Monday, September 30, 2019

Concord Bookshop Organizational Change Essay

Today’s organizations are facing many challenges such as threats of inflation, deflation, and recession resulting worsening the economy of the United States. According to Borkowski (2005) and Spector (2010), they state that the economy worldwide is very difficult nowadays because many internal and external forces. One of the best seller bookshop, the Concord Bookshop, lost control over the market because of huge losses. To stay open to business the company needed a change. The company hired a new president to help the company to maintain finances and funcionality, but employees had tremendous resistance to the change. The company made a drastic plan to change employees behaviors to improve bussines, but owners of the bookshop did not use effective implementation for the change process. On the other hand, workers at Concord increased resistance to the change process because owners did have neither communication nor inclusion of changes; instead, they increase their fear and unc ertainty of the employees. Adding more, the owners failed to use effective redesign, mutual engagement, and shared diagnosis (Spector, 2010). This paper will define the phases in the organizational change process, including phases not completed or implemented at the Concord Bookshop leading the organization to fail. Assessment of Forces The Concord Bookshop had been on the market for 64 years, it was one of the best independent stores in New England, but they went off business because their profits were tightened. Other bookstores such Amazon Barnes and Nobel increased their finances because they made changes according to the needs of new technologies and customers expectations. The progressions of these bookstores were implemented by redesigning their business; so their earnings went higher. The Concord Bookshop had a particular characteristic to attract customers, according to Joanne Arnaud, director of the Boston Literacy Fund and a Concord resident, she signed the letter: â€Å"What make the Concord Bookshop different are the people and their institutional memory and their memory for a customer, they are so warm and welcoming† (Spector, 2010, p. 2). The organization needed a good strategic plan to maintain business open. The company needed a change, but they made a drastic plan that employees had strong resistance to the change. Owners failed to communicate the employees the shared diagnosis, the severity of the problem, and they did not use effective implementation for the change process. This happening made workers feel devaluated; they stated that something on their lives were lost. Adding more, the owners failed to use effective redesign and change process, mutual engagement, and shared diagnosis (Spector, 2010). Strategic Responsiveness According to Spector (2010), the president of Concord Morgan Smith’s attempted to bring financial discipline to the Concord Bookshop facing sensitive realities. Owners, employees, customers, and suppliers approved the desire of maintaining the store’s viability. In addition, Smith’s approach and the actions taken by leaders created resistance of the employees because they did not do the correct strategy to solve the company losses, also they did not implemented the plan; therefore, these errors led to resistance, conflict, and resentment. Identifying the need for change is vital; first, it is required to do an assessment on the organization, employees, finances, and structure. Implementation is crucial; however, it is necessary to do a deep recognition for effectiveness of strategic response. The main forces that make organizations to change are external, industry environments, and new operating requirements generated from these environments; for example, new technology available, new trends of selling on the Internet, and more. Today’s organizations are facing many challenges; for example, trade, and industry insecurity, wars, and terrorism weaken the economy globally. External forces affect in general weakening the economy of the United States. One of the major external forces affecting businesses is the increased use of technology and the availability of the Internet (Borkowski, 2005) (Spector, 2010). According to Spector (2010), strategic renewal requires organizational change, Concord Bookshop needed to move from a traditional and conservative store for British shoppers to Internet buyers. The strategy for renewal of business, leaders need to align internal processes, structures, and systems in accordance with demands of the market system. For example, â€Å"New organizational capabilities, talents and skills possessed by employees need to be built† (Spector, 2010, p. 5). Managers need to discontinue old behaviors on employees by selecting new approach, in which employees feel comfortable and secure to accept the change. Consequently, workers needed new orientation on-the-job, new tasks, and responsibilities to assure the viability of the company as well as employment. The goal of any organization is to create lasting modification in patterns of employee’s behaviors to support strategic renewal. Concord Bookshop Strategic Renewal was not implemented * Strategic renewal requires organizational change; in the case of Concord business was not implemented. Strategic renewal demands, â€Å"Wide-scale invention, reinvention, and redesign of business processes and organizational structures require organizational change. The leaders in charge of the organization did not do renewal demands. According to Spector (2010), Concord closed after 64 years on business making many people unemployed, they felt depressed and devaluated for the store situation. Mistakes found in the organization were the following: employers did not complete mutual engagement and shared diagnosis, they did not restructure leadership adequately, and they failed to diagnose the pattern of behavior within a top leadership team (Spector, 2010).The conflict put pressure on the store when independent booksellers are staggering from competition and the Internet. * Phases of the Organizational Change Process not Completed or Implemented at the Concord Bookshop that Led the Change Failure Turnaround Turnaround is a technique that focuses on processes for improvement. Turnaround addresses finances of the balance sheet enhancement and technology. Concord did not complete turnaround well; instead, there was not salaries deducted, and employees did not lose their job immediately. Adding to this, there was misunderstandings and fears to employees; these reasons put the company on fire. Smith on the other hand, did not focus on new behaviors, turnaround looks at the company’s assets seeking manage finances to stabilize the cash flow; Smith did not manage well finances of the company. According to Mark (2007), employees did not receive efforts to change with pleasure. In the process of implementation, some resistance from employees comes from different internal sources; also resistance comes from external sources. Workers at Concord had increased resistance to the change process. Techniques and Tools Techniques and tools is a non-behavioral phase of change process. Concord failed to change this technique by not using organizational processes, mechanics, and other interactions intended to produce a product or service. For example, in 2007, Netflix started a new technique for improving customer service by substituting hundreds of telephone call centers for e-mail based response system. They save money, and created new employment; call center representatives were added to payroll. For instance, Concord could have done this technique and turn to different customer service system. This system could fit well for Concord Bookshop to attract new customers to stay alive on business (Spector, 2010). Outsourcing Outsourcing is a change technique, this tools implements the turnaround and transformational behavior change (e.g., cost-saving) implications (Spector, 2010). Organizations find outsourcing a very important strategy because: 1. Outsourcing saves money by transferring jobs to lower-paid workers. 2. Outsourcing enables companies to concentrate on core competencies. 3. Outsourcing offers a hedge against shifting technologies and customer preferences by lowering fixed costs and building flexibility (Spector, 2010, p. 16) Smith’s approach crated a conflict, resistance, and resentment. The organization needed to change to respond to the external demands. Concord leaders did not communicate the change well as they should so employees would understand and change behaviors. The organization needed to change the demands of the customers adapting the business to sell according to the new technology; for example, the new mode of communication was the Internet. Therefore, by the time they wanted to fix it was already late. Smith did not do outsourcing well because he did not realign the behaviors of the employees with company strategy and customer expectation. Trigger Events and Change According to Spector (2010), Organizational change is typically initiated in response to a trigger event. Spector (2010), states that Trigger event is a shift in the environment that precipitates a need for altered strategies and new patterns of employee behavior. For the Concord Bookshop, the increasing penetration of online booksellers into the store’s market space triggered the requirement for strategic renewal (Spector, 2010, p. 18). Trigger events are external or internal to an organization. Trigger events help to precipitate the need to alter behavioral patterns of employees. Concord Bookshop faced external trigger events. Trigger events may come from inside the organization; for example, when the organization hires a new leader. According to Spector (2010), she says â€Å"Jack Welch was promoted to CEO of General Electric (GE) in 1981, the company was enjoying decades of prosperity and success† (Spector, 2010, p. 18). This is an example of internal source of trigger event; Spector (2010), said â€Å"Virtually from the outset, in a quest for transformational change† (Spector, 2010, p. 18). Trigger events are so crucial for their magnitude and potential personal impact. They set into motion a series of mental alterations as individuals struggle to understand a situation. According to Spector (2010), â€Å"trigger events have a nature to umbalance established routines and evoke conscious thought on the part of organizational members. It makes people’s emotions to react to a change. In short, according to Spector (2010), states â€Å"Trigger events bring people’s mindsets into the arena of change† (Spector, 2010, p. 18) Conclusion The Concord Bookshop downsizing was terrible, the owners of the bookshop made changes to their organization without using an effective change process and implementation. The result of their approach was the resistance of the change from people in the organization. The organization made a numerous mistakes on not communicating to employees the severity of the problem. The owners of the bookshop recognized that the trigger event for the need for change was to recover financial profit. However, they did not involve the rest of the staff when this problem aroused. If they did a complete shared diagnosis stage, the issue would be solved properly. Last, the owners failed to move and redesign stage of the effective change process. The owners needed to redesign the roles and responsibilities, and involve the employees on planning solutions, so changes will be accepted more easily (Borkowski, 2005) (Spector, 2010). References Borkowski, N. (2005). Organizational Behavior in Health Care, 1e. Miami, Florida: Jones and Bartlett Publishers. Mark H. (2007). The tools and techniques of change management, Journal of change management Vol 7 p37-49 http://www.scribd.com/doc/78216618/Spector-2e-Instructors-Manual Spector, B. (2010). Implementing Organizational Change. Theory into Practice, Second Edition. USA: Pearson Education. Rosen, J. (2011). Bookstores and Bloggers. Publishers Weekly, 228(20), 20. Taken from EBSCO September 252012.

Sunday, September 29, 2019

Cdr Professional Engineer

PROFESSIONAL ENGINEER Summary Statement These are the competency Units and Elements. These elements must be addressed in the Summary Statement (see Section C). If you are applying for assessment as a Professional Engineer, you will need to download this page, complete it and lodge it with your application. Competency Element |A brief summary of how you have applied the element |Paragraph in the career episode(s) | | | |where the element is addressed | |PE1 KNOWLEDGE BASE | | | |PE1. Knowledge of science and engineering | | | |fundamentals | | | |PE1. 2 In-depth technical competence in at least | | | |one engineering discipline | | | |PE1. Techniques and resources | | | |PE1. 4 General Knowledge | | | |PE2 ENGINEERING ABILITY | | | |PE2. Ability to undertake problem identification,| | | |formulation, and solution | | | |PE2. 2 Understanding of social, cultural, global, | | | |and environmental responsibilities and the need to| | | |employ principles of sustainable development | | |PE2 . 3 Ability to utilise a systems approach to | | | |complex problems and to design and operational | | | |performance | | | |PE2. Proficiency in engineering design | | | |PE2. 5 Ability to conduct an engineering project | | | |PE2. 6 Understanding of the business environment | | | |PE3 PROFESSIONAL ATTRIBUTES | | | |PE3. Ability to communicate effectively, with the| | | |engineering team and with the community at large | | | |PE3. 2 Ability to manage information and | | | |documentation | | | |PE3. Capacity for creativity and innovation | | | |PE3. 4 Understanding of professional and ethical | | | |responsibilities, and commitment to them | | | |PE3. Ability to function effectively as an | | | |individual and in multidisciplinary and | | | |multicultural teams, as a team leader or manager | | | |as well as an effective team member | | | |PE3. Capacity for lifelong learning and | | | |professional development | | | |PE3. 7 Professional Attitudes | | |

Saturday, September 28, 2019

Types of crimes Essay Example | Topics and Well Written Essays - 250 words

Types of crimes - Essay Example UCR measures this crime using National Incident-Based Reporting System. Offenders of this crime include enemies of politicians and other famous personalities whereas victims of this crime include government employees, police officers, and service workers. Offenders commit this crime wherever and whenever they find some opportunity to kill. This crime is also on rise in the United States. I think that reporting system of this crime is good as news channels are doing their job perfectly in reporting these incidents. Vehicle Theft Vehicle theft refers to the act of taking another person’s vehicle without informing that person. The intention of the offender is to keep that vehicle permanently. UCR measures this crime by analyzing the number of cases reported to the police by the victims. Offenders of this crime include thieves whereas victims include any person who posses some vehicle of value. Thieves usually steal vehicles from car garages present in the houses and from streets. This crime seems to be on decline because of effective law enforcement from police and law enforcement agencies. Police reporting system and National Incident-Based Reporting System are working well for this crime so nothing needs to be changed.

Friday, September 27, 2019

Module Islam and Modernity - assignment Documentary analysis

Module Islam and Modernity - Documentary analysis - Assignment Example Both the books have successfully drawn the attention of the readers towards the traditionally depraved condition of the Muslim women in Egypt and presented an appeal to the Egyptian intellectual class to initiate an improvement in their status and assign them equality with men in terms of political, social and economic rights. Historical and Political Context The author feels that it is his moral obligation as an author to communicate to the society his liberal views about the emancipation of women in the Egyptian society. Looking at the erstwhile scenario, he feels that the upliftment of the status of the women in society is not only desirable but also essential and integral to the positive growth and development of his future generations. So he considers it high time that his thoughts broke free from the shackles of passive reflection and found concrete expression in his literary works. However the author fears that this honest expression of his sincere views might be termed as â⠂¬Å"heresy† by the religious fanatics. ... t improved in the Western countries owing to the growing impact of technology and diminishing geographical boundaries resulting in a warmer approach towards new innovations and an openness to change. But despite all these formative changes on the global platform, unfortunately, the scenario in the Islamic countries remains the same. These countries seem somewhat immune to the new changes and events prevailing in their surrounding world. The author claims that this could be attributed to the fact that in addition to a hostility to change propagated by tradition, the people in these countries exhibit a kind of intellectual lethargy which inhibits the growth of their minds. This intellectual lethargy dissuades them from pondering over new ideas and persuades them to seek a convenient refuge under the dead and decaying customs and traditions, in order to circumvent the discomfort of speculation. The outcome is that any idea or opinion that seems to be going against the flow of tradition is labelled as â€Å"heresy† or defiance of religion. Going by this logic, the author’s views on woman empowerment can also be classified as heresy. But here the author clarifies that his work is presented as a revolt against not religion, but tradition. It is intended to defy not Islam, but the rigid and stifling traditions that need to be either mended or discarded. Detailed Analysis Having declared at the outset that he does not conform to the Islamic traditions, the author wonders why the Muslims are so keen on sticking to their traditions whichideally should be done away with. They fail to realise that in their attempt to conform to their traditions they are actually working against the laws of Nature- God’s laws of creation- the Law of Change. They seem to undermine the fact that

Thursday, September 26, 2019

The Rise and Fall of the Berlin Wall Essay Example | Topics and Well Written Essays - 2750 words

The Rise and Fall of the Berlin Wall - Essay Example There was entrance for other allies in the war and it grew to be a world war. Germany wanted Britain but Britain could not allow Hitler to acquire it. The war ended with the entrance of America and the subsequent defeat of Japan through bombing of Nagasaki and Hiroshima. The war had increased in magnitude such that not only the death of Helter and his ally Benito Mussolini of Italy would have ended the war. But Germany was left more unstable with the clout rule of Nazi regime that had helped to hold the country together under an authoritarian rule. After the ended to the war the territory that was left that could be termed as Nazi Germany had been divided into four occupation zones according to the postal agreed. Each of the regions was occupied by the allied power, American, British, French and the soviets. The former capital of Germany Berlin was occupied by the allied powers and acted as their center of control of the whole region. It as also subdivided into four zones although the city was in the zone that was occupied buy the soviet.The intention of the agreement that had led to the division of Germany among the powers was in order to govern the country together as one. But immediately after the war there was growing tension between Soviet Union which was working to occupy the superpower vacuum in the world and the allied forced led by America. The era of cold war had just but set in.The advent of cold war saw increasing tension between the forces that had divided Germany among themselves. The French, British and American zone were brought together to form Federal Republic of Germany and West Berlin. On the other hand the region which... Each of the regions was occupied by the allied power, American, British, French and the soviets.   The former capital of Germany Berlin was occupied by the allied powers and acted as their center of control of the whole region.   It as also subdivided into four zones  Ã‚   although the city was in the zone that was occupied buy the soviet.     The intention of the agreement that had led to the division of Germany among the powers was in order to govern the country together as one. But immediately after the war there was growing tension between Soviet Union which was working to occupy the superpower vacuum in the world and the allied forced led by America. The era of cold war had just but set in.   The advent of cold war saw increasing tension between the forces that had divided Germany among themselves.  Ã‚   The French, British and American zone were brought together to form Federal Republic of Germany and West Berlin. On the other hand the region which was under the s oviet rule formed the Germany democratic Republic which included East Berlin.   Therefore the main forces behind division for Germany were the growing differences that were emerging between the allied forces and the Soviet Union which was mainly based on ideological differences between the two forces. (Maddrell, 2006)Growing difference between West and East  The cold war was purely based on ideological difference between the USA and the Soviet Union which was then led by Russia.   This was the main differences that had led to the eruption of the cold war.

Wednesday, September 25, 2019

Law - Roe vs. Wade Term Paper Example | Topics and Well Written Essays - 1750 words

Law - Roe vs. Wade - Term Paper Example Background Roe v. Wade arose because women were being deprived the right to choose what they wish to do with their bodies1. This is because abortion was illegal in all the states in the United States. There were strict laws, which forced many women into bad situations in any case they carry out an abortion illegally. In some instances, a number of women died as a result of unsafe abortion. Some women even tried to terminate their pregnancies themselves. Some other women chose to relocate to other countries to have safe, legal abortion. However, in the United States it was noted that a large number of women could not afford to move to other countries where abortion is legal to have their pregnancies terminated. A group of women in Texas was not happy with the situation. They argued that every woman should be allowed to choose what happened to her body. They therefore started advocating for change of law so that they could be given the right2. In 1970, the women hired two lawyers to re present them in their quest to have abortion legalized. The two lawyers presented a suit in Texas court challenging the abortion law. In the process, they found a young woman who intended to terminate her pregnancy and were willing to represent all the other expectant women in Texas who also wanted to have abortion. In order to protect her identity she was nicknamed Jane Roe3. The case was given a node and proceeded all through to the Supreme Court. Attorneys for the state of Texas however were conservative and wanted the law to remain as it was. They bear the opinion that a pregnant mother should give up her rights since the fetus rights are more important4. To counter this, the Jane Roe’s lawyer argued that women had a right to privacy, which included choosing to terminate pregnancy. The case has proved to be among the most controversial in the United States history, and many people still debates it to date. Many years after Roe, Americans still remain divided over the abor tion rights. Data on opinion polls show majority Americans in support if some aspects of abortion rights with regard while others are still of the view that the decision should be overruled and abortion remain illegal5. Subject Proponents ABC News-Washington post poll conducted thirteen years after the case of Roe v. Wade indicates that 57 percent of respondents polled stated the that abortion should remain legal. A Gallup opinion poll of 2011 showed that 49 % of those polled identified themselves with Roe6. Some proponents of Roe case especially led by women feminist argue that a woman’s right to choose abortion is a fundamental right enshrined in the constitution7. Therefore, it is the prerogative of a woman to choose what to do with her body. As a result, the constitution has a right to protect the fundamental rights to privacy of women. The feminist movement and other proponents of Roe argue that fetus is not a human being. As such, abortion is a matter of terminating pre gnancy and not killing a baby. They say that there is no biological proof to show that personhood starts at conception. To them a personhood starts when a person is born8. The proponents also say that fetus is not capable of feeling pain when terminating pregnancy. They cite a research carried out by Stuart Derbyshire, PhD, Senior Lecturer at the University of Birmingham who found out that a fetus is not capa

Tuesday, September 24, 2019

Is There a Union Revitalisation in Europe and North America Essay

Is There a Union Revitalisation in Europe and North America - Essay Example It cannot be assumed that union revitalization will happen hassle-free. There have been signs of worker self- aggrandizement in certain areas, but there have also been instances of total relapse into passivity in certain spheres. But a new phenomenon that is emerging is the structural changes that have been happening on the union front, and if viewed from the backdrop, it can be argued that there is union revitalization in a new form in Europe and UK. The global alliances that are emerging in labor sector, the increased presence of women, and ethnic minorities in the global workforce, and the new forms of workers organizations like the ‘worker centers’ of USA, have been some indicators of change. Taking into account all these new factors and influences, we can argue that there is a non-traditional kind of union revitalisation in Europe and North America. North America and the European Union have been depending more and more on immigrant laborers to meet their workforce n eeds. There are also attempts going on to assimilate these migratory workers into the host country’s mainstream workforce. In the United States, one in five people is from another nationality (Ohlemacker, 2007). In 2006, the BBC reported that 70,000 people were waiting to get citizenship in the UK (BBC News, 2006). The European Union has made it mandatory for its member nations, â€Å"a ‘duty of equality’ in regard to pay† (Healy and Heery, 2004: p.4). This has opened up a whole lot of equal opportunities and has thus increased the social diversity of the workforce (Healy and Heery 2004: p.4). Women and migrant workers from developing countries have been getting better representation in the wok force in Europe, as a result of this. As this phenomenon alters the social landscape of the work force, it has influenced the general state of towards trade unionism as well. For example, â€Å"the creation of low-paid, insecure, temporary and part-time jobs, which are disproportionately filled by women, minority ethnic citizens and young people† has resulted in a weakening of the bargaining power of the workers and also an increase in â€Å"poverty and†¦ unemployment† among such vulnerable groups (Healy and Heery, 2004, pp.17). In such a scenario, the question is whether the conventional trade unions are waking up to face the new challenges and organize the totally changed work force. There are divergent opinions on this issue. Johnson and Jarley (2004) have drawn attention to the re-emergence of â€Å"social movement unionism in the United States with rhetoric centering on demands for ‘work place dignity’ and ‘social justice’† (543-44). Ongoing rejuvenation efforts inside the trade unions are supposed to aim at reforms that will change the attitude of trade unions â€Å"from passive service organizations, bulti largely on an economic exchange logic with members, to active organising-driven unions, built on a logic of social exchange† (Johnson and Jarley 2004: 544; Heery 2001; Turner and Hurd 2001). In the UK, it has been observed that decentralization of public sector enterprises into local level management, has led to new feelings of insecurity among the workers and has become a â€Å"catalyst for union revival† (Calveley and Healy 2003: 98).  

Monday, September 23, 2019

In What Way Did Liberal thought Reshape Our Understanding of Markets Essay

In What Way Did Liberal thought Reshape Our Understanding of Markets and Labour - Essay Example Liberalization according to Ramsay (2004) is derived from human nature whereby individuals are assumed to have inherent rights to life, liberty and property and are also considered as autonomous beings with individual interests. Liberal ideas thus emphasize equality, justice, fairness, and freedom and in economic terms, relaxation of trade restrictions to enhance trade between countries. These liberal ideas have reshaped our understanding of markets and labour over ages and given birth to the concept of a free market or capitalism. The paper will discuss how liberal thought reshaped our understanding of markets and labour. This will be achieved by explaining what the market society is, how it came about as well as the key problems that we all face today in the context of an economy in crisis. The Market Society A market society is an economic system where prices are determined by the market forces of demand and supply or the price mechanism. It is mostly referred as capitalism and is characterized by private ownership of property and exchange between legally free individuals (Muller 2002). Due to liberalization, most nations now can trade with other nations all over the world thus shrinking the world into a global village. There is also free movement of labour within and across borders leading to spread of knowledge and ideas which further commerce through innovations and inventions. Each individual in the system pursues self-interests of maximizing utility, profit, and wages. The moral worth of the society is organized around the market and the role of the state is to guard property rights (Aristotle, 1962). Montesquieu (1989) argues that the growth of commerce has made nations to be dependent on each other hence bringing peace among nations. He also criticizes state intervention in the market as it brings about poverty. In a liberal economy, people can achieve their goals as there is nothing preventing them to pursue self-interests. Poverty thus does not exis t in a market society and if it does exist, it is because the individuals do not know the comforts of life; poverty is part of liberty (338). In a market society, there is democracy based on liberal ideas of equality. All members of society thus participate in running of the state as opposed to one man’s rule such as monarchy although in some cases such as England, monarchy does exist even though the state is a free market. A market society is also characterized by competition between various producers as well as nations leading to efficiency in allocation of resources. Nations are able to produce and export whatever they can produce efficiently and import goods which are not efficient to produce due to lack of resources or suitable technology. This enables the citizens to have a greater choice of commodities at affordable prices as a result of competition. This enables individuals to exercise their liberty by having freedom of choice (Hirschman, 1977). Besides having a varie ty of choices, individuals are free to work in any country where wages are competitive and also learn new ideas from other professionals thus widening the scope of commerce .According to Hume (2006), trade enhances production of labour for particular commodities due to increased manufacturing of such items. He also argued that labour could be used to produce in plenty goods for domestic consumption if such goods don’

Sunday, September 22, 2019

Schuman Plan Coursework Example | Topics and Well Written Essays - 11000 words

Schuman Plan - Coursework Example In fact she had been already actively engaged in NATO along with the U.S.A. Looking at the success of the ECSC however , Britain was tempted to canvass for membership but her attempt was twice scuttled by Charles de Gaulle who opined that Britain had no real interest in joining the ECSC but was trying to enter as the Trojan horse of the U.S.A. which in a way was obvious since the U.S.A. had been advising her to enter the ECSC and try to change its policies on a broader perspective in tandem with NATO. Thus it took almost 22 years for her to make an entry into the community which by then had become EEC from ECSC, only after the exit of Charles de Gaulle from the French Government. The other five states had been longing for Britain's entry and hence the passage was smooth for Britain though France under the premiership of Pompidou allowed her entry only on firm commitments with respect to the EEC budget contributions and on community's Common Agricultural Policy. The conclusion is ther efore that Britain's entry into EEC was politically motivated rather than on economic motives. The unification of Europe was felt ... Thus it took almost 22 years for her to make an entry into the community which by then had become EEC from ECSC, only after the exit of Charles de Gaulle from the French Government. The other five states had been longing for Britain's entry and hence the passage was smooth for Britain though France under the premiership of Pompidou allowed her entry only on firm commitments with respect to the EEC budget contributions and on community's Common Agricultural Policy. The conclusion is therefore that Britain's entry into EEC was politically motivated rather than on economic motives. Chapter 1 Introduction 1.1 Background The unification of Europe was felt to be the only way to avoid war among nations. France and Germany were sworn enemy nations during world wars I & II. The cessation of hostilities after the end of World War saw many a world leader advocating cooperation between nations in Europe. Robert Schuman, the Foreign Minister of France startled the world by his announcement on May 9, 1950 that Coal and Steel Industry of European nations would have common platform to conduct uniform trade in the said industries what famously came to be known as Schuman Plan. In spite of the apparent advantages of this kind of arrangement, Britain opted out of joining it. While Britain had its own reasons, her rejection of the Schuman plan was not taken lightly by France because of which though Britain quickly realised its importance, it took almost 23 years for it to manage to join the EEC after its formation. 1.2 Aims and Objectives With the above background, aims and objective is to go into the aspects of Britain's hesitation to join the EC initially and

Saturday, September 21, 2019

The Artist Essay Example for Free

The Artist Essay Describe what Spoon Feeding is in cinema. What example did we watch in class? The actor in that film spoke four words to the camera what are those words? How did the speaking of those lines spoon feed what was obviously depicted prior to that dialogue? Spoon feeding in cinema is a device used by directors to plainly state to the audience exactly what happened. Sometimes it may be obvious, such as the example we watched in class. Schwarzeneggers character, Dutch says aloud after the Predator passes him over, He couldnt see me. The audience has certainly already realized that the predator couldnt see him. This sort of device has the ability to be used artistically but in this case it really Just seems a little belittling to the audience. 2- Describe the use of body language in Peter and the Wolf, how was this achieved in the film? Peter and the Wolf, being a silent film, depended largely on character body language to illustrate concepts. Each character was specifically defined in their motions. Peter was curious and sneaky. You could sense caution in the way that he moved and looked at things- the eyes were very telling. The duck, carefree and goofy, flipped, flopped, and plopped all over the place. The wolf was dangerous yet noble, his posture was very distinct. The music in the film helped to magnify that body language. 3- Describe the scenes and what form of communication is depicted when pretense is revealed in 2001 a space odyssey and One flew over the Cuckoos nest 2001 : Pretense is revealed when the two men speak in secret while in the pod. HAL, despite being cut off from audibility of the other two, is still able to see the men speaking. All sound in the film cuts off and the camera zooms in to the mens lips oving, panning back and forth between the two mens conversation. Not knowing that he can see them, they continue to conspire against HAL as he reads their lips. OFOTCN: The most obvious pretense in One Flew would be Chiefs unveiling to Mac that he does indeed speak and can understand everything around him. The men sit on a bench awaiting treatment and Mac offers Chief a stick of gum. He takes it and thanks him. In Macs moment of bewilderment Chief goes on to say Ah, Juicy fruit. To which Mac is simply overjoyed. The difference between the two being that one Describe director Stanly Kubricks use of the absence of sound used in 2001 a space odyssey Kubricks use of silence is all too relevant in 2001. With so many long drawn out shots of the ship, he does well to remind the audience that the scene is set in space. Space, by nature, is a vacuum and for that is void of all sound. This really helps to put the audience up there with the astronauts. In many scenes which he doesnt use are those involving the processes of HAL. It kind of suggests that he is cold and collected. He is not a human with a heartbeat. His processes are silent. Looking back on the cene where HAL witnesses the other two astronauts speaking secretly the audience hears nothing. This silence is his processing. Its his cold logic and elaborates planning of what to do in order to preserve himself. 5- Describe director John doormans use of sound in Hell in the Pacific. Describe Jane Campions use of sound in The Piano. What kinds of sounds do both films have in common? I absolutely loved the sound used in Hell in the Pacific. Much of it was so wild and chaotic, not dissimilar the trapped mens situation. doorman embellished the sound of water in several instances; waves crashing, water droplets, rain. Its probably one of the most important props in the film; after all, you cannot live very long without water. Campion used music very creatively to establish setting and give characters a means of expression. Ada would play, Baines would lust after her music, Flora would sing. Both films, though portray water in very deliberate ways. The Piano begins and ends with the main characters crossing over water to a new home. It seems like the water is trapping Ada here on this island and the first indication of what would be a difficult Journey is the wave crashing upon her and the piano while she played it on he beach. This scene is similar to the one in which the Japanese man, while on lookout, had water crash through his fort, if you will call it that. 6- Billy and Flora While the two characters serve very different purposes in their respective films they are alike in that they have very childlike attitudes. Flora actually is a child and her actions are expected of one of her age. Billy, on the other hand, possesses the shyness and demeanor that a child might but it is most likely attributed to his mental affliction. The two both wear their emotions on their sleeve. Flora very vividly xpresses her disapproval of Ada attempts to contact Baines through her and goes so far as to, twice, betray her own mother. Billy is easily flustered by social situations, is often seen in The Piano entertaining herself. She has a wild imagination and will talk to Just about anyone. Billy tends to hang around the other patients but is still well reserved. He has nervous tendencies; stuttering, lack of eye contact, closed off body language. Another stark contrast between our two youthful characters is that they lie on opposite sides of their respective communication spectrum. Flora acts as a translator for Ada. When Ada wants to be heard she signs to Flora and Flora speaks for her, whereas it seems as though Billy is the one that needs a voice in One Flew. An example of this is during the therapy session when he is clearly uncomfortable and would rather not speak on the subject. It is here that another patient speaks up and suggests that maybe Billy doesnt want to talk about this particular subject. 7- Stewart and Nurse Ratched Two intriguing characters. They are both antagonists to their stories but both seem unaware, at least outwardly that that is their place. Their antagony does not seem to be misplaced though. Nurse Ratched is the head nurse; I think her character is a little deeper than Stewarts. It seems there are many levels to her. Initially she appears as a good well-kept nurse. She is soft spoken yet direct in her tone. It later becomes more apparent that she is more controlling than one might have initially thought. The ward is her world. What she says goes. And even when the patients play her game she always is the victor; the vote, for instance, despite there being Just enough votes to trump her she still refused the boys the baseball game. Its really hard to say whether she is really truly bad though. As head nurse it is her Job to maintain absolute order. In a facility such as the setting she is right to say that even the slightest change would potentially provoke certain patients to cause a difficult situation. Steward, on the other hand, despite his wealth and position he doesnt have complete control. He wants control but Adas will is too strong. Stewart goes to great efforts to try to keep her caged but she prevails. Even when he violently cuts off her finger she does waiver. Even Stewards anger and upset (not necessarily his actions) are understandable. He has brought Ada over to marry him and love him but ever for a moment is this what she wants. Hes frustrated but he truly does try to make her happy. When he cannot please her he falls apart. Ada and the Chief The most obvious similarity is the characters silence the two share. You do at some point in both films get the experience the voice of the characters; Ada, while she narrates the beginning and end of the film and Chief, while he and Mac patiently wait for their punishment and enjoy a stick of gum together. While the Adas and the Chiefs silence is chosen I feel that Chiefs is more of free will than Adas silence. The Chief only ad opted silence as a way to protect himself while in the institution. Ada accustomed to it not only as a habit but as a lifestyle. Youth is when you develop your personality Even in the film it is evident that Chief is effluent in his speaking abilities. When Ada begins to speak again she has a difficult time because she simply never learned to do it well. They both seemed to be hiding themselves somehow. Its unsure exactly what might be affecting Ada, maybe a childhood event of some sort. It does seem clear that Chief is affected by two clashing cultures. His mother is white nd his father native American. His father lost himself in alcohol, he is clearly affected. 9- Mac and Baines Mac and Baines are both deviants to their cultures. They have both been shunned and placed outside of society on one way or another. Baines seemed to have disagreed with his own culture so much he went so far as to remove himself completely from it. He actual mingled into the Maori culture, the natives of the land. In this culture some of the social mores of the colonial white culture are accepted with open arms. Baines is a very emotionally expressive character and he chose to join an expressive culture. Mac is most certainly deviant. But where Baines is more of an introverted deviant Mac displays extroversion in spades. He comes from a workhouse. He was kicked out for getting into a fght with another worker. He chose to run with the verdict that he was crazy because it meant that he would not have to go to Jail. They are both very sexual. Baines provokes a sexually driven relationship between an initially unwilling Ada. He knows what he is doing is unacceptable and its certainly done in secret. Mac, our Type A personality has no qualms about keeping his sexual life and desires out in the open. He has no discretion in discussing it and is very eager in encouraging others, such as Billy to do the same.

Friday, September 20, 2019

Methods for Routing Improvement in WSNs

Methods for Routing Improvement in WSNs As was concluded on the first chapter of the work, one of the best routing protocols, which is less energy-intensive and in the same time have other good conditions, like mobility, multipath usability, effective data aggregation, and so on, is Directed-Diffusion. Thus, Directed-Diffusion is chosen as a base protocol for reaching the goals of the dissertation. The importance of the energy-efficiency characteristic in sensor networks has directed many works on Directed-Diffusion and several solutions have been proposed trying to carry out energy efficiency in this paradigm. These solutions suggest various changes in the stages of the paradigm. Directed-Diffusion [84] is one possible realization of publish/subscribe for a wireless sensor network. It is mostly concerned with scalability issues and tries to find solutions that do not depend on network-wide properties like globally unique node identifiers. But rather, the goal is to find solutions that purely rest on local interactions. The most prevalent (albeit not the only) service pattern is subscription to data sources that will publish data at a selectable rate over a selectable duration. The aim of designing the Directed-Diffusion is efficiency in energy consumption, thereby increasing life expectancy network. In order to reduce energy consumption uses, this method uses two ways of compression and processing information within net. But it has limitation because of using the huge diffusion which cause that the resulting overload in this algorithm became too much. In the Directed-Diffusion, a node forms a gradient during the propagation toward all neighbors. These gradients are paths which are used for further data transferring. However, they provide limited information (e.g. a node can recognize the nearest neighbor only) and as a result Directed-Diffusion has some limitations such as traffic collection production which has inefficiency of energy. Directed-Diffusion is very suitable for some of usages, but instead, for some of usages it will work weakly, especially in usages where there are many receivers and references, and when the receivers are related to each other, the volume of traffic data increases. When the sink wants to choose one of the neighbors to strengthen their own path, it selects a neighbor which the first will receive a packet from it. For example, a node can determine which of its neighbors is the nearest. In this method, each node has limited information from its neighbors and has no enough attention for choosing the neighbors without attention to full or empty. Also, it doesn’t consider level of energy and power of neighbor in order to send the main station, which causes some limitations, such as increasing the traffic and reduction of effective relations in network. In the situations when the number of sources is too much, the sink selects only that path of neighbors which give to it the discovered data. But this is not optimum way of data compression in network. Of course, in case that a node can cover information of several sources, it can do an effective work in compression of data in the network. Description of base routing protocol algorithms There are a number of protocol variants that are optimized for different situations and Directed-Diffusion is actually more a design philosophy than a concrete protocol [84]. We start here with the original and basic variant, the â€Å"two phase pull† as is considered in [84]. Two-phase pull Directed-Diffusion: Data distribution in this scheme starts by nodes announcing of their interests in certain kinds of named data, specifying their interests by a set of attribute-value pairs [12, 26] in the publish/subscribe parlance. This corresponds to a subscription to data. These interest messages are distributed through the network and in the simplest case they are flooded. It would be trivial to set up converge cast tree with each node remembering the node from which it has first received the interest message from a given sink, given such an interest flood. Interests to different data and/or from different sinks would result in separate trees being constructed. But such a simple tree construction is faced with a serious impediment. In the absence of globally unique node identifiers, a node in the network cannot distinguish whether different interest messages originated at different data sinks. Thus, it would require the construction of separate converge cast trees to inform all sinks of published data or whether these packets are owing to the same sink and have simply traveled via different paths. This predicament is highlighted on Figure 2.1. For a node X there is, at first, only a single option – remember all neighbors from which an interest message has been received to, later on, once data has been published, forward the actual data to all th ese neighbors. In the Directed-Diffusion terminology, this is the setup of a gradient toward the sender of an interest. For each type of data received in an interest, each node stores in a gradient cache a separate set of gradients, potentially one for each neighbor. Fig. 2.1 Inability of network node X to distinguish interest messages from a single or multiple sinks Unlike the simple parent–child relationship in a tree, gradients often will be set up bidirectional between two neighbors, as both neighbors forward interest messages. In addition, a gradient is not simply a direction, but it also contains a value. This value represents, in a sense, the usefulness or the importance of a given link. It can constitute different semantics depending on the concrete application that Directed-Diffusion is supporting. A typical example is the rate with which data is transmitted over a given link (recall that directed diffusion is geared toward the support of periodic publications of data). Initially, these gradient values are the same for each neighbor. They are modified in the course of the protocol execution. Also, these gradients are initialized to low values, which are used to explore the network. Data can be propagated, once the gradients are set up, even with only preliminary values. A node that can contribute actual data from local measurements becomes a source and starts to send data. It uses the highest rate of all its outgoing gradients to sample and send data. An intermediate node, in the simplest case, would forward all incoming data messages over all its outgoing gradients, potentially suppressing some of the data messages to adapt to the rate of each gradient. However, this simple scheme results in unnecessary overhead in networks like the one shown in Figure 2.2, where data messages are needlessly repeated due to the presence of loops in the gradient graph. Just checking the originator of these data messages is again not feasible because of the lack of globally unique identifiers. Hence, the data cache is introduced, each node stores, for each known interest, the recently received data messages. If the same message comes in again, irrespective of from the same or di fferent originators, it is silently discarded. Figure 2.2 also shows that two copies of the same data message would be delivered to the sink, constituting no negligible overhead. The gradient values, or more specifically the rates associated with the gradients, provide a lever to solve this problem. One idea is to try to limit redundancy in the received data. A neighboring node that contributes new data messages (which cannot be found in the data cache) should be preferred over neighbors that only provide stale copies, or rarely provide new data, or appear to have high error rates, or are otherwise unattractive. This â€Å"preference† of a neighbor can simply be mapped onto the rate of a gradient. A node can reinforce a neighbor by simply sending a new interest message to that neighbor asking for a higher rate of data transmission. If this new, required rate is higher than the data rate which an intermediate node is currently receiving, it in turn can reinforce its best neighbor with this higher rate. In the end, the reinf orcement will percolate to the source(s) of the data messages. The no reinforced gradients can be maintained as backups, they can be actively suppressed, or they can be left to die out in the sense of soft state information. Fig. 2.2 Multiple intersecting paths’ data cache necessity in Directed-Diffusion Thus, these two phases, first, flooding the interest messages to explore the network and then again having information flow from the sink toward the sources during reinforcement, along with the fact that the sinks initiate the â€Å"pulling† of data, explain the classification of this variant as a â€Å"two-phase pull† procedure. These mechanisms of interests, gradients, and reinforcements constitute the pivotal mechanisms in Directed-Diffusion. It is worthwhile to reiterate that all of them are indeed strictly local, dispensing with the need for globally unique identifiers. Reference [62] contains further details how these mechanisms result in loop-free operation and how paths can be maintained in the presence of node or link failure (essentially, the reinforcement mechanism automatically adapts to the new topology). It should also be emphasized that, in principle, Directed-Diffusion in the form described here can handle both multiple sources and multiple sinks of data. The local rules result in a correct but not necessarily optimal flow of data messages. Push diffusion – supporting few senders and many receivers: As Directed-Diffusion represents both an interface/naming concept [63] and a concrete routing implementation (the one described above), it stands to reason that different routing protocols supporting the same interface have been developed. One such alternative routing protocol is the push diffusion [64], which is intended for many receivers and only a few senders. A typical example is an application where sensor nodes cross-subscribe to each other to be informed about local events but where the amount of actual events is quite low. In such a situation, two-phase pull would perform purely, as the sinks would generate a lot of traffic trying to set up (exploratory) gradients. This problem is solved by reversing the roles. Instead of the sinks sending out interests, sources send out exploratory data (i.e. flood it since no gradients exist yet). Once data arrives at interested sinks, they will reinforce these gradients, a nd then, data at higher rate will only follow these reinforced paths. The flooding overhead is justified since the event detection rate of sources is quite small to begin with. One-phase pull – supporting many senders and few receivers: Similar to the above-described push diffusion, pull diffusion [64, 84] is a specific routing protocol for the Directed-Diffusion interface. This one is geared toward many senders and a small number of receivers. As the name indicates, one-phase pull eliminates one of the flooding phases of two-phase pull, which constitute its major overhead. More precisely, interest messages are still flooded in the network (in the absence of recasting options) but the interest messages set up direct parent–child relationships in the network between a node and the node from which it first receives an interest message. As a result, a tree is formed in the network. This is only possible using (e.g. randomized) flow identifiers in the interest messages, which is feasible only for a small number of messages. Moreover, one-phase pull more strongly depends on link symmetry than does two-phase pull. Directed-Diffusion assisted by topology control: Reducing the flooding overhead inherent in two-phase pull [84] is a promising means for improvement. In particular, passive clustering fits well with Directed-Diffusion. In â€Å"Handziskiet at al† [66] is shown how this combination works in detail. In particular, the passive clustering structure is constructed on the fly with the distribution of interest floods. This result not only in better energy efficiency but, particularly, the percentage of actually delivered events is considerably improved, mostly because of easing the contention on the MAC layer. In this sense, this work highlights the need for a careful adjustment of at least three different protocol layers, those are the MAC, topology control, and data-centric routing – for an efficient wireless sensor network. A low-level-naming mechanism: In this approach, content-based addressing is integrated with Directed-Diffusion routing [65, 84]. In a nutshell, in Directed-Diffusion a sink node issues an interest message, specifying a set of attributes to describe the desired data. This message is disseminated into the network. The nodes that can produce sensor data matching the interest are called source nodes. A data packet generated by a source node travels through intermediate nodes to the sink. An intermediate node stores the interest along with (set of) possible upstream neighbors in the interest cache. Upon receiving a data packet, the intermediate node searches its cache for an interest matching the data and forwards the data packet to the associated upstream neighbor. Rumor: A variant of Directed-Diffusion, called Rumor Routing, has been proposed by Braginsky and Estrin [45, 84]. The proposed algorithm is applicable in situations where flooding would generate too much traffic and geographic information is not available. It is a logical compromise between query flooding and event flooding. The key idea is the routing of the queries to the nodes that have detected a particular event rather than flooding the entire network for retrieving information about the occurring events. In order to do this, the algorithm employs particular packets, called agents which are generated by nodes that have observed events. These latter are added to local tables on the nodes, called events tables. In order to disseminate information about local events to distant nodes, agents travel the network. Nodes use their events tables to respond to queries generated by the sinks. In this way, communication overhead is reduced by reducing floods. Gradient based routing: Gradient based routing is a slightly changed version of Directed-Diffusion [83, 67]. When flooding first interest messages, nodes keep the number of hops and calculate parameter called the height of the node. That is the minimum number of hops to the sink. The gradient on path is considered as the difference between of a node’s height and of its neighbor’s height. Then the data messages are forwarded on a path with the largest gradient. This solution uses some techniques such as data aggregation and traffic spreading in order to balance the traffic uniformly, which helps in balancing the load on sensor nodes and increases the network lifetime. GEAR: GEAR (Geographic and Energy Aware Routing) is a diffusion algorithm belonging to the Directed-Diffusion algorithms family [68, 84]. It relies on localized nodes, and provides savings over a complete network flood by limiting the flooding to a geographical region and using energy aware neighbor selection heuristics. To do this, each node in the network keeps two costs called estimated cost and learning cost, which are a combination of remnant energy and distance to destination. These costs are used to route a packet to and within the target region. In case there is no closer neighbor to the target region (a hole), one of the neighbors is picked to forward the packet based on the cost function. Within a region, packets are forwarded using the recursive geographic flooding. In that case, the region is divided into four sub regions and four copies of the packet are created. This process continues until reaching regions with one node (the destination). Scatter Web is an open and fle xible platform for implementing sensor networks [69]. This solution discusses the solar aware routing in sensor networks. The proposed energy aware routing algorithm is similar to Directed-Diffusion and uses the same terminology. However, nodes employed are not only battery-driven and instead, can be powered by solar power (Fig. 2.3). The key idea is to route packets via solar driven nodes since they can receive and transmit packets without consuming battery energy. The algorithm extends the Directed-Diffusion paradigm by adding several fields to the standard Directed-Diffusion headers (number of battery-driven nodes, number of solar-driven nodes, strategy, sequence number and so on). In order to save more energy, the solution proposes a scheme to prevent routing loops. Fig. 2.3 Geographic and Energy Aware Routing

Thursday, September 19, 2019

The Internet Essays -- essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Webster’s dictionary defines the Internet as â€Å"a widely used networking interface, connecting several very large information servers† (193). The Internet is a good way for companies or anyone to get information out to the entire world. Electronic marketing (e-marketing) is a very large part of the Internet. E-marketing is â€Å"the process of creating, distributing, promoting, and pricing products for targeted customers in the virtual environment of the Internet† (Ferrell 597). There are many advantages and disadvantages to e-marketing.   Ã‚  Ã‚  Ã‚  Ã‚  One disadvantage to e-marketing is the advancements in cookie technology. A cookie is a way for companies to track how many times people visit their website. Cookies can also reveal information such as what part of the site individuals are checking out and how often they do this (Ferrell 600). I-won.com is a very good example of a cookie. At I-won.com, a tally is made and points are given to people who visit different places on the website. These points determine how many times the visitors name is entered in the end of the week sweepstakes. A drawing is held and a cash prize is given to the winner. Most people would argue that there is no problem with this, as would I. A problem does however occur with some websites. For example, is it ethical for some websites to monitor where and what people are visiting so they can target consumers for sales?   Ã‚  Ã‚  Ã‚  Ã‚  Pop-up ads a...

Wednesday, September 18, 2019

Phobic Disorders: Symptoms, Treatments and Research :: Phobic Disorders Research Paper

1. Introduction Although phobic disorder is certainly common, it has been more difficult to establish the extent to which it should be considered a "serious" mental disorder from a public health perspective. Recent studies in understanding the behavioral, molecular, and anatomical bases of fear extinction in animals and humans are leading to new knowledge about the nature of fear and new treatments for anxiety disorders that affect millions of Americans (news release from SFN). In those people who suffer from phobic disorders (specific phobia, social phobia and agoraphobia) excessive and inappropriate fear and anxiety comprise the core symptoms of the disorder. Collectively, these disorders are the most common forms of psychiatric illness, surpassing rates of mood disorders and substance abuse A study by Michael Davis, PhD, at Emory University (SFN News Release) that determined how human brain can used to treat such disorders. He found that a receptor for a particular protein called the N-methyl-D-aspartate (NMDA) receptor in a brain region called the amygdala is critical for the extinction of conditioned fear. Many medical professional believe and it also has been proved true in many cases that combination of drugs therapy and behavioral therapy has the most successful results. 2. Phobia - Definition The term ‘Phobia’ was not used on its own until 1801 and in late 19th century it slowly gained acceptance in the sense it has today. The word ‘Phobia’ comes from the ancient Greek word ‘Phobos’, meaning â€Å"flight†,â€Å"fear† and â€Å"terror. Phobia is a condition, which is described as an intense, obsessive, persistent and unrealistic fear of an external object or situation or feeling. In some cases avoiding such objects or situations that cause anxiety makes difficult to lead a normal and healthy life. There are hundreds of different types of phobias with technical name for each. 3. Symptoms The symptoms of phobias are the same as those that would occur when facing an actual threat, leading to a reaction. In addition, there are other symptoms that go beyond the more "normal" fear response. Typical symptoms include:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Anxiety reactions such as sweating, trembling, nausea, rapid heartbeat, worry, dread, or terror  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Intense fear of the object or situation, beyond an actual threat of danger  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Intense fear of being watched or judged (social phobia)  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Uncontrollable reactions that consume the mind and body  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Avoidance of the object or situation to an extreme that it may result in isolation  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Use of alcohol or substance in attempt to control feeling of anxiety

Tuesday, September 17, 2019

Mother Daughter Relationship in I Stand Here Ironing by Tillie Olsen Es

Mother Daughter Relationship in I Stand Here Ironing by Tillie Olsen â€Å"I Stand Here Ironing† by Tillie Olsen If Only.... Almost every parent dreams of giving their children what they never had growing up. However, unavoidable situations cannot be changed and we are forced to make do with what life gives us. Life’s twists and turns are not always predicted, we get caught up with other things and lose sight of the important ones. In the story, â€Å"I Stand Here Ironing,† Tillie Olsen portrays the life and regret of a young single mother struggling to raise her daughter Emily. Olsen points out through uncontrollable circumstances in society, Emily’s mother is forced to become a working-class mother who must hold down a job and care for her child. To many the ideal mother-daughter relationship is not like the one we find is this story. This is neither the fault of the mother nor daughter. In the beginning, while she is ironing, the mother of a nineteen-year-old girl reflects on her daughter’s childhood. She is caught between feeling responsible for Emily’s unhappy childhood and realizes that she was powerless in making her life better due to the lack of alternatives. As she is ironing, the mother remembers back to when her eldest daughter was an infant. She was a young, inexperienced mother who followed â€Å"like the books said† (204) and considered Emily to be â€Å"the first and only one of [her] five [children] that was beautiful at birth† (203). During the worst years of the Depression, her husband deserts the family leaving them to fend for themselves. With no money or savings available to support the two, her mother is forced to find work and Emily is handed over to a variety of temporary ... ... her child. Olsen articulates the difficulties, obstacles, and struggles faced with non-privileged families in the story. The character of the mother in â€Å"I Stand Here Ironing† is one that is strong and wise. Throughout the story, she reflects on various events in Emily’s life that shaped the person she is today: self-sufficient and independent. At first while she is still young, she looks at her helpless daughter with guilt and pity because she is not able to give her the life she deserves. However, Emily grows into a young adult woman, Olsen points out the mother soon realizes that her daughter is a lovely, capable woman with potential. Her only hope is that Emily herself can and will realize it for herself. Olsen’s suggest that our circumstances shape who we are, but no matter the situation, we can still overcome them because there is potential in everyone.

Monday, September 16, 2019

Kambili Change in Character

Literature Essay – â€Å"Kambili change in character† The novel â€Å"Purple Hibiscus† by Chimamanda Ngozi Adichie tells a story of how two Nigerain children rebelled against their very father. For these children to end up rebelling against their father they must first bring about a change in themselves, they must become more mature, more responsible and not so dependent on their father. Kambili is one of those children that does go through a considerable change in her character, she reaches maturity.In fact this novel is a bildungsroman which is a story about a character self-development, her change. At the beginning of the novel, Kambili is seen as immature and young because of the fact that she is very observant but does not say anything because she is a rather shy girl. She is also shown as a naive and innocent, which makes us feel for her more. Kambili is also obsessed with her father, she thinks he is always right and as a result obeys him.She is only happy when she makes her father happy, this is shown when she sleeps happily when she knows that her father was proud of her that she came first in class. Kambili is considered as a â€Å"backyard snob† because she never talks to anyone, never had any friends. This is not only because Eugene is very strict with his schedules and wants Kambili to be constantly studying but also she is a very shy girl and cannot express her emotions, in fact she barely ever laughs; â€Å"i was not sure wat my laughter sounded like†.Kambili can be compared to Amaka, her cousin, who is the complete opposite of Kamibli. Amaka laughs, wears make-up, is a lively girl, listens to music and basically is like another normal teenage girl. However Amaka is one of those people who caused a change in Kambili because these two people became very close, in fact they become like sisters: tell stories to each other and Amaka helps her to cook. Amaka helps Kambili to become more open and helps her make friend s. Amaka is only one of the many people that brought about a change in Kambili life.Nsukka in general brigns change. It is when Kambili and Jaja visist Nsukka that they start to change, become more mature. This is because they live a different lifestyle, they are not constrained to Papa, they are allowed to be free and experiment! â€Å"Nsukka air will be good for me, for my recuperation† Father Amadi is another person who changed Kambili. Father amadi is an encouraging person who makes Kambili change. This is shown when Amadi manages to convince Kambili to run after him! In fact she says â€Å"i had smiled, run, laughed†, 3 things she had never one before. Because of the fact that Kambili starts to idealize and fall in love with Amadi that she starts to look up to Amadi and not to her father anymore! Father Amadi can be considered as one of her only friends! Aunty Ifeoma also helped kambili become less dependant on papa, this is shown when she takes the schedules from Kambili and Jaja and for the first time in their life Kambili and Jaja are free to do what they like which causes them to change. This change and maturity in Kambili is later shown when she starts to defy papa.This is shown when she steals the picture of papa Nnukwu and keeps it in her room and when she describes Papa as a â€Å"tall stranger†! However Kambili still remains loyal to her father and obeys him still, she does not go to the extent and rebel totally against him, unlike Jaja. This also shows that she isn’t mature enough and therefore obeys her father and Jaja to an extent. One can conclude that due to Papa strictness she had a restricted life where she could not hang out with other people.She was also scared of Papa because he used to abuse her and as a result Kambili did not know how to express herself properly and was usually very silent â€Å"bubbles in my throat†. However when she went to Nsukka; Amaka, Aunty Ifeoma and Father Amadi brought chang e. Due to these people and due to the fact that she was more free she learnt how to express herself, smile and laugh more often and act more and more like a natural girl. This causes her to start to defy Papa. Due to this maturity Kambili and papa manage to rebel against their fanatic father.

Sunday, September 15, 2019

Heat Transfer Lab Report

UNSTEADY STATE HEAT TRANSFERHeat transfer processes are prominent in engineering due to several applications in industry and environment. Heat transfer is central to the performance of propulsion systems, design of conventional space and water heating systems, cooling of electronic equipment, and many manufacturing processes (Campos 3). Unsteady state conduction is the class of heat transfer in which the temperature of the conducting medium varies with time and position.This occurs frequently in industrial processes, especially food preservation and sterilization, where the temperature of the food or of the heating or cooling medium constantly changes (Farid2). The work reported here involves the investigation of unsteady state heat transfer in two cylindrical rods and the conformity of experimental results to different methods of theoretical analysis. Aluminum and Plexiglas cylinders were used. Thermocouples were placed at different radial and axial positions, and the cylinders, whi ch were in thermal equilibrium with an ice bath, were placed in a warm water bath at 370C.Temperature profiles were obtained using a data acquisition system on a computer. Theory The applicable form of the heat transfer equation for conduction in solids is given by (Welty1): If the thermal conductivity is constant and the conducting medium contains no heat sources, Equation 1 reduces to Fourier’s second law of heat conduction (Welty1).Equation 2 can be written in cylindrical coordinates as   (3) Assuming that no heat transfer occurs in the axial position, and temperature varies with radial position and time only, (4) Equation 3 therefore becomes (Welty1) (5) Nomenclature for all equations is shown in the appendices.For a cylindrical rod immersed in a higher temperature fluid, heat transfer occurs by convection from the body of fluid to the surface of the rod, and by conduction from the rod’s surface to its center. If conduction through the rod occurs much faster than convection from the fluid, convection is the rate-limiting heat transfer mechanism, and the temperature within the solid will vary with time only. This condition, in which the external resistance is large relative to the overall resistance, is the primary characteristic of a â€Å"lumped† system.The Biot number, (Bi = hV/kA), is a ratio of the internal (conductive) resistance to heat transfer, to the external (convective) resistance to heat transfer. A general rule of thumb is that a body can be assumed to be lumped if Bi < 0. 1 (Welty1). For lumped bodies, the temperature variation with time is described by Equation 6 (Welty1) For cases in which the internal and external resistances are significant, Equation 5 must be solved numerically or graphically to determine the temperature variation with position and time.Graphical solutions (Heisler charts) are shown in Welty1 for different shapes and geometries. To use the Heisler charts, three dimensionless ratios must be known, a nd a fourth will be read on the appropriate axis. These dimensionless ratios are: Y, unaccomplished temperature change=T? -TT? -T0 (7) X, relative time=? tx12 (8) n, relative position=xx1 (9) m, relative resistance=khx1 (10)DISCUSSIONBefore the data was analyzed, the thermocouples were calibrated and the voltage readings were converted to temperature. To achieve this, the final value from each thermocouple was set to be equal to the warm water bath temperature (370C), and the initial reading was set equal to the ice water bath temperature. Thus, for each thermocouple an equation was obtained using the two points to convert voltage readings to temperature. An example of the calibration for one of the thermocouples is shown in AppendixII. LUMPED ANALYSISTo determine if a lumped-parameter analysis could be applied, the Biot numbers for the systems were calculated (shown in Table 1). Table 1: Biot numbers for the aluminum and Plexiglas cylinders. | Bi| Aluminum| 0. 07| Plexiglas| 81| Si nce the Bi value of the aluminum system is less than 0. 1, convection from the water to the surface of the cylinder is the rate limiting heat transfer mechanism. Thus, a lumped-parameter analysis can be safely applied. The Plexiglas system, on the other hand, has a Bi >> 0. 1, and the rate limiting mechanism is conduction in the cylinder.The temperature-time plot gotten by applying a lumped-parameter analysis (Equation 6) to the Aluminum cylinder was compared to the plot obtained from the thermocouple located closest to center of the cylinder. This thermocouple is chosen for comparison because it is located farthest from the heating source and will have a temperature history that differs most from an ideal lumped system. With this thermocouple, we should therefore obtain the maximum error associated with applying a lumped-parameter analysis to the system.Figure 1: Temperature history plot for the aluminum cylinder. The thermocouple is located 0. 25 in away from the center. A lumped parameter analysis is also shown in Figure 2 for the Plexiglas cylinder to illustrate the error encountered by applying Equation 6 to â€Å"un-lumped† systems. Figure 2: Temperature history plot for the Plexiglas cylinder.COMPARING TEMPERATURE HISTORY AT DIFFERENT RADIAL POSITIONSBased on their Biot numbers, it was expected that the temperature history plots at different radii for the aluminum cylinder should follow a similar path, while those for the Plexiglas cylinder shouldn’t. Figure 3: Experimental temperature for the aluminum cylinder history at various radial positions. Figure 4: Experimental temperature for the Plexiglas cylinder history at various radial positions. Figures 3 shows that the temperature curves are all the same at different radii in the aluminum cylinder.This is attributed to the fact discussed earlier that the aluminum cylinder behaves as a lumped system, that is, there is negligible resistance to internal heat transfer (conduction). Figure 4, o n the other hand, shows differences in the temperature history plots at different radii in the Plexiglas cylinder, confirming that conduction through the cylinder is the rate limiting heat transfer mechanism.GRAPHICAL SOLUTION –HEISLER CHARTSFor systems that cannot be accurately modeled by lumped-parameter solutions, such as the Plexiglas cylinder, we must resort to other analytic methods.Graphical solutions in Heisler charts (Welty1) were used to estimate the temperature history at three thermocouples. These plots are compared with the experimental plots in Figures 5 – 7. Figure 5: Experimental and graphical-solution temperature history plot. The thermocouple is located at a radius of 1. 25 in away from the center. Figure 6: Experimental and graphical-solution temperature history plot. The thermocouple is located at a radius of 0. 50 in away from the center. Figure 7: Experimental and graphical-solution temperature history plot. The thermocouple is located at the cent erline of the cylinder.The percent differences show that predicting the temperature history using Heisler charts produces much error. This method was open to mistakes for the following reasons: 1. Curves on the charts are drawn for integer values of relative time, position and resistance. Therefore, reading and approximation errors result when decimals to be read are not shown on the axes. 2.Some areas of the Heisler charts are so crowded with lines that reading a value with accuracy is nearly impossible. 3. When producing the charts, Heisler did calculations for some set of numbers and then linearly connected the points on a logarithmic-linear modified scale. Dimensionless ratios obtained from the charts are thus slightly different from their real values (Dilsiz4).NUMERICAL ANALYSIS – MATLABEquation 5 was solved numerically using MATLAB. The code used is provided in Appendix IV. The solutions were extracted to Excel and plotted (Figures 8 and 9).The temperature plots at diff erent radii for the aluminum cylinder are superimposed and therefore indistinguishable. This further demonstrates the fact that the temperatures at all points in the aluminum system were identical. Figure 9, on the other hand, shows that the Plexiglas had varying temperatures at different points. Figure 8: Numerical Solution from for the aluminum cylinder. Results were found using MATLAB and plotted in Excel. Figure 9: Numerical Solution from for the Plexiglas cylinder. Results were found using MATLAB and plotted in Excel. The results obtained from the numerical analysis were compared with experimental data.Table 4 shows the average percent differences between their values. The percent differences for the Plexiglas cylinder are significantly lower than those obtained when using the Heisler charts (see Table 3). This suggests that the numerical analysis using a partial differential equation solver is a more reliable method of analyzing the data for the Plexiglas cylinder. Table 4: Av erage percent differences between experimental results and the numerical analysis solution. Radius (in)| Average % difference| | Aluminum| Plexiglas| 0| -| 7. 54| 0. 25| 3. 68| 5. 81| 0. 5| -| 5. 75| . 75| 2. 99| -| 1| 3. 35| 6. 34| 1. 25| 2. 27| 4. 92| | | | Average| 3. 0725| 6. 072|CONCLUSIONThe rate limiting heat transfer mechanism for the aluminum and Plexiglas cylinders were convection and conduction, respectively. It was found that the temperature history for the aluminum cylinder conformed to a lumped-parameter analysis while that for the Plexiglas cylinder didn’t. This was expected based on the Biot numbers calculated for the two systems. Temperature profiles obtained from Heisler charts produced much error, and deviated significantly from experimental data.For the Plexiglas cylinder, the numerical analysis using MATLAB, although tedious, provided the least error when compared to experimental results. The temperature histories at different radial positions were compar ed: the temperature-time curves for the aluminum cylinder overlapped, that is, the temperatures were the same at different radial positions. On the other hand, there were significant differences in the temperature-time curves for the Plexiglas cylinder. This is attributed to the fact that the aluminum rod was lumped, while the Plexiglas wasn’t.SOURCES OF ERRORIt was assumed that no heat was transferred through the ends of the cylinders. This may have induced some error in the analysis. If there was indeed significant heat transferred through the ends, two thermocouples placed at the same radius will report slightly different temperatures, with the one closer to the edge being heated faster. As discussed earlier, error is introduced when reading the Heisler charts. These errors were considered minor, and were not substantial enough to affect the major conclusions drawn from the analysis.SAFETY CONSIDERATIONSThe proximity of water baths to electrical equipment presented an elec trical hazard.It was important to make sure not to spill water when transferring the cylindrical rods between baths. We also made sure to move any movable electrical equipment as far as possible from the immediate area. The baths used weren’t hot enough to cause scalds upon contact with the skin. Safety glasses and closed-toed shoes were worn throughout the duration of the experiment.REFERENCES1. Welty, James R. , Charles E. Wicks, Robert Wilson, and Gregory L. Rorrer. Fundamentals of Momentum, Heat, and Mass Transfer. New York: Wiley, 2001. Print.2. Farid, Mohammed M. Sterilization of Food in Retort Pouches. New York, NY: Springer, 2006. Print.3. Campos, Marco, Estaner Claro Romao, and Luiz Moura. â€Å"Analysis of Unsteady State Heat Transfer in the Hollow Cylinder Using the Finite Volume Method with a Half Control Volume. † Applied Mathematical Sciences 6. 39 (2011): 1925-931. Print.4. Dilsiz, Resul, and Onur Y. Devres. â€Å"Graphical Solution of the Transient Hea t Transfer Problem. † AIP Conference Proceedings 1048. 855 (2008).

Dark Tech: The Effect of the Cell Phone on Health

Today’s technologies are advancing at such an astonishing rate. This can make it difficult for even the most avid â€Å"techie† to keep pace. Technology is that wonderful thing that brings comfort and convenience to our lives. But, with that comfort and convenience, there often comes a price; and the technology of the cell phone proves no exception. Arguably, as a communication tool, the cell phone has no equal in how it has changed and affected our lives. Mostly, the effect has been positive in many ways. But, as it is with anything, overuse and abuse has brought out its dark side and the effect of unintended consequences.One of the unintended consequences of the cell phone is its effect on the health of its users and even the health of those around them. What is the effect of the cell phone on our health? Researchers are examining the health risks associated with cell phone use. This research has focused on traffic accidents, germs, cancer, electromagnetic radiation, and vision health. Traffic Accidents and Cell Phones Cell phone users knowingly, or unknowingly, put themselves and others in potentially hazardous situations by using a cell phone while driving.A recent study by the Centers for Disease Control and Prevention focused on cell phone distracted drivers in the United States. According to the study, sixty-nine percent of drivers in the United States, ages 18-64, reported that they had talked on their cell phone while driving within the last thirty days. Additionally, within that same demographic, thirty-one percent of U. S. drivers reported that they had read or sent text messages or email messages while driving at least once within the 30 days before they were surveyed.One must note that these percentages reflect only those drivers that â€Å"admitted† to the cell phone activity in question. Activities, such as texting, take the driver’s attention and hands away from driving more frequently and for longer periods than othe r distractions, making it proportionately more dangerous. Younger, inexperienced drivers under the age of 20 may be at a higher risk; they garner the highest proportion of distraction-related fatal crashes. The National Safety Council reports that at least 23 percent of all traffic crashes, or at least 1. 3 million crashes, involve cell phone use.This number can be broken down to an estimated 1. 2 million crashes each year involving drivers using cell phones for conversations and the remaining 100,000 or more additional crashes can be related to drivers who are texting. Analyzing this data shows that cell phone conversations are involved in 12 times as many crashes as texting. This seems to dispel the common myth that a texting driver is the more commonly dangerous cell phone activity. Additionally, and maybe surprisingly to some, it is not just our drivers causing dangerous situations on the roadways.Many times, pedestrians entranced with their cell phones are just as dangerous as drivers using them. A study published in Injury Prevention in 2012 reflects that one in three pedestrians is distracted by a mobile device while crossing busy streets. This type of distraction leads to accidents that injure both pedestrians and drivers. Germs and Cell Phones Cell phones not only carry important data, but nasty germs also. The greasy, oily residue you usually see on your cell phone after a week, or only a day, of use can often contain more disease-laden germs than those found on a toilet seat.In 2011, researchers from the London School of Hygiene & Tropical Medicine at Queen Mary, University of London found that one in six cell phones is contaminated with some sort of fecal matter. These fecal deposits find their way on to the handsets often because their owners did not wash their hands with soap and water after using the toilet. Some of the phones were found to harbor E. coli bacteria from fecal origin. If this bacterium is transferred into the mouth and ingested in to the body, it can cause fever, vomiting, and diarrhea.In another recent study, students in an Environmental Health course at South University, Columbia sought to find out what germs live on cell phones. After swabbing a sample of 60 phones belonging to students, they found that phones were frequently contaminated with methicillin-resistant Staphylococcus aureus (MRSA). According to Dr. Robert J. Wolff, PhD, program director of Health Science at South University, â€Å"Staph aureus is always dangerous and MRSA forms are worse because they cannot be stopped easily.†Staph skin infections, including MRSA, can quickly turn into deep, painful abscesses. The bacteria might remain confined to the skin, or burrow deeper into the body to cause potentially life-threatening infections in bones, joints, and surgical wounds. Once established in the body, the infection can infiltrate the bloodstream migrating to the heart valves and lungs tissues where it can wreak havoc on critical physi o-biological systems. Radiation and Cell Phone Usage Our cell phones certainly provide an efficient and easy way to communicate with friends, family, and co-workers.But, multiple research projects have suggested that excessive use of these communication devices may take a long-term toll on the user’s wellbeing. Cell phones use transmitting radio waves through a series of cell towers where radiofrequency (RF) waves create electromagnetic fields. Although cell phones are considered to be low-powered RF transmitters, your handset transmits power when it is on, and therefore it is important to increase your distance from the handset to reduce RF radiation exposure.The Federal Communications Commission (FCC) suggests cell phone users to keep a minimum distance of 20 centimeters from their handset to significantly reduce RF radiation exposure. Adults and especially children can suffer the long-term effects of radiation waves on the brain. According to Dr. Devra Davis, director for environmental oncology at the University of Pittsburgh, â€Å"Young children particularly need to be careful. We do not have enough information nor do we have enough time to be sure that cell phones are safe, and there's reason for concern that they may be harmful.†The University of Pittsburgh also warned its faculty and staff to limit their cell phone use due to the possible cancer risks. Vision and Cell Phones For those of you with smart phones, staring at your mobile device can cause problems in your vision later in life. Since screens on mobile devices tend to be smaller than computer screens, you are more likely to squint and strain your eyes while reading messages. According to the Vision Council, more than 70 percent of Americans don't know or are in denial that they are susceptible to digital eye strain.Additionally, smart phones and other hand-held devices are designed for reading at close range, so users’ eyes must constantly refocus and reposition to process the display’s text and graphics. As much as one-third of U. S. adults reported spending as many as four to six hours a day with their cell phones or related electronic devices. As digital device use increases, so do potential vision problems, including eye strain. Symptoms of this â€Å"digital† eye strain may include dry eyes, eye redness or irritation, blurred vision, neck and back pain, as well as headaches.Conclusion We know that today’s cell phone is the new wonder of modern technology that makes our lives richer and fuller as each new model is introduced. It is technically a microcomputer hidden beneath the cloak of a phone that puts the information super highway in our hip pocket for instant access at any time or place. Oh yeah, we can use it to communicate with our friends, family and co-workers too. So, are cell phones hazardous to our health? Well, if cell phones were handguns, they might be banned, or at the very least restricted by all means of laws and regulation.If cell phones were automobiles, an owner would probably need to take a safety course to get an operator’s license. To be serious, the cell phone is just a tool. If used in a safe manner and a little common sense, it is no more dangerous than any other tool (Said the three-fingered shop teacher). Unfortunately, not every cell phone user is endowed with common sense. So, until legislation catches up with the technology, the cell phone will have its dark side fraught with danger. Until then, to stay safe, we can clean our hands and cell phones regularly to keep the toilet germs and other assorted pathogens away from our mouths.We can keep our phone’s possible cancer causing RF at bay by using hands-free devices as much as possible. We can keep our eyesight a little longer by limiting device usage and eye strain. Last, but most importantly, we need to keep our cell phones in our pockets and purses while driving. If we need to make or answer a call, hand it to a passenger, pull over, or wait until we reach our destination to use the device. Just remember, when using your cell phone, think â€Å"safety first†; your health depends on it!

Saturday, September 14, 2019

Herman Melville Research Paper

Herman Melville stands among America’s greatest authors. Most people recognize Melville as the author of Moby Dick, one of the most well known American novels, one that he did not receive appreciation for until many years after his death. Almost all of Melville’s masterpieces included blends of symbolism, adventure, fact, and fiction. He based many novels on past experiences (primarily long sea explorations) and personal adventures. Not only did he capture the reader with his intense, vivid imagination, but he also conveyed his own philosophies and beliefs through quotes from the Bible and exceptional symbolism.Although Melville is widely known as an extraordinary author today, he was not considered to be as exceptional back then. He was born into a middle class family in New York City on August 1, 1819 (South). Herman’s father was a merchant from New England while his mother came from an old New York Dutch family. A little over ten years into his life, Melvilleà ¢â‚¬â„¢s father died shortly after experiencing financial and mental breakdowns. Now the â€Å"man of the house,† Melville had to take on the challenge of providing the family with a stable income to keep them healthy.He took on a variety of jobs for the next nine years, including being a clerk for his brother’s hat store, working in his uncle’s bank, teaching school in Massachusetts, and, perhaps the most impactful job in his early life, sailing to England as the cabin boy on a merchant ship. Instantly falling in love with the sea, Melville wrote about his voyage as a cabin boy in his novel Redburn. This â€Å"adventure† inspired Melville to continue his career at sea. When he returned to America, he joined the crew of â€Å"Acushnet,† a brand new whaling ship, soon to set sail in the Pacific Ocean (South).This voyage was perhaps the most influential expedition Melville ever took part in. Using the experiences, newly learned whaling knowledge, and stories from this specific adventure, Melville created several novels that were published later on in his life, including the world-famous Moby Dick. In all of his works, Melville reveals his own life in his creative writing style. His passion for whaling and sea voyages is presented in many of his novels, along with his internal desire to â€Å"unfold† himself and his whaling experiences, and also the portrayal of the man he wishes to be, through the descriptions of the major characters in his novels.Perhaps the most influential experiences in Melville’s life occurred on whaling ships. Ever since he was young, he was fascinated with sea life, and he eventually found â€Å"his way onto the whaling ship Acushnet in 1841 that would provide the experiences detailed in most of Melville’s repertoire† (â€Å"Melville†). He â€Å"spent a considerable amount of time on the seas as a sailor, and much of it in the South Seas’ whaling industry. Hence Melville’s favorite stories had that maritime orientation† (â€Å"Herman†).He spent many years of his life on ships traveling to and from several different countries; thus, his extensive experiences as a seaman was certainly brought out in his novels. Melville often wrote about his own journeys, like his â€Å"second book entitled, â€Å"Omoo, A Narrative of Adventures in the South Seas†, published in 1847 which was based on another whaling journey Melville took part in† (â€Å"Herman†). Melville, on another adventure, â€Å"was captured and held for several months by the Typees; when he returned unscathed, friends encouraged Melville to write the escapade down† (â€Å"Herman†).On several of these expeditions, Melville had many near-death incidents that almost cost him his life, but inspired him to record them first-hand in his novels using dramatic sentence structure that captures the reader’s attention. Melville was th e type of writer that wrote whatever came to his mind, â€Å"however, it was his adventures as a seaman in 1845 that inspired Melville to write† (â€Å"Herman†). His â€Å"experience on the island as a prisoner of the Typees caused Melville to write his first novel based on that experience† (â€Å"Melville†).Melville loved to entertain his readers with exhilarating stories about his struggles at sea, and also the near-death encounters he experienced on his journeys. Overall, Melville was greatly inspired by his sea voyages throughout his life, and based most of his novels around his passion, whaling. On the other hand, Melville also had the desire to â€Å"open† and examine himself, and perhaps the human race itself, in writing his novels. Melville was highly impacted by his courageous adventures aboard ships, but ultimately â€Å"it was his desire to â€Å"unfold† himself that drove him to a writing vocation† (â€Å"Melville†) .Nathaniel Hawthorn, the author of The Scarlet Letter, aided Melville in his writing and â€Å"was very taken with Melville’s ability to delve deep into the human psyche and find what lay there and was very supportive in Melville’s continual unfolding†¦Ã¢â‚¬  (â€Å"Melville†). Not only did Melville capture the reader with intense drama, but he also grabbed the reader’s attention by â€Å"unfolding† his own opinions and beliefs in his writing so as to challenge the reader’s previous views on issues in life. Melville was so extensive in â€Å"the use of mythic figures, stories, and analogues, that his novels are inevitably interpreted as allegories† (â€Å"Billy†).He frequently â€Å"made the stories allegories instead of strict whaling adventures† (â€Å"Melville†). One specific goal that Melville deeply valued was to make readers examine themselves and question concepts people commonly do not consider, by secretly placing a hidden meaning, usually a moral, in his novels. Melville believed that â€Å"crucial to the structure and meaning was symbol. Melville, a thorough and serious Bible reader, dwells on biblical symbolism† (â€Å"Billy†). In Billy Budd, one of Melville’s most popular novels, the main character, Billy, was sent to be executed, but just before he dies, he utters his last words, â€Å"God bless Captain Vere!† (Melville).This is meant to symbolize Christ’s cry of forgiveness in the book of Luke – â€Å"Father forgive them for they know not what they do. † Religion played a major role in Melville’s life, and he dedicated several excerpts from his novels to reveal biblical themes or stories. All in all, Melville’s writing was not meant to just entertain the reader, but also to challenge the reader’s own views by â€Å"unfolding† his own philosophies through the use of symbolism and rhetorical devi ces.Lastly, the life of Melville shows up in his own writing through the descriptions and analyses of the major characters in his novels. He was thought to bring out his own ideas in the major characters from his stories and also to be â€Å"absorbing character traits from some of those visitors which later took life in his fiction† (L’Etoile). The major characters that Melville brought to life caused critics to speculate the he â€Å"adopted the â€Å"poignant, special† power in the narrator’s voice from another source† (L’Etoile).Melville was in many ways similar to the major characters he brought to life in his novels, primarily because he aspired to be like them, and thus shared comparable qualities. People have gone â€Å"a long way toward explaining the â€Å"special† character of the narrative voice as well as the compelling quality of the story that, to so many, has seemed so elusive† (L’Etoile). Melville’ s â€Å"artificial sentence construction parallels the narrator’s style of indirect communication† (Kemp).Through his unique sentence structure and characterization of important individuals in his stories, Melville alludes to the type of person he is and also the being he wants to become using indirect communication within his characters’ actions and words. Basing the majority of his masterpieces on sea life, Melville could easily express his inner self and philosophies through the creations of the characters in his novels. Throughout his life, Melville created many masterpieces and brought to life many characters. His own life is noticeably brought out in his works through his repeated ocean oriented novels.His novels like Moby Dick and Billy Budd challenged the ways people thought back then and today by relaying hidden morals to the audience. His analyses and descriptions of major individuals in his stories are indications of how Melville thought and who he wa s/wanted to be as a person. His desire to share his beliefs with the world led him to expand his writing career and create some of the most well known pieces today using exceptional symbolism, allusions, and plots. Melville changed American literature with his famous books and continues to be studied by students around the world today.