTCP can be used to keep them in synchronization. RTCP is also supports the use of RTP level translators and mixers. The paper is organized as follows. In section 2, RTP use scenarios are discussed. In section 3, position of RTP in computer network is discussed. In section 4, time consideration in RTP is discussed. In section 5, RTP packet format, its data transfer protocol and Real-time Transport control Protocol (RTCP) is discussed. Section 6 details the hash and cryptographic algorithms for RTP security while section 7 shows the result and performance analysis. Lastly, section 8 points out the conclusion inferred from the work. 2. RTP use scenarios: The following sections describe some aspects of the use of RTP. The examples are chosen to illustrate the basic operation of applications using RTP. In these examples, RTP is carried on top of IP and UDP and follows the conventions established by the profile for audio and video specified in the companion Internet-Draft draft-ietf-avt-profile. 2.1 Simple multicast audio conference: A working group of the IETF meets to discuss the latest protocol draft, using the IP multicast services of the Internet for voice communications. Through some allocation mechanism the working group chair obtains a multicast group address and pair of ports. One port is used for audio data, and the other is used for control (RTCP) packets. This address and port information is distributed to the intended participants. If privacy is desired, the data and control packets may be encrypted, in which case an encryption key must also be generated and distributed. The exact details of these allocation and distribution mechanisms are beyond the scope of RTP. The audio conferencing application used by each conference participant sends audio data in small chunks of, say, 20 ms duration. Each chunk of audio data is preceded by an RTP header; RTP header and data jointly form a UDP packet. The RTP header indicates what type of audio encoding (such as PCM, ADPCM or LPC) is contained in each packet so that senders can change the encoding during a conference, for example, to accommodate a new participant that is connected through a low-bandwidth link or react to indications of network congestion. The Internet, like other packet networks, occasionally loses and reorders packets and delays them by variable amounts of time. To cope with these impairments, the RTP header contains timing information and a sequence number that allow the receivers to reconstruct the timing produced by the source, so that in this example, chunks of audio are contiguously played out the speaker every 20 ms. This timing reconstruction is performed separately for each source of RTP packets in the conference. The sequence number can also be used by the receiver to estimate how many packets are being lost. Since members of the working group join and leave during the conference, it is useful to know who is participating at any moment and how well they are receiving the audio data. For that purpose, each instan ces of the audio application in the conference periodically multicasts a reception report plus the name of its user on the RTCP (control) port. The reception report indicates how well the current speaker is being received and may be used to control adaptive encoding. In addition to the user name, other identifying information may also be included subject to control bandwidth limits. A site sends the RTCP BYE packet when it leaves the conference. 2.2 Audio and Video Conference: If both audio and video media are used in a conference, they are transmitted as separate RTP sessions RTCP packets are transmitted for each medium using two different UDP port pairs and/or multicast addresses. There is no direct coupling at the RTP level between the audio and video sessions, except that a user participating in both sessions should use the same distinguished (canonical) name in the RTCP packets for both so that the sessions can be associated. One motivation for this separation is to allow some participants in the conference to receive only one medium if they choose. Despite the separation, synchronized playback of a sources audio and video can be achieved using timing information carried in RTCP packets for both sessions 2.3 Mixers and translators: So far, it is assumed that all sites want to receive media data in the same format. However, this may not always be appropriate. Consider the case where participants in one area are connected through a low-speed link to the majority of the conference participants who enjoy high-speed network access. Instead of forcing everyone to use a lower-bandwidth, reduced-quality audio encoding, an RTP-level relay called a mixer may be placed near the low-bandwidth area. This mixer resynchronizes incoming audio packets to reconstruct the constant 20 ms spacing generated by the sender, mixes these reconstructed audio streams into a single stream, translates the audio encoding to a lower-bandwidth one and forwards the lower-bandwidth packet stream across the low-speed link. These packets might be unicast to a single recipient or multicast on a different address to multiple recipients. The RTP header includes a means for mixers to identify the sources that contributed to a mixed packet so that corr ect talker indication can be provided at the receivers. Some of the intended participants in the audio conference may be connected with high bandwidth links but might not be directly reachable via IP multicast. For example, they might be behind an application-level firewall that will not let any IP packets pass. For these sites, mixing may not be necessary; in which case another type of RTP-level relay called a translator may be used. Two translators are installed, one on either side of the firewall, with the outside one funneling all multicast packets received through a secure connection to the translator inside the firewall. The translator inside the firewall sends them again as multicast packets to a multicast group restricted to the sites internal network. Mixers and translators may be designed for a variety of purposes. An example is a video mixer that scales the images of individual people in separate video streams and composites them into one video stream to simulate a group scene. Other examples of translation include the connection of a group of hosts speaking only IP/UDP to a group of hosts that understand only ST-II, or the packet-by-packet encoding translation of video streams from individual sources without resynchronization or mixing. 3. Position of RTP in computer network: As a consequence it is decided to put RTP in user space but should run over User Datagram Protocol (UDP, it is connectionless transport protocol). RTP operates as follows. The multimedia (streams) application consists of multiple audio, video, text and possibly other streams. These are fed into the RTP library, which is in user space along with the application. This library then multiplexes the streams and encodes those RTP packers, which it then stuffs into a socket. At the other end of socket (in the operating system kernel), UDP packets are generated and embedded in IP packets. If computer is on an Ethernet, the IP packets are then put in Ethernet frames for transmission. The protocol stack for this situation is shown in Figure 1. Since RTP runs in user space not in OS kernel and in the Ethernet it packed by UDP, then IP and then Ethernet, so it is difficult which layer RTP is in. But it is linked to application program and it is generic, application independent protocol that just provides transport facilities, so it is a transport protocol that is implemented in the application layer. The packet nesting is shown in Figure 2. The main goal of RTP is to make the transmitting streams real-time applicable. On the other hand if security is provided to the transmitting streams, then some extra time is needed to encrypt the streams or to make signature such as making digest from entire movie or audio files. So in concern of time, security is added with some overheads to the RTP. The goal of this paper is to choose algorithms and procedures that make RTP reliable in term of time and security. 4. Time consideration in RTP: Let a video or audio file over the Internet in real-time is intended to access, then here the most important parameter is bandwidth of the Network. And the next important parameters are minimum clip size and its duration as well as processors speed of both server and client. At first let it be assumed that files are accessing without security consideration. Then let review the following mathematical calculations for audio or video clip to access in real-time. One second file clip size = oneSecFileSize bits, Time duration of each clip = cSec seconds, Upload Transmission rate = uRate bits per second, Download Transmission rate = dRate bits per second, Time to upload, tUpload = oneSecFileSize *cSec/uRate, Time to download, tDownload = oneSecFileSize If the time to upload or download a clip is more than the time to play a clip, the player will wait and the receiver will see a break, i.e. max (tUpload, tDownload) >cSec. For the continuous playing of clips, the following condition must be true: Max (1/uRate, 1/dRate) > 1/ oneSecFileSize Min (uRate, dRate) > oneSecFileSize According to the equation, the waiting time between clips at the receiver does not depend on clip size. The only variable that matters for a continuous playback is the size of a one-second file and that the provided upload and download rates meet the above condition. Lag time between playing and capturing is: cSec + tupload + tdownload From the above equation, the maximum lag with no break in the feed is 3*cSec and the minimum lag is cSec. To get the clip as close to real time as possible, cSec should be reduced. Next, apply the above analysis to the following cases: 4.1 Both sender and receiver have a low bandwidth modem connection: Lets assume the uRate = dRate = 20K bits/sec. In this case, the one-second file size should be less than 20Kbits. If the clip size is 10 seconds, the maximum playback lag will be 30 seconds. It is observed that the minimum file size for transmitting a one-second video (with no audio) is 8Kbits using H263 encoding and 12896 pixels video size. It is also observed a minimum file size with the video and an 8-bit mono audio with an 8000Hz-sampling rate to be 80Kbits. 4.2 Either the sender or the receiver has a low bandwidth connection: Lets assume that the lower rate is 20Kbits/sec and the other rate is much higher. In this case the one-second file size should be less than 20Kbits, but the maximum playback lag is about 20 seconds if the clip size is 10 seconds. 4.3 Both sender and receiver have high bandwidth: It is noted here that the one-second-clip size may vary from the format to format of the file, that is, how the file is encoded. For example the one-second-clip size of MP3 is less than in WAV file. But the important point here is that when cryptographic algorithms are applied in the clip then an extra time is added to the processing of clip with each side. So if applied strong encryption algorithms to the clip then extra more time is needed to both sides and upload or download time will be affected and time lag between them will also be changed. So real time access of data is also affected. Therefore, providing security in RTP the considered parameters are bandwidth of the network, file format of clips, upload and download of the clip, processor and memory speed and applying cryptographic and hash algorithms. 5. RTP packet format and data transfer protocol: RTP packet formats and its Data Transfer Protocol is as follows: 5.1 RTP fixed header files: Whenever data are transferred with RTP, it always add a fixed header with the payload. The RTP header has the following format shown in figure 4: The first twelve octets are present in every RTP packet, while the list of CSRC identifiers is present only when inserted by a mixer. Version (V) is 2 bits wide. This field identifies the version of RTP. The version defined by this specification is two (2). Padding (P) is 1 bit wide. If the padding bit is set, the packet contains one or more additional padding octets at the end which are not part of the payload. The last octet of the padding contains a count of how many padding octets should be ignored. Padding may be needed by some encryption algorithms with fixed block sizes or for carrying several RTP packets in a lower-layer protocol data unit. Extension (X) is 1 bit wide. If the extension bit is set, the fixed header is followed by exactly one header extension. CSRC Count (CC) is 4 bits wide. The CSRC count contains the number of CSRC identifiers that follow the fixed header. Marker (M) is 1 bit wide. The interpretation of the marker is defined by a profile. It is intended to al low significant events such as frame boundaries to be marked in the packet stream. A profile may define additional marker bits or specify that there is no marker bit by changing the number of bits in the payload type field. Payload type (PT) is 7 bits wide. This field identifies the format of the RTP payload and determines its interpretation by the application. A profile specifies a default static mapping of payload type codes to payload formats. Additional payload type codes may be defined dynamically through non-RTP means. An initial set of default mappings for audio and video is specified in the companion profile Internet-Draft draft-ietf-avt-profile, and may be extended in future editions of the Assigned Numbers RFC [9]. An RTP sender emits a single RTP payload type at any given time; this field is not intended for multiplexing separate media streams. Sequence number is 16 bits wide. The sequence number increments by one for each RTP data packet sent, and may be used by the rece iver to detect packet loss and to restore packet sequence. The initial value of the sequence number is random (unpredictable) to make known-plaintext attacks on encryption more difficult, even if the source itself does not encrypt, because the packets may flow through a translator that does. Time stamp is 32 bits wide. The timestamp reflects the sampling instant of the first octet in the RTP data packet. The sampling instant must be derived from a clock that increments monotonically and linearly in time to allow synchronization and jitter calculations. The resolution of the clock must be sufficient for the desired synchronization accuracy and for measuring packet arrival jitter (one tick per video frame is typically not sufficient). The clock frequency is dependent on the format of data carried as payload and is specified statically in the profile or payload format specification that defines the format, or may be specified dynamically for payload formats defined through non-RTP mean s. If RTP packets are generated periodically, the nominal sampling instant as determined from the sampling clock is to be used, not a reading of the system clock. As an example, for fixed-rate audio the timestamp clock would likely increment by one for each sampling period. If an audio application reads the blocks covering 160 sampling periods from the input device, the timestamp would be increased by 160 for each such block, regardless of whether the block is transmitted in a packet or dropped as silent. The initial value of the timestamp is random, as for the sequence number. Several consecutive RTP packets may have equal timestamps if they are (logically) generated at once, e.g., belong to the same video frame. Consecutive RTP packets may contain timestamps that are not monotonic if the data is not transmitted in the order it was sampled, as in the case of MPEG interpolated video frames. SSRC is 32 bits wide. The SSRC field identifies the synchronization source. This identifier i s chosen randomly, with the intent that no two synchronization sources within the same RTP session will have the same SSRC identifier although the probability of multiple sources choosing the same identifier is low, all RTP implementations must be prepared to detect and resolve collisions. If a source changes its source transport address, it must also choose a new SSRC identifier to avoid being interpreted as a looped source. The CSRC list contains 0 to15 items, 32 bits each. The CSRC list identifies the contributing sources for the payload contained in this packet. The number of identifiers is given by the CC field. If there are more than 15 contributing sources, only 15 may be identified. CSRC identifiers are inserted by mixers, using the SSRC identifiers of contributing sources. For example, for audio packets the SSRC identifiers of all sources that were mixed together to create a packet is listed, allowing correct talker indication at the receiver. 5.2 Multiplexing RTP sessions: For efficient protocol processing, the number of multiplexing points should be minimized. In RTP, multiplexing is provided by the destination transport address (network address and port number), which defines an RTP session. For example, in a teleconference composed of audio and video media encoded separately, each medium should be carried in a separate RTP session with its own destination transport address. It is not intended that the audio and video be carried in a single RTP session and demultiplexed based on the payload type or SSRC fields. Interleaving packets with different payload types but using the same SSRC would introduce several problems: If one payload type were switched during a session, there would be no general means to identify which of the old values the new one replaced. An SSRC is defined to identify a single timing and sequence number space. Interleaving multiple payload types would require different timing spaces if the media clock rates differ and would require different sequence number spaces to tell which payload type suffered packet loss. The RTCP sender and receiver reports can only describe one timing and sequence number space per SSRC and do not carry a payload type field. An RTP mixer would not be able to combine interleaved streams of compatible media into one stream. Carrying multiple media in one RTP session precludes: the use of different network paths or network resource allocations if appropriate; reception of a subset of the media if desired, for example just audio if video would exceed the available bandwidth; and receiver implementations that use separate processes for the different media, whereas using separate RTP sessions permits either single- or multiple-process implementations. Using a different SSRC for each medium but sending them in the same RTP session would avoid the first three problems but not the last two. 5.3 Profile-Specific modifications to the RTP header: The existing RTP data packet header is believed to be complete for the set of functions required in common across all the application classes that RTP might support. However, in keeping with the ALF design principle, the header may be tailored through modifications or additions defined in a profile specification while still allowing profile-independent monitoring and recording tools to function. The marker bit and payload type field carry profile-specific information, but they are allocated in the fixed header since many applications are expected to need them and might otherwise have to add another 32-bit word just to hold them. The octet containing these fields may be redefined by a profile to suit different requirements, for example with a more or fewer marker bits. If there are any marker bits, one should be located in the most significant bit of the octet since profile-independent monitors may be able to observe a correlation between packet loss patterns and the marker bit. Addit ional information that is required for a particular payload format, such as a video encoding, should be carried in the payload section of the packet. This might be in a header that is always present at the start of the payload section, or might be indicated by a reserved value in the data pattern. If a particular class of applications needs additional functionality independent of payload format, the profile under which those applications operate should define additional fixed fields to follow immediately after the SSRC field of the existing fixed header. Those applications will be able to quickly and directly access the additional fields while profile-independent monitors or recorders can still process the RTP packets by interpreting only the first twelve octets. If it turns out that additional functionality is needed in common across all profiles, then a new version of RTP should be defined to make a permanent change to the fixed header. 5.4 RTP header extension: An extension mechanism is provided to allow individual implementation to experiment with new payload-format-independent functions that require additional information to be carried in the RTP data packet header. This mechanism is designed so that the header extension may be ignored by other interoperating implementations that have not been extended. Note that this header extension is intended only for limited use. Most potential uses of this mechanism would be done better another way, using the methods described in the previous section. For example, a profile-specific extension to the fixed header is less expensive to process because it is not conditional nor in a variable location. Additional information is required for a particular payload format should not use this header extension but should be carried in the payload section of the packet. If the X bit in the RTP header is one, a variable-length header extension is appended to the RTP header, following the CSRC list if present. Th e RTP header extension is shown in figure 5: The header extension contains a 16-bit length field that counts the number of 32-bit words in the extension, excluding the four-octet extension header (therefore zero is a valid length). Only a single extension may be appended to the RTP data header. To allow multiple interoperating implementations to each experiment independently with different header extensions, or to allow a particular implementation to experiment with more than one type of header extension, the first 16 bits of the header extension are left open for distinguishing identifiers or parameters. The format of these 16 bits is to be defined by the profile specification under which the implementations are operating. This RTP specification does not define any header extensions itself. 5.5 Real-time Transport Control Protocol (RTCP): RTCP is a coordination protocol of RTP. It provides some tasks to increase the performance of RTP. The RTP control protocol (RTCP) is based on the periodic transmission of control packets to all participants in the session, using the same distribution mechanism as the data packets. The underlying protocol must provide multiplexing of the data and control packets, for example using separate port numbers with UDP. RTCP performs four functions: The primary function is to provide feedback on the quality of the data distribution. This is an integral part of the RTPs role as a transport protocol and is related to the flow and congestion control functions of other transport protocols. The feedback may be directly useful for control of adaptive encodings, but experiments with IP multicasting have shown that it is also critical to get feedback from the receivers to diagnose faults in the distribution. Sending reception feedback reports to all participants allows one who is observing problems to evaluate whether those problems are local or global. With a distribution mechanism like IP multicast, it is also possible for an entity such as a network service provider who is not otherwise involved in the session to receive the feedback information and act as a third-party monitor to diagnose network problems. This feedback function is performed by the RTCP sender and receiver reports. RTCP carries a persistent transport-level identifier for an RTP source called the canonical name or CNAME. Since the SSRC identifier may change if a conflict is discovered or a program is restarted, receivers require the CNAME to keep track of each participant. Receivers also require the CNAME to associate multiple data streams from a given participant in a set of related RTP sessions, for example to synchronize audio and video. The first two functions require that all participants send RTCP packets; therefore the rate must be controlled in order for RTP to scale up to a large number of participants. By having each participant send its control packets to all the others, each can independently observe the number of participants. This number is used to calculate the rate at which the packets are sent. A fourth, optional function is to convey minimal session control information, for example participant identification to be displayed in the user interface. This is most likely to be useful in loosely controlled sessions where participants enter and leave without membership control or parameter negotiation. RTCP serves as a convenient channel to reach all the participants, but it is not necessarily expected to support all the control communication requirements of an application. A higher-level session control protocol, which is beyond the scope of this document, may be needed. Functions (i)-(iii) are mandatory when RTP is used in the IP multicast environment, and are recommended for all environments. RTP application designers are advised to avoid mechanisms that can only work in unicast mode and will not scale to larger numbers. 5.6 RTCP transmission interval: RTP is designed to allow an application to scale automatically over session sizes ranging from a few participants to thousands. For example, in an audio conference the data traffic is inherently self-limiting because only one or two people will speak at a time, so with multicast distribution the data rate on any given link remains relatively constant independent of the number of participants. However, the control traffic is not self-limiting. If the reception reports from each participant were sent at a constant rate, the control traffic would grow linearly with the number of participants. Therefore, the rate must be scaled down. For each session, it is assumed that the data traffic is subject to an aggregate limit called the session bandwidth to be divided among the participants. This bandwidth might be reserved and the limit enforced by the network, or it might just be a reasonable share. The session bandwidth may be chosen based or some cost or a priori knowledge of the available network bandwidth for the session. It is somewhat independent of the media encoding, but the encoding choice may be limited by the session bandwidth. The session bandwidth parameter is expected to be supplied by a session management application when it invokes a media application, but media applications may also set a default based on the single-sender data bandwidth for the encoding selected for the session. The application may also enforce bandwidth limits based on multicast scope rules or other criteria. Bandwidth calculations for control and data traffic include lower- layer transport and network protocols (e.g., UDP and IP) since that are what the resource reservation system would need to know. The application can also be expected to know which of these protocols are in use. Link level headers a

Monday, August 19, 2019

tundra :: essays research papers

The tundra artic plains completely covering most of the earth’s lands north of the coniferous forest belt. The tundra’s ecosystem is very sensitive. It doesn’t have a good ability to restore itself. Controlled by sedge, heath, willow, moss, and lichen. Plains that are pretty much alike, called alpine tundra, occur above the timberline in the high mountains of the world. Even the Antarctic area has a couple of its own arctic regions itself.   Ã‚  Ã‚  Ã‚  Ã‚  The climate of the tundra is characterized by harsh winters. The average temperature in the tundra area is about –27 degrees. But what is even worse are the long night. At nights the lowest temperture recorded was –67.36 degrees. There are even times in the year when the sun doesn’t come up for days. In the tundra we have little snow and even less rainfall. The rainfall is about a quarter inch in a yearly rainfall. Even though the tundra’s winters are long a harsh there summers are the shortest season of all. Do to the terrible weather and climate in the tundra their animals and plant life is very limited. This artic tundra is mainly formed by permafrost, â€Å"a layer of permanently frozen subsoil in the ground. Putting frozen ground and flat landscape stops the drainage of water. As the water is being held up on the surface it makes ponds and bogs that give moisture for the plants, or countering the low precipitation. â€Å"The periodic freezing and thawing of the soil forms cracks in the ground in regularly patterned polygons†. Some areas are not drained very well causing irregular landforms. Some of these landforms like the following hummocks, or knolls, frost boils, and earth stripes. Another common area to the alpine tundra is a â€Å"bare rock covered ground† also known as fell fields, in which not alone support but helps the growth of lichens. The many â€Å"microhabitats† given by these landforms provide a variety to the tundra’s landscape. As you already know the amount of different plant species in the tundra is very few. Also their growth level is low, â€Å"with most of the biomass concentrated in the roots. To add to the many difficulties the growing season isn’t very long its self. The plants are better off â€Å"to reproduce vegetative by division and budding than sexually by flower pollination†. The main plant life in that area is cotton grass, sedge, and dwarf heath also including mosses and lichens. tundra :: essays research papers The tundra artic plains completely covering most of the earth’s lands north of the coniferous forest belt. The tundra’s ecosystem is very sensitive. It doesn’t have a good ability to restore itself. Controlled by sedge, heath, willow, moss, and lichen. Plains that are pretty much alike, called alpine tundra, occur above the timberline in the high mountains of the world. Even the Antarctic area has a couple of its own arctic regions itself.   Ã‚  Ã‚  Ã‚  Ã‚  The climate of the tundra is characterized by harsh winters. The average temperature in the tundra area is about –27 degrees. But what is even worse are the long night. At nights the lowest temperture recorded was –67.36 degrees. There are even times in the year when the sun doesn’t come up for days. In the tundra we have little snow and even less rainfall. The rainfall is about a quarter inch in a yearly rainfall. Even though the tundra’s winters are long a harsh there summers are the shortest season of all. Do to the terrible weather and climate in the tundra their animals and plant life is very limited. This artic tundra is mainly formed by permafrost, â€Å"a layer of permanently frozen subsoil in the ground. Putting frozen ground and flat landscape stops the drainage of water. As the water is being held up on the surface it makes ponds and bogs that give moisture for the plants, or countering the low precipitation. â€Å"The periodic freezing and thawing of the soil forms cracks in the ground in regularly patterned polygons†. Some areas are not drained very well causing irregular landforms. Some of these landforms like the following hummocks, or knolls, frost boils, and earth stripes. Another common area to the alpine tundra is a â€Å"bare rock covered ground† also known as fell fields, in which not alone support but helps the growth of lichens. The many â€Å"microhabitats† given by these landforms provide a variety to the tundra’s landscape. As you already know the amount of different plant species in the tundra is very few. Also their growth level is low, â€Å"with most of the biomass concentrated in the roots. To add to the many difficulties the growing season isn’t very long its self. The plants are better off â€Å"to reproduce vegetative by division and budding than sexually by flower pollination†. The main plant life in that area is cotton grass, sedge, and dwarf heath also including mosses and lichens.

Intergumentary System Essay example -- Biology, Organisms, Atoms

Organisms are composed of atoms that form molecules which form macromolecules (Shier, Butler, & Lewis, 2009). These molecules join and form organelles which structure cell that for tissues (p.3). Tissues form organs and the organs working together form organ system (p3). These organ systems make up the organism (p3). Each organ system has an important function in the body. These systems all work together in order to keep and support the conditions that the cells, tissues, and organs need to function properly. There is one system that is not as well known as other; it is the intergumentary system. Most people know the organs of the intergumentary system, but they do not know that these organs work together to form this system. The intergumentary system is composed of the skin and the structures related to the skin, which include the hair, the finger nails, the sensory receptors and the glands (Shier, Butler, & Lewis, 2009). This system has an important function since it provides protection to the body, helps to maintain body temperature, and contains sensory receptors (p.117). The skin which is the largest organ in the body and an organ of the intergumentary system has essential function such as regulating homeostasis and body temperature, also delaying the loss of water from deeper tissues, storing sensory receptor, synthesizing biomechanical, and discharging waste from the body (p.117). The skin has two layers: the epidermis (outer layer) and the dermis (inner layer) (p.117). There is also a subcutaneous layer or hypodermis (Shier, Butler, & Lewis, 2009). According to Shier, Butler, and Lewis 2009 â€Å"as its name indicates, this layer is beneath the skin and not a true layer of the skin.† This layer has the blood vessels that su... ...se glands help to balance the body temperature (p.124). The fluid that this eccrine glands secret is transported outside of the body by a tube that has an opening to the exterior as a pore (p.124). Another sweat gland is the apocrine gland which is activated at puberty. According to Shier, Butler, and Lewis 2009 â€Å"these glands secrete by the same mechanism as eccrine glands, usually when a person is emotionally upset, frightened, in pain, or during sexual arousal.† Other sweat glands are seruminous glands which secret, and the female mammary glands which secrete milk (p.124). The nails which are another accessory of the skin cover and give protection to the end of fingers and toes (Shier, Butler, & Lewis, 2009). The nails have a lunula which is the area of growth in the nail (p.122). This means that if the lunula is damaged the nail probably will not growth again.

Sunday, August 18, 2019

Graduation Speech: Take Off Your Masks :: Graduation Speech, Commencement Address

What an honor to be standing here tonight as a representative of the Class of 2012! It's truly remarkable. We have all worked very hard to complete this part of our journey. I want to thank my kids Laddie, and Mate. And especially Ron, my loving companion. Without the support of our families, friends, fellow-classmates, instructors and staff, we wouldn't have made it this far! Let's show 'em our appreciation. These three certificates I'm receiving tonight represent a lot more to me than achievement of success. They are the keys that unlocked the door to a whole new world of possibility that I never new existed. I'd like to begin with an Arabian proverb: Strange how much you've got to know, before you know how little you know. Two years ago, I was a single mother of four, with a learning disability and 15 years of sobriety. I began experiencing anxiety attacks so I ceased operation of a non-profit organization I founded and ran for 10 years called the Family Support Network. Even though I had received a number of prestigious awards and been recognized nationally for my work, I resigned myself to being a clerical assistant for the rest of my life. Though I had dreamed of going to college, it was simply out of the question. It was at this juncture in my life that something happened that I initially perceived as a tragic event, but it turned out to be a turning point in my life. The mask I wore for so many years that covered my fears and insecurities about myself was removed, and I finally had an explanation for my quirky behaviors. One day I collapsed on the job and was hospitalized - not in a regular hospital but in a psychiatric hospital. The doctors diagnosed my symptoms as post traumatic stress disorder. In addition, I was also diagnosed with a mood and anxiety disorder. My self-esteem and outlook on life was at an all time low. It was at this point I hit bottom - and to my surprise this became the beginning of my journey to fulfill my destiny. My doctor in her infinite wisdom suggested I supplement my therapy by taking classes in mental health and chemical dependency here at the college. I'm sure by now you are wondering why I am sharing such intimate details about myself. My intent is to inspire and challenge you at the same time.

Saturday, August 17, 2019

Film Scene Analysis On Racism Depicted In The Movie Crash Essay

In the film Crash we are given a picture of all different kinds of social and multicultural differences, giving us an eye opening and often disturbing examples of racism that damages our society. The scene I have chosen to analyze is between 18:30 – 21:05 minutes in the movie Crash. Cameron and Christine are a black well off couple. They experience stereotyping and racism when they are driving home from a party. A white police officer pulls them over and performs a search on both Cameron and Christine. This scene illustrates the social and racial tensions, with a racist white officer molesting an innocent black woman. The scene is located in a residential neighborhood, in an American City. Although the time of date is not stated it is very dark and probably late at night as there a few cars that pass through the entire scene. There is a Christmas tree in the background, suggesting that this is set during the winter. Although it is dark and gloomy, we can depict that it is cold as Cameron is wearing a turtleneck and blazer, and the policeman are also wearing jackets. The scene revolves around four major characters, Cameron (Husband), Christine (Wife), Officer John, and Officer Tom. Cameron and Christine are pulled over by the two officers whilst driving a Black Navigator. The cop car is directly behind the black navigator, however most of the scene takes place near the Black Navigator. Around the characters there are a few malnourished trees, alongside with blurred streetlights and shop signs. There are glimpses of residential houses in the background indicating that they are in a suburban area. Cameron’s costume is a beige turtleneck, with a Dark brown blazer and black dress pants. He is also wearing a wedding ring, black leather strap watch, and frameless glasses. Christine is wearing a white cocktail dress, with the majority of her body exposed. She is wearing diamond earrings and a wedding ring. Officer John and Tom are wearing police issued jackets, black button down  shirt, black pants and black leather shoes. There is a police badge stitched into the jacket, and on the left arm of the jacket showing their rank. Throughout the scene the dialogue is accompanied by a faint eerie melody that is played at slow tempo. As Officer John is molesting Christine the camera starts to follow John’s hands up and down her backside. Most of the time the camera is focused on the characters faces, to allow the viewer a deeper insight into the situation. Cameron and Christine are both of African decent, and first generation Americans. Christine mentions at the start that Cameron is a Buddhist, and does not drink; however Christine does not oblige to the same lifestyle. Cameron is 5ft10, 40-50 years old, around 160-180 pounds and has his hair slick back. Christine is 5ft7, 40-50 years old, around 120-140 pounds and has her hair tied back. Officer John is around 5ft10-11, 30-40 years old; around 170-190 pounds, and slick back hair. Officer Tom is a younger version of John, around the ages of 20-30, same height and around 150-170 pounds with unpolished hair. When Cameron and Christine are pulled over by the Police, they smile at each other as if they just cracked a joke. When the police officers approach the vehicle and ask Cameron to step out the car, Christine loses it and starts mouthing off at Officer John calling him a â€Å"cracker†, boiling his blood. A key moment in the scene is when Christine searched by Officer John, and glares at Cameron signaling for help. Cameron makes eye contact and looks away in sadness signaling there is nothing he can do. Although Cameron does not speak out, we can clearly tell he is in distress and controlling his anger displayed through non-verbal behavior (Elliot Aronson et Al, 2012). While Officer John runs his hands down Christine’s backside he constantly glances at Cameron showing him the distribution of power in this situation. Although Cameron may be a movie director, John proves to him he is an officer of the law and holds more power than his money can buy. Officer Tom handles contains Cameron as he is forced to watch his partner perform sinful acts on the poor housewife. Through his facial expressions we can depict that he is clearly uncomfortable with his partner’s action, however he is unable to act against them. Officer John clearly outranks Tom in terms of superiority, and must follow his orders. Officer John is portrayed as a troubled racist white that feels the need to establish his racial dominance and authority. Although this could have been a long stemming hatred towards blacks (Attribution Theory (Elliot Aronson et Al, 2012)), it seems that an incident prior to the scene may have triggered his reaction. An Availability Heuristic (Elliot Aronson; Timothy D. Wilson; Robin M. Akert, 2012) may have readily been available for John when he saw a black man receiving fellatio from either a white/black female. Christine as mentioned before is slightly drunk throughout the scene, and starts mouthing off at Officer John. Although both Cameron and Christine realize that this is an act of racism Christine acted out of line by turning a bad situation into a worse one. In a way she was acting out of her Gender Role (Elliot Aronson et Al, 2012) as the male should be the one to deal with situations like this. In the marriage vows it says that you must protect your partner at all times, and is a common known fact when associating Gender Roles (Elliot Aronson et Al, 2012). The traditionally male roles of â€Å"provider† and â€Å"protector† are especially examined when the police officer is molesting Christine, and Cameron just watches in silence and despair. It is arguable that when confronted by police there are certain Demand Characteristics (Elliot Aronson et Al, 2012) that should be done, however in this case Cameron acted like a coward. It is interesting to observe the interaction between Cameron and Christine throughout the scene. Cameron shows his male dominance by telling Christine to â€Å"Shut Up, Stop Talking† and stay out of the situation. This proves that Cameron’s Social Cognition (Elliot Aronson et Al, 2012) is that he is in power and that his wife should listen to his words. Another key thing that was observed during the analysis was that Cameron was more afraid of the consequences against his own future career than his wife. To elaborate Cameron knew that if he intervened with Officer John he would be arrested and be all over the news. He was more concerned with his own image than his wife, which is why he stood there helplessly watching. Once the officers left, we can see that Cameron has been morally degraded and on the verge of succumbing into insanity. Christine starts to blame Cameron for his cowardly actions, although he does not seem to care much on the outside we can depict that it is doing a number on him mentally. When I first  watched this scene I was shocked to see Officer John abuse his power, whilst at the same time surprised to see Cameron and Officer Tom watch helplessly. Especially Cameron being her husband he shows no signs to try and help Christine. This scene is a clear example of Modern Racism (Elliot Aronson et Al, 2012), and how certain roles in society have the ability to abuse their power. It is also very interesting to see how social psychology plays a big role in how certain people make decisions. Such as Christine speaking out of place, John molesting Christine, and Tom and Cameron acting as innocent bystanders. References Elliot Aronson; Timothy D. Wilson; Robin M. Akert (2012), Social Psychology, Eight Edition, New Jersey, Pearson Education Inc, Retrieved from Coursesmart Library

Friday, August 16, 2019

Reaction Paper- Rizal Essay

â€Å"Does Rizal deserve to be our national hero?† This article written by Renato Constantino, is all about Rizal that does he really deserves to be a hero or not? The author compared Rizal to others national heroes in different countries, who is most decisively active in the fight for their freedom and leader of that revolution. Like in US, China, Vietnam and other countries mentioned from the article. But the author said Rizal is not our Revolution leader; in fact he repudiated that revolution. He’s just silent and being martyr for our country. Also he is an American-Sponsored Hero, Rizal chose as a model over other contestants- Aguinaldo too militant, Bonifacio too radical, Mabini unregenerate. We must view Rizal as an evolving personality within historical period. Additional, author’s purpose for this article is to remind us that our history is very important to us because it will serve to demonstrate how our presence has been distorted by a faulty knowledge of our past. For me, this article was still a question to the author of â€Å"Does Rizal deserves to be our National Hero?† There are several factors that Rizal deserves it and some are not. Because Rizal had certain qualities, he was able to serve the pressing social needs of the periods, needs that arose out of general and particular historical forces. As the author said, he is a hero in the sense that he was able to see problems generated by historical forces, discern the new social needs created by the historical development of new social relationships, and take an active part in meeting these needs. But he is not a hero in the sense of he could have stopped and altered the course of events. Although Rizal was already a revered figure and became more so after his martyrdom, it cannot be denied that his pre-eminence among heroes was partly the result of American sponsorship. Also, he was the first Filipino limited Filipino, the ilustrado Filipino, who fought for national unity but feared the Revolution and loved his mother country, yes, but in his own ilustrado way. Rizal never advocated independence, nor did he advocate armed resistance to the government. He urged from within by publicity, by public education, and appeal to the public conscience. What  if Rizal is not our National hero? Maybe Bonifacio can be our National hero because he fights for our country and he is too revolutionary. When the goals of the people are finally achieved, Rizal the first Filipino will be canceled by the true Filipino by whom he will be remembered as a great catalyst in the transformation of the decolonized indios. But still, there are so many reason that Rizal deserves to be our National Hero. So, I think the author balanced this view of article. The author explained the opinion of both. Honestly, I am not really interested about this article. There are so many questions in my mind says, â€Å"it happened, he’s our national hero, what are these articles complaining or explaining† â€Å"why do we need to study about this?† But it’s required to us to read this article and make a reaction paper to this, and then I realized that it is important to us (Filipino) to understand our history. We must understand why Rizal is our national hero. It is also a reflection of our intellectual timidity, our reluctance to expose new causes unless we can find authorize, however remote, in Rizal. The exposure of his weaknesses and limitations will also mean our liberation, for he has, to a certain extent become part of the superstructure that supports present consciousness. That is why a critical evaluation of Rizal cannot but lead to a revision of our understanding of history and the role of the individual in history. I conclude that Rizal deserves to be our National Hero. If I would ask the author, what if Rizal is not our National Hero, who it will be? Why?