Tuesday, August 6, 2019
Personal Attitude Speech FAA Medication Essay Example for Free
Personal Attitude Speech FAA Medication Essay Thesis Statement: I believe all pilots should avoid any type of medications that may slow the thinking process or reaction times before they fly. Introduction I. Many common medications are known to slow the thinking process and slow reaction times. II. I believe all pilots should avoid any type of medications that may slow the thinking process or reaction times before they fly. Body I. Slowness caused by medication can have a substantial negative impact on critical times of flight. a. When encountering bad weather, an unfamiliar area, or even just an unexpected flight event, the slowness caused by some medication could be the final determining factor that causes an accident. b. When encountering these types of conditions, a pilots mind must be clear to make split second decisions. II. Pilots have a great amount of responsibility placed on them with each and every flight. a. Some pilots may have the lives of several passengers behind their every move. b. Other pilots may be flying solo, but in a mishap can still cause danger to themselves or innocent bystanders on the ground. III. The FAA (Federal Aviation Administration) has compiled a list of prohibited medications, recognizing that some medications are valid for concern. a. In 12% of all fatal accidents in General Aviation prohibited medications were found to be a contributing factor (According to analysis of data by the FAA from the past decade). b. A valid point for concern that many pilots are still using impairing medications while operating aircraft, maybe unknowingly. i. Many OTC medications have a ubiquitous presence of sedating antihistamines. Conclusion I. A safe pilot should utilize the IMSAFE (which stands for Illness, Medications, Stress, Alcohol, Fatigue, and Emotions) to ensure they are safe prior to every flight, paying particular attention to the medications part of the checklist. II. I believe all pilots should avoid any type of medications that may slow the thinking process or reaction times before they fly.
Monday, August 5, 2019
Piracy at sea, past and present
Piracy at sea, past and present Summary The purpose of this report is to educate readers of the piracy at sea comparing piracy in the past and present. The earliest record of piracy at sea was in the year 69 in the Mediterranean Sea, however piracy is suspected to have dated back to the time where humans started using the sea as their trade routes the exact date is not known. The Medias used to gather and compile to put this report together was mainly found on search engines like Google or yahoo and online encyclopaedias also contributed, minimal information was taken from newspaper articles. The history of piracy, infamous pirates, background of pirates and also modern day pirates are just a few of the points on piracy that will be covered in this report. The act of piracy is mainly carried out for gold or money that the pirates will demand for certain goods that they have taken from a ship or the entire ship itself. The only punishment for pirates in the past was hanging if they were caught however the navy was occasiona lly called in to capture these pirates and in some cases large numbers of pirates were wiped out. The creator of the Jolly Roger was by 18th century pirate Captain Jack Calico Rackham. The bodies of the hanged pirates were sometimes left alone to scare the civilians preventing them from wanting to become pirates to avoid the grisly fate of death by hanging. There are numerous causes for the unusually large number of pirates in Somalia however the same cannot be said for pirates in other parts of the world as the government lacking Somalia can do little to prevent ships from other countries from overfishing and dumping of toxic waste in their waters destroying their marine life. In the past wooden ships with sails and occasionally oars were used by pirates and a reinforced hull would often be added to ram ships. Modern day pirates however use small speed boats that are able to chase down large tankers on shipping lanes and they are also equipped with semi-automatic rifles. Some shipp ing companies have equipped their ships with radar and a sonic weapon that creates a high frequency sound wave bursting the ear drums of pirates preventing from hijacking vessels, the radar helps to locate nearby vessels that are unknown allowing the captain to steer the ship away from them before they are spotted. Some companies also reroute their ships to take a longer more expensive routes in order to avoid places like Somalia where there are many pirates. The only thing that is being done by government is the prosecution of anyone who commits an act of piracy. I do not agree with this as in my opinion the root of the problem should be first addressed before the secondary one can be overcome. For example the root of the problem of piracy in Somalia would be the lack of government so that should be solved first however nothing is done to solve it. Pirates have long been used in Medias such as the movies and television where the pirates are portrayed as people who wear the same thi ng all the time and carry weapons. The media also show pirates with weird accents and they use weird combination of words that will be later revealed in shows or books what they mean. 1. Introduction 1.1 Purpose This report will be used to educate people and allow them to further understand piracy at sea and to allow introduction of certain methods that could be used to prevent piracy, precautions that can be taken by both the government and the shipping industry. It will consist of the definition, the causes, history of piracy at sea to date and also statistics on the subject. 1.2 Background Piracy dates back to the time when people started using the sea as trade routes. It is an act of robbing or cause violence to the sailors on another vessel. Piracy can occur on shore or at sea, the numerous definitions of modern day piracy includes kidnapping where one holds a prisoner for ransom. Seizing of valuable items carried on the ship while on route to a port for example oil, cars, weapons. The sinking of ships is also considered an act of piracy. 1.3 Method of Research Most of the information in this report was attained by collecting information from multiple online databases and compiling them. Other sources include newspaper articles also biographies of hostages and pirates that decided to pen down their experiences, documentaries also contributed to the production of this report as many interviews were done on both pirates and their victims. 1.4 Scope of Research This report will mainly cover the history of pirates and their origins, well known pirates and the things they did to become infamous, pirates in present day their causes and ways to help or prevent them from successfully commandeering ships and kidnapping hostages for ransom. 2.1 Early beginnings The oldest records tell us that the earliest known pirate went by the name of Anicetus born in Rome and died in Georgia. He was a captain in the Mediterranean Sea during the year 69. However it is believed that piracy started from as early as when men started using oceans as trade routes. 2.2 Aims The main aims of pirates are believed to plunder and loot from other vessels or kidnapping for ransoms. Most pirates truly had to resort to piracy in order to survive while some did it for the adrenaline rush or an act of rebellion. 2.3 Steps taken in the past Capture of pirates for bounty was common in the past as it was used as a way to discourage them from continuing in their line of work. That tactic hardly worked and some nations raised fleets in order to fight back against the pirates and provide some security on trade routes where pirates are known to roam. 2.4 Infamous Pirates The 18th century pirate Calico Jack Rackham was famous for the use of the Jolly Roger which become a symbol for pirates and is still used in entertainment purposes. The Vikings were also made famous by story books and films that portrayed them as pirates with round shields that wielded axes and wore their infamous helmets with antlers or horns mounted on top. 2.5 Hangings Pirates in the past were sentenced to hang and their bodies were often left to hang for a certain period of time in order to instil fear into people preventing them from approaching the life of a pirate. Many infamous pirates that were hanged include William Kidd, Charles Vane, Jack Calico Rackham, and William Fly. 3. Causes of piracy 3.1 Somalia The main reason why Somalia fishermen have begun to turn to piracy as their occupation would be because of the collapse of the Somalia government in 1991 which led to the lack of law enforced on the sea around Somalia allowing fishing vessels from other nations to carry out large scale pollution and fishing of the rich seas surrounding Somalia. This eventually led to the depletion of fish around the area that forced fishermen to look for other means to survive in the already economically unstable country. Many of which were too old to change and take the time to learn new skills as their families were starving hence they eventually resorted to piracy. They believe that the true criminals are in fact those that depleted their natural resources and polluted it. Their act of piracy is merely a mean of communicating with the world telling them that they require help and people need to stop dumping waste and overfishing in their waters. Before the people resorted to piracy they attempted to chase away illegal fishing trawlers from their waters by approaching them with speedboats and attempting to collect a fee from them but this was futile as. It is a known fact that over 300 million dollars worth of fishes and other goods are illegally caught and smuggled from there by these fishermen. Their attempts to continue fishing in their own waters have also failed as they claimed foreign fishing vessels attempt to ram them and have cut their net which makes the problem even worst. Their lack of government prevents them from communicating to the world as there is no appointed leader. Many of the current pirates in Somalia started of as a group that wanted to give some sense of security to fishermen but eventually became pirates. Hence the main problem can be said to be their lack of government an issue that has to be solved eventually to stabilize the country that is currently falling apart. Certain international unions however back the Somali pirates and even support them as they believe it is a way of telling the world that they need help and people need to stop illegally fishing and dumping waste in their waters. Picture of a Somali pirate 3.2 Other parts of the world Pirates are also known to roam around the straits of Malacca, Singapore, the Red Sea and the Indian Ocean. These pirates commit piracy with different reasons compared to the Somali pirates as they do it because they can, compared to most Somali pirates that do not have a choice. Some of these pirates are just gangsters that do it because it is a crime. 4.1 Methods used in the past by pirates Pirates in the past used fast boats in order to chase down merchant vessels or outrun navies. When attempting to loot a merchant vessel they would go close enough to use grappling hook and board the ship looting and killing everyone aboard, they would then either bury the treasure or bring it back to their strongholds where the loot will be split among them with the captain dividing the loot up evenly while he took a larger share, for other vessels such as fishing or navy vessels they would either attempt to outrun them or ram them with their reinforced hulls sinking ships. Later pirates also used cannons to disable ships for easier plunder. Many of the crew would carry weapons such as swords or guns to fight. 4.2 Methods used by pirates in the modern age Modern day pirates similar to their older counterparts make use of small speed boats to chase after merchant vessels heavily armed with modern day semi-automatic weapons they would then board the ship and capture the crew as hostage for a ransom that the shipping company will have to pay in order to get the goods, ship and crew back to continue the journey. These ransoms can be large sums of money which is why many shipping companies nowadays resort to taking a longer more expensive trip rather than risking the chance of their ships getting taken by pirates. 4.3 Current piracy statistics Piracy at sea has an estimated loss of 13 to 16 billion dollars each year, with the current surge of pirates in Somalia these numbers are believed to increase. The money compiles from mainly ransom collected by pirates and also belongings of the crew member. 5.1 Current methods to prevent piracy The methods currently used at sea are the patrolling of coast guards around straits that provide a false sense of security to vessels as these coast guards are not able to escort every ship in and out of their country hence piracy occurs quite frequently at places with little or no coast guards where the guards will be out of site or have just past the area. Ships are also equipped with radar so it is up to the crew members to defend themselves from pirates as regularly checking the radar will help them avoid areas where unknown vessels are in the area. Some ships are also equipped with a sonic weapon that emits a high frequency sound wave which is able to burst ear drums preventing pirates from boarding the ship. 5.2 Steps taken by the government The current laws enforced by the government against pirates is that action will be taken against anyone that puts a life in danger or is a threat to communication at sea 5.3 Steps taken by shipping companies There are a few precautions that shipping companies can take against pirates. However the few steps that are being taken by shipping companies include the rerouting of routes around areas that have a high rate of being attacked by pirates, routing their ships to follow a safer path by staying close to coast guard patrol routes and also helping their crew prepare against pirate attacks or they could also completely avoid these areas. 5.4 Steps that should be taken in my opinion Firstly the main problem that is causing people to becoming pirates should be addressed, for example the lack of a government in Somalia could be said to be the main problem in the high pirate population in the country. Hence the United Nations ought to seek away to solve it for example colonizing it to a country with more economic stability or take some responsibility and help to lead the country out of poverty. Government of countries close to Somalia should also take action and ensure that their fishing vessels do not illegally enter into Somalia to fish, allowing Somalis to return to their way of life. 6. Pirates portrayed by the media Movies on pirates usually include them dressed in a long coat with a few layers of clothes inside and the captain usually wears a triangular hat and carries a blade by his side. The captain is usually a formidably fighter that has certain values like leadership, rough edged voice, fierce look and a quick mind that is able to think clearly through battle. The term walk the plank was popularized by the film peter pan. Many movies also showed pirates talking in their unique accent and the many uncommon words used. Pirates were also portrayed as people that held many secrets and talked frequently in code words where viewers would not know the meaning until the actions were carried out Picture from the film Pirates of the Caribbean 7. Conclusion With this report i conclude that piracy is a crime that has been around for an extremely long time and this will not change. The only thing that we can change will be the number of pirates at sea by rooting out the problems we will be able to help some of the pirates who have been forced into a life of piracy for example the Somali pirates. It can also be concluded that if governments from every country in the world take some responsibility the current rate of piracy can be lowered.
Convolutional Codes Simulation Using Matlab Computer Science Essay
Convolutional Codes Simulation Using Matlab Computer Science Essay Abstract: In order to reduce the effects of random and burst errors in transmitted signal it is necessary to use error-control coding. We researched some possibilities of such coding using the MATLAB Communications Toolbox. There are two types of codes available Linear Block Codes and Convolutional Codes. In block coding the coding algorithm transforms each piece (block) of information into a code word part of which is a generated structured redundancy. Convolutional code uses an extra parameter (memory). This puts an extra constraint on the code. Convolutional codes operate on serial data, one or a few bits at a time. This paper describes basic aspects of Convolutional codes and illustrates Matlab encoding and decoding implementations. Convolutional codes are often used to improve the performance of radio and satellite links. Key words: Convolutional codes, error-control coding, radio and satellite links. 1. Introduction Convolutional codes are commonly specified by three parameters (n,k,m): n = number of output bits; k = number of input bits; m = number of memory registers. The quantity k/n called the code rate, is a measure of the efficiency of the code. Commonly k and n parameters range from 1 to 8, m from 2 to 10 and the code rate from 1/8 to 7/8 except for deep space applications where code rates as low as 1/100 or even longer have been employed. Often the manufacturers of convolutional code chips specify [1] the code by parameters (n,k,L), The quantity L is called the constraint length of the code and is defined by Constraint Length, L = k (m-1). The constraint length L represents the number of bits in the encoder memory that affect the generation of the n output bits. The constraint length L is also referred to by the capital letter K, which can be confusing with the lower case k, which represents the number of input bits. In some books K is defined as equal to product the of k and m. Often in commercial spec, the codes are specified by (r, K), where r = the code rate k/n and K is the constraint length. The constraint length K however is equal to L 1, as defined in this paper. Even though a convolutional coder accepts a fixed number of message symbols and produces a fixed number of code symbols, its computations depend not only on the current set of input symbols but on some of the previous input symbols. In general, a rate R=k/n, k à £ n, convolutional encoder input (information sequence) is a sequence of binary k-tuples, u = ..,u-1, u0, u1, u2,à ¢Ã¢â ¬Ã ¦, where . The output (code sequence) is a sequence of binary n-tuples, v = ..,v-1, v0, v1, v2,à ¢Ã¢â ¬Ã ¦, where . The sequences must start at a finite (positive or negative) time and may or may not end. The relation between the information sequences and the code sequences is determined by the equation v = uG , where is the semi-infinite generator matrix, and where the sub-matrices G i , 0à £ ià £ m, are binary kXn matrices. The arithmetic in v = uG is carried out over the binary field, F 2 , and the parts left blank in the generator matrix G are assumed to be filled in with zeros. The right hand side of v= uG defines a discrete-time convolution between u and , hence, the name convolutional codes [2]. As in many other situations where convolutions appear it is convenient to express the sequences in some sort of transform. In information theory and coding theory [3], [4] it is common to use the delay operator D, the D-transform. The information and code sequences becomes and They are related through the equation , where is the generator matrix. The set of polynomial matrices is a special case of the rational generator matrices. Hence, instead of having finite impulse response in the encoder, as for the polynomial case, we can allow periodically repeating infinite impulse responses. To make the formal definitions for this case it is easier to start in the D-domain. Let F 2((D)) denote the field of binary Laurent series. The element contains at most finitely many negative powers of D. similarly, let F 2[D] denote the ring of binary polynomials. A polynomial contains no negative powers of D and only finitely many positive. Given a pair of polynomials x(D), y(D)ÃâÃ
½ F 2[D], where y(D)à ¹0, we can obtain the element x(D)/y(D)ÃâÃ
½ F 2((D)) by long division. All non-zero ratios x(D)/y(D) are invertible, so they form the field of binary rational functions, F 2(D), which is a sub-field of F 2((D)). A rate R = k/n (binary) convolutional transducer over the field of rational functions F 2(D) is a linear mapping which can be represented as v(D)=u(D)G(D), where G(D) is a k X n transfer function matrix of rank k with entries in F 2(D) and v(D) is called the code sequence corresponding to the information sequence u(D). A rate R = k/n convolutional code C over F 2 is the image set of a rate R = k/n convolutional transducer. We will only consider realizable (causal) transfer function matrices, which we call generator matrices. A transfer function matrix of a convolutional code is called a generator matrix if it is realizable (causal). It follows from the definitions that a rate R = k/n convolutional code C with the k X n generator matrix G(D) is the row space of G(D) over F((D)). Hence, it is the set of all code sequences generated by the convolutional generator matrix, G(D). A rate R = k/n convolutional encoder of a convolutional code with rate R = k/n generator matrix G(D) over F 2(D) is a realization by linear sequential circuits of G(D). 2. Convolutional encoder simulation The Convolutional Encoder block encodes a sequence of binary input vectors to produce a sequence of binary output vectors. This block can process multiple symbols at a time. If the encoder takes k input bit streams (that is, can receive 2k possible input symbols), then this blocks input vector length is L*k for some positive integer L. Similarly, if the encoder produces n output bit streams (that is, can produce 2n possible output symbols), then this blocks output vector length is L*n. The input can be a sample-based vector with LÃ =Ã 1, or a frame-based column vector with any positive integer for L. For a variable in the MATLAB workspace [5], [6] that contains the trellis structure, we put its name as the Trellis structure parameter. This way is preferable because it causes Simulink [5] to spend less time updating the diagram at the beginning of each simulation, compared to the usage in the next bulleted item. For specify the encoder using its constraint length, generator polyno mials, and possibly feedback connection polynomials, we used a poly2trellis command within the Trellis structure field. For example, for an encoder with a constraint length of 7, code generator polynomials of 171 and 133 (in octal numbers), and a feedback connection of 171 (in octal), we have used the Trellis structure parameter to poly2trellis(7,[171 133],171). The encoder registers begin in the all-zeros state. We configured the encoder so that it resets its registers to the all-zeros state during the course of the simulation: The value None indicates that the encoder never resets; The value On each frame indicates that the encoder resets at the beginning of each frame, before processing the next frame of input data; The value On nonzero Rst input causes the block to have a second input port, labeled Rst. The signal at the Rst port is a scalar signal. When it is nonzero, the encoder resets before processing the data at the first input port. 3. Convolutional decoder simulation 3.1. Viterbi Decoder The Viterbi Decoder block [7], [1] decodes input symbols to produce binary output symbols. This block can process several symbols at a time for faster performance. If the convolutional code uses an alphabet of 2n possible symbols, then this blocks input vector length is L*n for some positive integer L. Similarly, if the decoded data uses an alphabet of 2k possible output symbols, then this blocks output vector length is L*k. The integer L is the number of frames that the block processes in each step. The input can be either a sample-based vector with LÃ =Ã 1, or a frame-based column vector with any positive integer for L. The entries of the input vector are either bipolar, binary, or integer data, depending on the Decision type parameter: Unquantized Real numbers; Hard Decision 0, 1; Soft Decision Integers between 0 and 2k-1, where k is the Number of soft decision bits parameter, with 0 for most confident decision for logical zero and 2k-1, most confident decision for logical one. Other values represent less confident decisions. If the input signal is frame-based, then the block has three possible methods for transitioning between successive frames. The Operation mode parameter controls which method the block uses: In Continuous mode, the block saves its internal state metric at the end of each frame, for use with the next frame. Each traceback path is treated independently. In Truncated mode, the block treats each frame independently. The traceback path starts at the state with the best metric and always ends in the all-zeros state. This mode is appropriate when the corresponding Convolutional Encoder block has its Reset parameter set to On each frame. In Terminated mode, the block treats each frame independently, and the traceback path always starts and ends in the all-zeros state. This mode is appropriate when the uncoded message signal (that is, the input to the corresponding Convolutional Encoder block) has enough zeros at the end of each frame to fill all memory registers of the encoder. If the encoder has k input streams and constraint length vector constr (using the polynomial description), then enough means k*max(constr-1). In the special case when the frame-based input signal contains only one symbol, the Continuous mode is most appropriate. The Traceback depth parameter, D, influences the decoding delay. The decoding delay is the number of zero symbols that precede the first decoded symbol in the output. If the input signal is sample-based, then the decoding delay consists of D zero symbols. If the input signal is frame-based and the Operation mode parameter is set to Continuous, then the decoding delay consists of D zero symbols. If the Operation mode parameter is set to Truncated or Terminated, then there is no output delay and the Traceback depth parameter must be less than or equal to the number of symbols in each frame. If the code rate is 1/2, then a typical Traceback depth value is about five times the constraint length of the code. The reset port is usable only when the Operation mode parameter is set to Continuous. Checking the Reset input check box causes the block to have an additional input port, labeled Rst. When the Rst input is nonzero, the decoder returns to its initial state by configuring its internal memory as follows: Sets the all-zeros state metric to zero; Sets all other state metrics to the maximum value; Sets the traceback memory to zero; Using a reset port on this block is analogous to setting the Reset parameter in the Convolutional Encoder block to On nonzero Rst input. 3.2. APP Decoder The APP Decoder block [8] performs a posteriori probability (APP) decoding of a convolutional code. The input L(u) represents the sequence of log-likelihoods of encoder input bits, while the input L(c) represents the sequence of log-likelihoods of code bits. The outputs L(u) and L(c) are updated versions of these sequences, based on information about the encoder. If the convolutional code uses an alphabet of 2n possible symbols, then this blocks L(c) vectors have length Q*n for some positive integer Q. Similarly, if the decoded data uses an alphabet of 2k possible output symbols, then this blocks L(u) vectors have length Q*k. The integer Q is the number of frames that the block processes in each step. The inputs can be either: Sample-based vectors having the same dimension and orientation, with QÃ =Ã 1; Frame-based column vectors with any positive integer for Q. To define the convolutional encoder that produced the coded input, we have used the Trellis structure MATLAB parameter. We tested two ways: The name as the Trellis structure parameter, for a variable in the MATLAB workspace that contains the trellis structure. This way is preferable because it causes Simulink to spend less time updating the diagram at the beginning of each simulation, compared to the usage in the next bulleted item; For specify the encoder using its constraint length, generator polynomials, and possibly feedback connection polynomials, we used a poly2trellis command within the Trellis structure field. For example, for an encoder with a constraint length of 7, code generator polynomials of 171 and 133 (in octal numbers), and a feedback connection of 171 (in octal), we used the Trellis structure parameter to poly2trellis(7,[171 133],171. To indicate how the encoder treats the trellis at the beginning and end of each frame, its necessary to set the Termination method parameter to either Truncated or Terminated. The Truncated option indicates that the encoder resets to the all-zeros state at the beginning of each frame, while the Terminated option indicates that the encoder forces the trellis to end each frame in the all-zeros state. We can control part of the decoding algorithm using the Algorithm parameter. The True APP option implements a posteriori probability. To gain speed, both the Max* and Max options approximate expressions by other quantities. The Max option uses max{ai} as the approximation, while the Max* option uses max{ai} plus a correction term. The Max* option enables the Scaling bits parameter in the mask. This parameter is the number of bits by which the block scales the data it processes internally. We have used this parameter to avoid losing precision during the computations. It is especially appropriate for implementation uses fixed-point components. 4. Conclusions In these work we have constructed and tested in Maple convolutional encoders and decoders of various types, rates, and memories. Convolutional codes are fundamentally different from other classes of codes, in that a continuous sequence of message bits is mapped into a continuous sequence of encoder output bits. It is well-known in the literature and practice that these codes achieve a larger coding gain than that with block coding with the same complexity. The encoder operating at a rate 1/n bits/symbol, may be viewed as a finite-state machine that consists of an M-stage shift register with prescribed connections to n modulo-2 adders, and a multiplexer that serializes the outputs of the adders.
Sunday, August 4, 2019
The Luddite Revolt :: European Europe History
The Luddite Revolt England at the Turn of the Century At the beginning of the 1800's England was still largely an agricultural country. Frank Ongley Durvall in his text, Popular Disturbances and Public Order in Regency England, states that "over half the population [was] living in the country"(12). In London there were over one million dwellers. Nevertheless, this city's population comprised only one-tenth of the entire population of England. Aside from London, most cities and towns contained only several thousand people, where the average household size was between five to six persons. The transportation of products and people around the nation was limited in part by the fact that the English population was still predominantly dispersed throughout the countryside and that most goods were still being made locally. However another factor that limited transportation was its relative lack of modernization. At the turn of the century England had yet to establish a railroad system. The primary means of shipping goods was either by boat using canals or by horse-drawn cart on roadways. Meanwhile, travelers depended upon either their feet or horse-drawn carriage to get them where ever they wished. As I briefly mentioned above during this period most industry was located in the country, with the majority of work taking place in the home work-shops of craftsmen. Any manufacturing plants that did exist at that time were water powered. These factories were usually small and only employed a handful of workers. The major industries at the beginning of the 1800's were textiles, hosiery, lace, iron mining and manufacture, ship building, and coal mining. Yet, agriculture was still the number one business, with some 35 percent, or more, of the populace of the island working in it(14). In many villages craftsmen would not only work making goods but would also cultivate small private lots. From these household plots they would harvest crops for their family's consumption and for trade. If these craftsmen did not own their own plot they would join others in tending to a communal field from which all members of the community could partake of the harvest. Because of this agriculturally powered economy most businesses remained predominantly local. Business owners were usually residents of the town where their businesses were located, so that they had a material interest in the prosperity and success of the town. This localization of business, along with industry, allowed for a harmonious connection to develop between the owners and their workers.
Saturday, August 3, 2019
A Rose for Emily Essay -- essays papers
A Rose for Emily Emily is a woman that has had a hard life. Her family made it so that she was held in high regard in the public eye. She was not suppose to encounter relationships that were below her stature. The town, being the antagonist, drives Emily to her insanity because they will not allow her to lead a normal life. They liked the ââ¬Å"showâ⬠they were watching a refused to give it up. The narrator explores how Emily is defined in her position in the town by her name and her father. ââ¬Å"People in our town, [. . .], believed the Griersons held themselves a little too high for what they really were.â⬠(pg.83) Emilyââ¬â¢s father had been controlling during her early life and had stopped all suitors from visiting her. ââ¬Å" we had all remembered all the young men her father had driven away, [. . . ]â⬠Emily is forced to live in a house were her father will is paramount to her own. When he dies we understand this lose is almost to much for her to bear. ââ¬Å" Miss Emily met them at the door, dressed as usual with no trace of grief on her face. She told them her father was not...
Friday, August 2, 2019
Aristotle Impact on Law Essay
Aristotle (384 ââ¬â 322 BC), was a Greek philosopher, logician, and scientist. Along with his teacher Plato, Aristotle is generally regarded as one of the most influential ancient thinkers in a various ways. Aristotle was born in Stagira in northern Greece, and as a young man he studied in Platoââ¬â¢s Academy in Athens. After Platoââ¬â¢s death he left Athens to proceed in philosophical and biological research in Asia Minor and Lesbos, and he was then invited by King Philip II of Macedonia to tutor his young son, Alexander the Great. Aristotle was extremely successful in tutoring Alexander, as he develoepd a great mind and was widely known for launching the invasion of the Persian Empire. Aristotle returned as a resident to Athens, and it was during this time (335-323 BC) when he wrote or at least completed some of his major theories, which included law. Aristotle and his teacher Plato, had alike minds when it came to their political views. They both believed that law had a moral purpose. They thought that it made people live their lives based on their reason, rather then their passion. When Aristotle talks about people following their reason, he means that they live their lives to the fullest taking in consideration all the talent and skill they are blessed with and using it to their advantage. One accomplishes this by making the most out of what he/she has been given to benefit themselves in life. Basically, he was following the natural law tradition because he felt as though the most important purpose of law was to help people live their lives positively and be happy. Law helped lead people into a positive directionâ⬠¦ Aristotle advanced a theory of individual rights, at the same time accepting aspects of positive law theory and natural law theory. He was supporting equity in judicial decision making and tells us how this can operate consistently with the rule of law. Also, Aristotleââ¬â¢s brilliant ideas on ethics forms a basis for punishment in criminal law. He teaches how to educate lawyers and the legal profession to incorporate ethics and virtue; he teaches lawyers how they can be more persuasive. Furthermore, Aristotle also had a huge insight on moral virtues and believed that if these virtues are to be nurtured, law is needed. He believed that law is essential to help discipline citizens and their actions, as well as to help maintain the beneficial habits they acquire. One of the most important aspects of our modern court/trial is the examining of the evidence. In most cases, the amount of quality evidence, or the lack of evidence, plays a huge role in making the final decision. Aristotle was the first person to think out the problem on evidence. When he approached a problem, he would examine: a) what people had previously written or said on the subject, b.) the general consensus of opinion on the subject, and c)a systematic study of everything else that is part of or related to the subject. His studies on evidence extremely influenced the concept and everything that comes along with it in the present day. He believed that every action needs to be judged according to all the relevant circumstances to the situation. As just mentioned, Aristotle believed that every action needed to be judged. Therefore, he believed that judging these actions were to be done based on the concept of equity. It was the foundation of modern law and the road to justice. Aristotle was against some aspects of equity. For example, Aristotle believed that men were more useful and important in life. He believed that women should not be granted many of the rights that men had, such as the right to vote, but that is a different topic. When it came to judging someone based on his/her actions, Aristotle supported the concept of equity 100%. Aristotle seems to be primarily concerned to discover and refine the moral standards by which human beings should be governed. What laws are to be used to establish and maintain those standards depends on the good sense of the community and the prudence of its leaders, including its poets and other educators. In particular, his views on the connection between the well-being of the political community and that of the citizens who make it up, his belief that citizens must actively participate in politics if they are to be happy and virtuous, and his analysis of what causes and prevents revolution within political communities have been a source of inspiration for many contemporary theorists.
Thursday, August 1, 2019
Mesopotamian and Egyptian Culture on the Creation of the Old Testament
The Bible has been around for so many years now, thatââ¬â¢s why most people think that it is the most comprehensive book on ancient history. For some, it is even the basis for the creation of other scriptures of other religion, as well as the creation of other religions. However, record shows that there are some important details that is the same in the Bible, the Old Testament with the writings of other culture. This means that there are some significant parts of the holy book that might have been patterned with the writings in other religions or cultures.This means that no matter how old the Bible is, its creation has been influenced by other cultureââ¬â¢s and other religionââ¬â¢s writings. The Epic of Gilgamesh Gilgamesh, the Sumerian King from the city of Uruk who lived and ruled around 2500 years B. C. There are no concrete relations of relating the account on Gilgamesh with human history, other than that it was passed through word of mouth some 3,700 years ago ââ¬â around 2100 B. C. as a part of the oldest works of literature that man knows of which is The Epic of Gilgamesh.As compared to the part of the Book of Exodus wherein Moses liberates the Hebrew slaves out of Egypt, it would be around 1300-1200 B. C. if ever it actually existed. But with these dates, that would make the stories of the Epic of Gilgamesh be around 800-900 years older than that of the Old Testamentââ¬â¢s Book of Exodus. This is to build upon the facts of which of them comes first, so that it is easier to tell which of them adopts the ideas of whom. Gilgamesh seemed to have encountered a great flood as well, in The Epics of Gilgamesh.It was when Utanapishtim confided to Gilgamesh about an old city where the gods might reside. It has been moved by the Greater Gods so that they can flood out the whole region to purge the evil-doers. This is much like the Great Flood which was inflicted by God in order to punish the human race. There were also groups of people who were sp ared, those who were given a warning before the punishment was actually inflicted. They were carefully instructed on what ways they will be spared and what they have to do for that matter.Noah was to build an ark with specific dimensions and materials, as for Gilgamesh, he was instructed to tear down a house and build a large boat with a roof. The similarities are obvious. They were both instructed to load up their boats with all animal life forms that they can find. Gilgamesh is considered to be the Babylonian Noah who has lived his purpose and took part in purging the world of sinful elements. The great flood will end all lives on earth, and the only thing that would save them is through constructing a huge ark.This ark will also be filled with all types of animals for them survive the flood. These facts could mean that the part of the Bible telling about Noah could be an adaptation of the earlier Epics of Gilgamesh, as manifested by their similarities in content. Hammurabiââ¬â ¢s Laws The sixth king of the Babylonian Dynasty, King Hammurabi, existed some time between 1792 to1750 B. C. and is the known author of the Code of Hammurabi. His existence was about 300 years earlier than that of Moses, the one who liberated the Hebrew slaves from their Egyptian masters, the one has been shown the Ten Commandments of the Lord.Again, this is to establish which comes first, who couldââ¬â¢ve copied whom, in the context of Moses and King Hammurabi. The fist concept was on the respect for parents, which established the importance of the family, the most basic unit of daily life. According to Hammurabi, there should always be respect to oneââ¬â¢s parents. If a son has struck his father, then the appropriate punishment would be to cut-off his arms. In Mosaic law, death awaits for those who cursed their father and mother and acted stubbornly or rebelliously. Another important aspect would the vitality of marriage.According to Hammurabi, it is ok to send away oneâ⠬â¢s wife as long as the husband provides sustenance for their children to be raised properly. On the other hand, Mosaic Law allowed divorce on the grounds that when a spouse is found indecent or unfaithful. Both suggested death for both man and woman if ever they get caught committing adultery. Both has also forbade incest, wherein the punishment would be severe and would more or less be death. Another aspect that showed relevant similarities was on slavery. Both Hammurabi and Mosaic laws permitted to own slaves.However, they are also held liable with the death of any of their slaves. They are the ones who are responsible for their slavesââ¬â¢ actions. Another point of similarity is regarding theft. These cases are not to be treated lightly for both the Mosaic and Hammurabiââ¬â¢s laws. Mosaic law states that for those proven to have stolen something, they must return it five folds if it was killed and if it was alive, it should be returned. Meanwhile, for Hammurabi, it would depend whether thirty or ten times over, depending on the social status.However, if one is caught on the act of robbery, then punishment would be death. The one that manifests great similarity was their point on the laws regarding physical injury. For Mosaic law, if the injury was not serious, the guilty person is fined and the money will be given to the one who the damage was done to. But if the injury was serious, just like what Hammurabi said, it was right to take life for life, an eye for an eye, a tooth for a tooth. Hymn to Aton The Old Testament has also borrowed some texts from important Egyptian texts.The Hymn to the Great God Aton showed some relevant similarities with praises for the Lord, thanking him for all His blessings. Some passages on Psalms are the same with tomb scriptures in the tomb of some relevant figures in Egyptian history to have ever existed. It may be a coincidence, but to bear almost similar thoughts on the same concepts would be nearly impossible. Sina i Covenant The Sinai Covenant, as mediated by Moses, can be considered as the last defining moments in the priestly history of the bond which is formed the divine entity and the human beings.The main components and proponents of this covenant are the brave people of Israel, and were however hampered by the laws and regulations being set by other books like Exodus and Leviticus. So, order to show their grateful nature, they have assigned a whole day for worship. It is the Sabbath day which is also the sign o that covenant, used to keep and uphold the laws. Having this Sabbath day is common for many cultures. This is because people devoted time and effort to their gods, thatââ¬â¢s why they have to assign certain days for worship to the Lord. This is also a way to check on everyoneââ¬â¢s faith in the religion that they belong to.
Subscribe to:
Posts (Atom)