Thursday, December 26, 2019

Mini Review Spatial Cognition - 3454 Words

Mini-Review: Spatial Cognition Spatial Cognition is concerned with the achievement, organization, application, and modification of knowledge about spatial surroundings (Bandura., 1963). These capabilities enable animals and humans to manage basic and high-level cognitive tasks in everyday life (Bandura.,1971). Spatial cognition studies have assisted to tie cognitive psychology and neuroscience together. Most researchers are concerned about how animals acquire and find information. Since acquiring and acting on spatial information appears to have computational requirements from learning to predict temporal sequences of events, we might expect to find adaptively specialized, domain-specific mechanisms of spatial learning and/or†¦show more content†¦The global picture developing from this support is that spatial cognition can be split into two genres which are to some magnitude divided in mammalian brain (Hartley Burgess., 2001). There are various mechanisms for spatial cognit ion, which pose the ultimate question: â€Å"Do animals have cognitive maps?† (Shettleworth., 2010) These include dead reckoning, beacons, landmarks, routes, and geometry (Shettleworth., 2010). Dead reckoning is an internal sense of the direction and distance of the target from the current position. It is one of the most basic and ubiquitous ways in which animals keep track of their location with respect to a known position. It has been mostly studied in bees, spiders, and ants. Dead reckoning is a mechanism for egocentric spatial localization, that is, the animal is localizing things in the environment with respect to itself. Beacons are local or proximal cues, whereas landmarks are global or distal cues (Shettleworth., 2010). A guide animals can use when features of a goal are not immediately perceptible from a distance in fixed locations are called landmarks (Shettleworth., 2010). They are used based on three factors: template matching and local views, vector sum model, an d multiple bearing models. Route learning is often referred to as reaching a goal using a series of landmarks, which is a series of stimulus-response (S-R) associations (Shettleworth., 2010). This concept can be

Wednesday, December 18, 2019

Analysis Of Tim O Brien s The Things They Carried

The Silent Killer: An Analysis of Imagination Evolving into a Distraction in Tim O’Brien’s â€Å"The Things They Carried† In Tim O’Brien’s â€Å"The Things They Carried†, O’Brien created several allusions that each character endured during the Vietnam War. Throughout the story were vast representations of the things the soldiers carried both mentally and physically. The things they carried symbolized their individual roles internally and externally. In addition to the symbolism, imagination was a focal theme that stood out amongst the characters. This particular theme played a role as the silent killer amongst Lt. Cross and the platoon both individually and collectively as a group. The theme of imagination created an in depth look of how the war was perceived through each character which helped emphasize their thoughts from an emotional standpoint of being young men out at war. Imagination hindered the platoon which clouded their judgment and decision making. Instead of remaining focused their wandering mind lacked what was necessary, assessing the task at hand. â€Å"In some respects, though not many, the waiting was worse than the tunnel itself. Imagination was a killer.† (O’Brien 619) In relation to the quote â€Å"imagination was a killer†, this metaphor represents how the soldiers made situations like being in the tunnel mentally challenging for them. Paranoia quickly consumed their thoughts and emotions before partaking in the actual mission. The menShow MoreRelatedAn Analysis Of Tim O Brien s Things They Carried1183 Words   |  5 Pagespoetic qualities such as literary devices, imagery, and theme, and many more. Tim O’Brien’s Things They Carried depicts a fragmented stories about his and other soldiers’ experiences that occurred in the Vietnam War. Similarly, the poem, â€Å"Facing It† shows a s oldier who returns to the Memorial of the Vietnam War where he recalls his own trauma in the war as he looks at the stones. Both the prose, Things They Carried and the poem, â€Å"Facing it† conveys the similar theme where they are struggling toRead MoreAnalysis Of Tim O Brien s The Things They Carried Essay1574 Words   |  7 Pages To Ban or not to Ban : The Things They Carried Host: Hello and welcome to ban or not to ban, where the nations most exciting topics are discussed between opposing parties. Today we re debating whether or not to ban â€Å"Tim O Brien s novel The Things They Carried. In this book author Tim O’Brien depicts the Vietnam conflict by distinguishing between the role of whether or not to be a civilian or a soldier. Though the book is fictional, Tim O’Brien portrays himself as a man who strugglesRead MoreAnalysis Of Tim O Brien s The Things They Carried Essay997 Words   |  4 PagesXizhao Liu(Amber) American Literature Essay #3 Nov. 11, 2016 Male love in The Things They Carried The Things They Carried by Tim O’Brien is a fictional book consisting of different stories from Vietnam war. Tim O’Brien was trying to convey the real perspectives of the war to his readers by telling facts and stories through his personal memories he got from the war, and how things effect them and their life after the war. In order to express the tension in the war, O’Brien depicts the experience ofRead MoreAnalysis Of Tim O Brien s The Things They Carried 1187 Words   |  5 PagesThere were many things the soldiers carried with them during the Vietnam War. They carried guns and ammo, rations and canteens, and things necessary for survival. The soldiers also carried letters, photographs and land of Vietnam itself. Tim O’Brien tells of this in The Things They Carried, a book detailing the lives of the soldiers in Vietnam through the things the men carried with them. Not everything the men carried was physical, however. The soldiers carried ghosts, mem ories, and burdens. EveryoneRead MoreAnalysis Of Tim O Brien s The Things They Carried Essay2347 Words   |  10 PagesThe decision to go to war is not a decision that is taken lightly. In Tim O’Brien’s The Things They Carried, Tim O’Brien faces cultural, social and political push factors that end up leading him to forgo his plan to dodge the draft, and to report as instructed, a mere yards away from his destination of Canada. In Leslie Marmon Silko’s Ceremony, Rocky and Tayo, two young Native American men, experience cultural, social and political pull factors that draw them into the Army, fighting the Second WorldRead MoreAnalysis Of Tim O Brien s The Things They Carried All Experience1859 Words   |  8 PagesYou: Tim O Brien s Methods To Overcome Loss Throughout the 1980s, Dr. Terence M. Keane ran experiments on a new idea called exposure therapy. The case studied how victims of trauma would react to being repeatedly shown places, imagines, and stories that mirrored theirs. In the study was twenty four veterans of the Vietnam War, and at the end of the study, they no longer had reactions classified as severe anxiety. Like the veterans in this case study, soldiers in Tim O Brien s The Things TheyRead MoreAnalysis Of Tim O Brien s The Things They Carried During The War Essay1532 Words   |  7 PagesIn this paper I will argue that in Tim O’Brien’s The Things They Carried during the war a person experience develop guilt from an event that happened during the war and how it affects them for life. The three people specifically, I will take about are First Lieutenant Jimmy Cross, Norman Bowker, and Tim. Telling about how the experienced guilt, where the guilt comes from, and if they ever find absolution. The first story of two stories for First Lieutenant Jimmy Cross feels guilty about the deathRead MoreAnalysis Of The Book The Things They Carried 2006 Words   |  9 Pages 1. Birth-October 1, 1946; present 2. The things they carried was written in the late 1980 s and published in 1990. The novel acts as a response to the era it discusses by solidifying the un-generalized version of war through fictional anecdotes from the narrator and characters. The truth is never portrayed through historic context or media, and with this novel, the author was able to reciprocate the emotions felt by soldiers from the graphic scenes or actions envisioned/written. 3. FactorsRead MoreThe Things They Carried Critical Analysis1538 Words   |  7 Pagesafter the Fall of Saigon, the Vietnam War remains an affliction for Vietnam War Veterans and their families. Millions of our youth were forced to leave their home and carry inconceivable burdens. Thus, as a Veteran, Tim O’Brien can depict thoroughly their burdens in â€Å"The Things They Carried†. His story brings us back to war-torn Vietnam and First Lieutenant Jimmy Cross and his platoon. Cross is the commanding officer; however, he does not concentrate on the war but on his unrequited love. As a resultRead MoreThe Vietnam War Has Far Reaching Consequences For The United States1710 Words   |  7 Pagesof American history is a national disgrace. This research paper will deal with some of the more intriguing aspects and effects of this war. Since the Vietnam conflict made absolutely no sense politically, militarily or economically, the value of analysis must come on the individual level. The Vietnam War had far-reaching consequences for the United States. This paper will exhaustively discuss how these issues caused the psychological effects of the Vietnam War on the soldiers morale afore the war

Tuesday, December 10, 2019

Generating Digital Certificate Using Openssl

Question: Discuss about theGenerating Digital Certificate Using Openssl. Answer: Introduction SSL,TSL Secure Sockets Layer (SSL) as well as its succeeded, the Transport Layer Security (TLS), both termed as SSL, are used to provide secured communication over the internet, and it is considered as a cryptographic protocols. Many websites are equipped with the TLS for securing the communication in between the servers and client, who is trying to access the data. TLS protocol is proposed standard of IETF (Internet Engineering Task Force), defined, initially, in the year 1999 and later updated in 2008, as RFC 5246 and again as RFC 6176, in 2011. The standard is based on the SSL specification. Uses TSL protocol has the following objectives and goals. To provide the privacy of the data To provide the integrity of data Benefits TLS protocol benefits the client server communication, by preventing the tampering and eavesdropping. Between Two Applications, Communicating among the Computers. When the server and client are communicated through the communication security protocol, TLS, the following properties will be gained by the server and client. The data and communication between the server and the client would be encrypted, through the symmetric cryptography and so the connection is considered to be private. The communication is established only through the key and the key becomes the symmetric encryption and these are generated uniquely, for each and every connection. The generation of the key is dependent upon, a shared secret, which is negotiated and generated, before the session is started for communication, through TLS handshake protocol. Initially, the server and client communicate and negotiate about the details, regarding the algorithm of the encryption and cryptographic keys for using and only after this process, the first byte of data will start transmitting and sharing. Here, the negotiation and communication about the shared secret is also kept reliable and secure from the attackers or hackers. Both the parties of communication are identified only through authentication done through the public-key cryptography. Though the authentication is sometimes kept optional it is usually done by the server. Each and every message transferred between the server and client are maintained to be reliable, as message integrity is maintained, with the help of the message authentication code, for preventing the alteration or undetected loss of the data, while transmission. The communication can be secured with additional privacy property, like forward secrecy that would prevent any possibiltiies of disclosing the encryption keys in the future to decrypt the recorded communication of the TLS, done in the past. The TLS active certificates are monitored by Netcraft and according to it, the leading certificate authority in this domain is Symantec. Application When the TLS certificates are installed, the protocols are implemented over the layer called transport layer protocols that encrypt protocol data, related to the protocol, like FTP, HTTP, XMPP, NNTP, etc. Uses The primary use and benefit of the TLS protocol is the secured communication of the World Wide Web traffic that is established in between the web browser and website that are encoded with the protocol of HTTP. Compatibility The digital certificates that are created by the year 2016, can be installed with the versions that are latest, like TLS 1.0, 1.1 and 1.2. The protocol can be enabled and used in several browsers as the following. Google Chrome Google Android OS Browser Mozilla Firefox Microsoft Internet Explorer Microsoft Edge Microsoft Internet Explorer Mobile Microsoft Edge Opera Apple Safari Support There are many libraries that can be supportive to the TLS or SSL, as the following. OpenSSL JAVA Secure Socket Extension MatrixSSL LibreSSL Gnu TLS Botan Mbed TLS Network Security Services RSA Bsafe SChannel Secure Transport OS X ShartkSSL WolfSSL Protection The digital certificates can provide the protection from the following attacks imposed over the SSL or TSL. Renegotiation attack Protocol downgrade attack BEAST Attack Cross-protocol attacks Downgrade attacks, like Logjam attack and FREAWK attack CRIME and BREACH attack Padding timing attacks POODLE attack RC4 Attack Truncation attack Forward Secrecy Forwards secrecy is an important parameter and property of the system of cryptography. This parameter is used to ensure that a derived session key from combination of the private and public keys doesnt get compromised, in case any of the private keys, in case it is compromised possibly in the future. Client-Server Communication With Tls Protocol Client server communication can be done with or without the protocol, TLS. However, for the security concerns, client would ask the server to setup the connection of a TLS. Client communicates it in two different ways. One way is using a TLS connection port number. And another way is using a mechanism that is protocol specific. If the server is enabled to setup TLS connection, both the server and client will start negotiating the stateful connection, initiated by the procedure called handshaking. The client and server would come to an agreeable point, with reference to various following parameters. Initially, client connects a server, which is TLS enabled, requesting for a secured connection. It presents cipher suites supported list and then the handshake procedure will be started. The hash function and cipher from the list is picked by the server, upon matching. Then the server notifies the decision of it to the client. The identification is then sent back to the client, in the form of digital certificate and public encryption key of the server. The client will then confirm the certificate validation and then proceeds further. The session keys are generated by the client for the secured connection, through Encrypting a random number with the public key of the server and the result is sent to the server. And the server will be able to decrypt the code, only with the use of the private key. Then both client and server use the random numbers for generating a key unique to the session for the following data encryption and decryption, while the session is going on. The client makes use of the Diffle-Hellman key exchange to generate the unique and random session keys towards the encryption and decryption, which benefit with forward secrecy. The procedure concludes the secured connection through the handshake and a secured connection will begin and continued till the end of the connection. The connection will not be created, if the handshake of the TLS is failed during any step, above. TLS has the basic component called certificates, which are digital certificates, specifically. Digital Certificate The objective of the digital certificate is to certify the public key ownership, by the subject name fo the certificate. Digital certificate is also called as a public key certificate. The certificate is an electronic document referred for the validity and ownership of the public key. The digital certificate or public key certificate contains the information, Information about the identity of the owner Information of the key Entity digital signature, which shows that the verified contents of the certificate are correct Once the signature is proved to be valid, the signer will be trusted by the certificate examining person. Then the key will be used for the communication. Here, the signer is typically a certificate authority or CA. most of the time it is a company that validates the company and issues the certificate to the company. So, the signer becomes the owner of the key, for typical self-signed certificate or possibly the endorsements or other users, whom the examiner trusts, upon verification and validation. Certificate Authority Here, the trust relationship, associated with this model is expressed in terms of the certificate authority, as third party that is trusted. The trust is won by both the party that relies over the certificate and the owner or subject of the certificate. Contents The contents of the usual and regular and typical digital certificates are the following key points. Serial number that is used to identify the certificate uniquely Subject, which is an entity or a person identified Signature Algorithm, which represents the algorithm that is used for signature creation Signature, which is the actual signature used to verify that it has come from the issuer Issuer, which is an entity that has been verified, in terms of the information and the cerfiticate that is issued Valid-from, which represents the data of the certificate that has been made available from the day Valid-to, which represents the date of expiration Public key Key-usage, which is used for the public key purpose, like signature, encipherment and certificate signing Thumbprint or fingerprint, which is the hash itself Thumbprint algorithm, which an algorithm used for hash the certificate of the public key Security Levels The digital certificates are usually installed for the commonly used website that are based on HTTPS. The security is represented and provided by the verification and validation of the TLS web server. The digital certification ensures the security of the website, by ensuring that the website is the same, for whom, it is claimed to be and also makes sure that it has no eavesdroppers. The security is implemented as a mandate feature of the electronic commerce websites. Certification The digital certificate can be obtained by any entity or an individual for his or her own website, by applying to the issuer, who provides the certificate. Typically, the issuer is the certificate authorities, who are the commercial certificates retailers. The applier has to provide the basic information of the website and preferably the details of the entity or the business, with the details, like name fo the website, email address for contact, detailed information about the compnay and the public key. Here, the private should not be sent, as there can be related issues with the server. Then the provider fo the certificate verifies all the information provided by the applicant and signs on the request and then would it signs the request and provides the public certificate. When the web browsing is performed, the public certificate that has been issued to the entity, is served to the browser, which connects the required website and the certificate proves to the web browser that the i t is believed by the provider that the certificate is issued to the real and truthful website owner. Validation The digital certificates can be validated at various levels. Domain Validation, in which the certificate is issued, if the purchaser and applicant is able to demonstrate the right to manage the domain name, administratively Organization validation, in which the certificate is issued, only after ensuring that the applicant or purchaser can demonstrate the ability to manage the domain name and the existence of the organization, in terms of the legal entity Extended validation, in which the purchaser has to prove the identity of the organization, in terms of complete legal identity OPENSSL OpenSSL stands to be a software library developed for the applications. Which need more protection and security of the communication against the need to ascertain the partys identity at the other end. It is used widely by the web servers in the internet. The potential benefit of the OpenSSL can be implemented for a free of cost, as it is available through open source. So, any organization or even the individuals can implement the protocols of the SSL and TSL. The library functions are written using the C programming language and help implementing the basic cryptographic functions to provide many of the utility functions. OpenSSL is widely available for the operating systems, especially for the UNIX based and UNIX like operating systems, like Mac OS X, Linux, Solaris, etc. OpenSSL usually support many of the cryptographic algorithms, lie Ciphers, public-key cryptography and cryptographic hash functions. Generation Of Certificates The digital certificates can be created using many kinds of tools, like OpenSSL. Procedure Generating the Digital Certificate The first step of the procedure is the creation of the Certificate Authority (CA). Initially, this testing is required to be done with the help of the CA. the certificate is obtained usually from the certification authority companies, like VeriSign, DIgiCert, etc. This task is associated with requesting the digital certificate for the certificate authority. This task is quite similar for both the server and client and the difference being the values specified. Here, let us consider, a company called XYZ, which is the organization that has applied to become a certificate authority. Initially, a request is sent for the certificate to the CA make it signed, so that it becomes a CA. after XYZ becomes a certificate authority, it can start issuing the digital certificates to the servers and clients for the networks. These certificates that are generated by the XYZ, they are taken as site-signed certificates. These certificates can be generated by even individuals, to secure the personal network requirements. Create an openssl.cnf file or if it already existing, edit the same file. By default, it looks in /usr/lib/ssl/openssl.cnf, for the configuration. However, it is always good to add config ./opnessl.cnf to the OpenSSL CA commands or OpenSSL REQ for ensuring that the correct file is read by OpenSSL. Select the subdirectory of an app of the directory, in which it is built. Initialize the OpenSSL,$ openssl Now the commands are issued to request a digital certificate. Here, a RSA private key is created to generate a CSR (Certificate Signing Request), simultaneously. Eventually, messages are displayed and then there will be additional information prompted, based on the request done. When enter key is pressed, a default value is accepted. However, this default value can be changed by typing the respective information and pressing enter key. If the option, NODES is added in the OpenSSL command, during the digital certificate request creation, OpenSSL prompts for necessary password, before the access is allowed for the private key. Certificate signing request generation based on the certificate that is existing. The following tasks performed to generation of the digital certificate, for a server, client and CA based on the certificates existing. Then the digital certificates are to be generated using the OpenSSL commands, on UNIX. It has to use the values and arguments from the commands. Then the informational messages are displayed for the information needed, based on the request made. Again enter key is to be pressed to accept the default value or any other specific information can be given in place of the default value. Then the digital certificate generation is completed. Here, a self-signed certificate for a root CA digital certificate represent the digital certificate that gets private key signed to correspond the public key, present in the digital certificate. Digital certificates are usually signed using private key, except for the root CAs, corresponding to the public keys, which are related to the other certificate authorities. Checking the digital certificate by OpenSSL The digital certificate that is generated can be checked with the help of the command, openssl x509 text in filename.pem finally the digital certificate that is generated contains the necessary data that has been collected for generation of the digital signature, digital certificate timestamps and other necessary information. However, the generated digital certificate is unreadable, as it is encoded into the PEM format. Creating a certificate trust list through OpenSSL After digital certificates are created for the server, CA and the client, which is optional, then the OpenSSL client application is to be identified for the certificate authorities of one or more that are trusted and the list that is made is called the trust list. In case, the trust is needed for only one CA in the application of the client, the file name has to be specified for all the CAs digital certificates, which are to be trusted by the application of the client. The certificate authorities that are created can be primary, root or intermediate certificates. They are to be added with the file, listing in any order. This list can be created manually. Usually, .pem files are returned by OpenSSL, return .crt files of CA. The certificate authority files are concatenated together, instead of cutting and pasting the files manually, together, irrespective of the extension. For example, a primary certificate, root authority certificate and authority certificate file can be concatenated, all in a single file called PEM file. These files can be placed in any order. Since the digital certificates are unreadable, because of encoding, the file contents can be viewed, through the OpenSSL commands, for respective file types. If there are files stored or present in the DER format, for the digital certifcates, they must be converted in to the format of PEM. Certification verification in the trust chain through OpenSSL Servers and clients validate the digital certificates of each other after exchanging. The CA certificates required for validation of the server certificate do create or compose the trust chain. It is because the server certificate validation requires all of the CA certificates present in the trust chain are to be made available. These files can be either maintained as individual files or combined into a single file, all in one OpenSSL directory. The certificates that are signed can be verified using the OpenSSL command, by a recognized CA. in case, the certificate is recognized by the OpenSSL installation, or the signing authority and then everything gets checked out, such as signing chain, dates, etc. it displays simply OK message. Ending OpenSSL Finally, OpenSSL can be ended through quit command at the command prompt. Conclusion Digital certificates are the means of providing the safe web traffic for the websites. These digital certificates can be created by a very large scale organizations or simply an individual for protected and safe web traffic resulting to their websites. The digital certificates are associated with the SSL and TLS protocols, which are majorly used for protection of the communication and interaction of the server and client. OpenSSL is one of the easier ways and economical ways to generate the digital certificates for the website. References AlFardan, N, Bernstein, D, Paterson, K, Poettering, B and Schuldt, J,"On the Security of RC4 in TLS". Royal Holloway University of London AlFardan, Nadhem J.; Bernstein, Daniel J.; Paterson, Kenneth G.; Poettering, Bertram; Schuldt, Jacob C. N., 2013, On the Security of RC4 in TLS, . 22ndUSENIXSecurity Symposium. p.51 AlFardan, Nadhem J.; Bernstein, Daniel J.; Paterson, Kenneth G.; Poettering, Bertram; Schuldt, Jacob C. N. 2013, "On the Security of RC4 in TLS and WPA" Boneh, Dan, 1999, "Twenty Years of attacks on the RSA Cryptosystem".Notices of the American Mathematical Society46(2): Coppersmith, Don, 1997, "Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities".Journal of Cryptology10 Cormen, Thomas H., Leiserson, Charles E., Rivest, Ronald L.Stein, Clifford,2001, Introduction to Algorithms(2nd ed.). MIT Press and McGraw-Hill. Daignire, Florent."TLS "Secrets": What everyone forgot to tell you...", Matta Consulting Limited Dierks, T, Rescorla, E, August 2008,"The Transport Layer Security (TLS) Protocol, Version 1.2" Diffie, W.; Hellman, M.E. 1976, "New directions in cryptography".IEEE Transactions on Information Theory22 Diffie, W.;Hellman, M., 1976,."New directions in cryptography"(PDF).IEEE Transactions on Information Theory22 Diffie, Whitfield; van Oorschot, Paul C; Wiener, Michael J., 1992, ."Authentication and Authenticated Key Exchanges".Designs, Codes and Cryptography2 Goodin, Dan."Forbidden attack" makes dozens of HTTPS Visa sites vulnerable to tampering".Ars Technica. Cond Nast Hstad, Johan, 1986. "On using RSA with Low Exponent in a Public Key Network".Advances in Cryptology CRYPTO 85 Proceedings. Lecture Notes in Computer Science218 Hendric, William, 2015, "A Complete overview of Trusted Certificates - CABForum" Huang, L.S., Adhikarla, S, Boneh, D, Jackson, C, 2014, "An Experimental Study of TLS Forward Secrecy Deployments".IEEE Internet Computing(IEEE) Koblitz, N, 1987, A Course in Number Theory and Cryptography, Graduate Texts in Math., Second edition No. 114, Springer-Verlag, New York,., Leyden, John, 2013, "Step into the BREACH: New attack developed to read encrypted web data".The Registe Leyden, John, 2013, "Step into the BREACH: New attack developed to read encrypted web data".The Register Menezes, Alfred; van Oorschot, Paul C.; Vanstone, Scott A., October 1996, Handbook of Applied Cryptography. CRC Press Merkle, Ralph .C, April 1978, "Secure Communications Over Insecure Channels".Communications of the ACM21 Mller, Bodo, 2014, "This POODLE bites: exploiting the SSL 3.0 fallback".Google Online Security blog. Google Scholz, Florian, Shepherd, Eric."Math.random".Mozilla Developer Network Sepehrdad, P, Vaudenay, S, Vuagnoux, M, 2011, "Discovery and Exploitation of New Biases in RC4".Lecture Notes in Computer Science Smart, Nigel 2008, "Dr Clifford Cocks CB".Bristol University Thomas Y. C. Woo, Bindignavle, R, Su, S, andLam,S, S, SNP: An interface for secure network programmingProceedings USENIX Summer Technical Conference, June1994 Wiener, Michael J. 1990, "Cryptanalysis of short RSA secret exponents".Information Theory, IEEE Transactions on36

Monday, December 2, 2019

Pro Wrestling Essays - WWE Hall Of Fame, American Christians

Pro Wrestling English 101 Mr. Lamore The Real World of Pro Wrestling ?If You Smeeelll What The Rock Is Cooking!? This saying used by The Rock has become a very regular saying amongst young men. For the reason, being wrestling has climbed out of the gutter from where it was in the late 80's and early 90' right back into the spotlight. It has retained its, popularity due to the fact it has attracted many different people from age, gender, and ethnicity. When people think about wrestling most of them will tell you how fake it is, but is it? There are variable myths that come to the mind of many Americans when it comes to wrestling. Yes it is true that punches are pulled, the winner of the match is already decided, and most of it is choreographed. So in a sports since wrestling is fake, but to a lot of blue collar Americans it really doesn't matter. Its a mans version of a soap opera. In that people are always changing sides, friends are turning on each other. Another thing that most people think is that all these guys are just pretty faces with no prior wrestling experience. That is false in the sense that most of these wrestlers were All-American wrestlers in college. The Stiener Brothers, Rick and Scott were accomplished All-Americans at Michigan. Mike Rotunda was a All-American at Syracuse. Kurt Angle was an Olympic champion in Atlanta in 1996. Something else that people do not understand is that wrestlers are on the road 300-320 days out of the year. So when it comes to them needing time off, there will usually be an angle where a wrestler will pretend to be injured to take time off. They may also be written out of the script completely until they are fully refreshed. Then they will usually come back with a big angle. Then there are times when the injuries are real. Due to the pain that a wrestler will work through to put on a show for us, thus many wrestlers usually will take some kind of pain killer. We are not talking about Motrin or Advil here. We are talking about Codeine and Morphine very powerful sedatives. Brian Pillman, and Rick Rude, both former world champions, died because they overdosed on painkillers. Many wrestlers have had to give up their careers due to their back being injured. A back injury most common injury to a wrestler. Which ?The Heartbreak Kid? Shawn Micheals, ?Stone Cold? Steve Austin, and ?The British Bulldog? Davey Boy Smith all had to retire from their back being injured. I reme mber the first time I finally realized that wrestling was fake. I was 12 years old and my brother took me to go and watch The Ultimate Warrior versus The Undertaker in Fresno, CA. The Warrior won by DQ. Then about a month later, I go to Las Vegas to visit my sister, and she takes me to go and watch a wrestling match. To my disbelief it's the same exact match which I saw a month earlier same moves same everything. Needless to say, I was heartbroken. Now what would wrestling be with out your Super Heroes or Villains. Today we call the Hero the face and the Villain the heel. The most popular wrestler of all time must be Hulk Hogan. Every kid I knew growing up said their prayers, ate their vitamims, and worked hard. Those were the Hulksters Commandments. Since Hogan has passed on. A different breed of heroes have emerged such as The Rock, Stone Cold Steve Austin, Sting. Now we can't forget about the bad guys such as Ric Flair, HHH, or Jeff Jarrett. Flair and The Four Horsemen terrorized the world of wrestling for most of the 80's and the early 90's, just like HHH and DX are doing to the WWF or Jeff Jarrett and the Young Blood are doing in WCW. It seems that all of the most notorious bad guys in the business ran in-groups such as The NWO, which consisted of such big names as Hulk Hogan, Kevin Nash, and Scott Hall. Degeneration X or D/X as they are called (HHH, Road Dawg, X-Pac. One thing that I

Wednesday, November 27, 2019

Review of Nuclear Battery Technology Essay

Review of Nuclear Battery Technology Essay Review of Nuclear Battery Technology Essay Example Review of Nuclear Battery Technology Essay Example The Role of Nuclear Battery for Smartphones In smart phones, batteries play a major role in providing power. Scientists as well as technology firms are continually looking for means to better the life of these batteries and their efficiency. The University of Missouri lately came up with a more efficient nuclear battery that is long lasting. This battery is capable of running several applications including a space flight. They also act as a reliable energy source in automobiles. Search for alternative sources of energy has made scientists indulge in extensive research in almost all fields to gather information on how to tackle the challenge of battery life of batteries used in various devices such as phones and laptops and come up with ones that are more efficient than the existing chemical batteries. The basic idea the researchers have been developing is that instead of consuming or utilizing the power in a battery`s chemical gradient, for instant in Lithium batteries, to employ the energy emitted by the decaying of isotopes of radioactive elements in a natural manner to generate energy. These batteries are referred to as nuclear batteries. Problem definition Nuclear batteries in smartphones emit radiation and in case of a leakage they can cause cancer and even death. For example, the gamma rays which have intense, penetrating power can only be checked with the introduction of a large lead lump; otherwise, cancer is inevitable. The casing is done to reduce radiation in smartphones, and it is done using the materials mentioned. Another possible disadvantage (though it is not common) is that terrorists may use the Strontium-90 to develop dirty bombs even though the substance is very expensive. Radiation protection principles presume that any radiation dose, no matter how small it might seem to be, can harm a person. Nuclear batteries are lighter than other ones, however, they can provide energy for smartphones, and they are much smaller in size as well as more efficient as other batteries. Nuclear batteries also have sufficient energy density. The radioisotope that is an example of nuclear energy can supply energy density that is approximately six orders of magnitude more than the batteries manufactured using chemical substances. Betavoltaic chipsets that are also nuclear batteries are commercially available and are of high demand due to low voltage. They are also amp products for the niche markets such as the military. Betavoltaic batteries generate power from beta radiations rather than photons. These beta radiations are high power electrons emitted by radioactive elements. Several commercial uses of nuclear technologies exist today, for example, fire control detectors and emergency exits in many buildings. Lithium-ion batteries have an aging problem, which becomes evident one year after the purchase and the manufacturers always go silent about this. It always happens whether the battery is in use or kept idle. Another disadvantage of lithium-ion batteries is that they are regarded as not completely mature since the chemicals and metals vary on a continuous basis. They need a protection circuit to preserve the voltage as well as the current within some safe limits . Natural Li is converted into isotopic clear 6Li. The merits of performing this task are the fact that thermal neutron combination of the cross-section is multiple of magnitude order larger than the natural Li cross-section implying that researchers can evaluate factual manufacturing methods and techniques. Functional requirements Terms such as atomic battery, nuclear battery and radioisotope and tritium generator are employed to depict devices that use energy produced from decaying of the radioactive isotope to generate electricity. Conversion method is divided into thermal and non-thermal one. Thermal converters consist of the thermionic and thermoelectric kinds of generators. Their output energy is always a function of a temperature difference. Non-thermal converters output of power is not a function of a temperature difference. It extracts a portion of power as it is degraded into the heat energy instead of using the thermal power to run electrons in the circle. Atomic batteries in most cases have an efficiency of between 0.1 to 5%. High efficiency beta voltaics have an efficiency of 6-8%. Thermal converters are classified into a thermionic converter that includes a hot electrode that emits electrons in a thermionic manner over a potential power barrier to a relatively cool form of an electrode and produce valuable electric energy output. Cesium vapor is employed to highly optimize electrode task function as well as present an ion supply to make sure the electron space charge has been neutralized. Beta voltaic is a battery that generates energy from radiation and scientists have studied the battery since 1950 and regard it as a major source of nuclear energy. Day to day research is being pursued on nuclear batteries in various research institutions. Much of this task is centered on making the frontiers of these nuclear device technologies by using energy sources with the help of beta or alpha particle decay, which is based on the radioactive isotope emitted. The area of the beta voltaic, which is the most tackled by the researchers, is tritium. This is a hydrogen isotope that has a pair of neutrons and a single proton as well as electron inherent in its hydrogen form. It is a radioactive isotope with a half-life of 12.32 years during which it emits beta particle that is basically an electron. This makes it more preferred over other known solutions that emit dangerous gamma radiations . There are several other advantages of tritium like its weight; it is arguably the third lightest among the existing isotopes. It also has properties and reactivity similar to those of hydrogen. Researchers are well conversant with its production path, and they are also quite aware of its hazards. A specimen of Highly-Oriented Pyrolytic Graphite (HOPG) that is intercalated with some lithium so as to check loading before irradiation occurs. Nuclear energy sources when controlled arent inherently dangerous. These nuclear batteries employ radioactive isotopes referred to as strontium-90. The latter improves the electrochemical power in water-based solutions. An electrode consisting of nanostructured titanium dioxide and a coating made of platinum is responsible for converting the energy or the power into electrons . The water operates as a buffer. Surface Plasmon developed in the device emerges as a useful component since it improves the batterys efficiency. The Ionic solution, however, cannot be easily frozen at minimal temperatures. It could efficiently perform in a variety of applications, for instance, car batteries. Constructing a betavoltaic device, a silicon material inside two electrodes is wedged. By the time the radiation strikes the semiconductor there is a production of electrons flow, simply referred to as voltage electricity. Unfortunately, ancient materials were less suitable for enormous stacked arrays since the volume and the mass of the battery being developed would be large. Thinner and relatively lighter collectors and emitters were required for designing an array. Of late, developments in graphene are still to be correctly integrated into the architecture of this betavoltaic. When correct integration into these thin stacked kinds of betavoltaic arrays is completed, a wider utilization and efficient performance would be experienced. It is possible that betavoltaic energy can generate more power as compared to chemical batteries. The anticipated maximum efficiency of promethium and tritium batteries is 21% and 12% respectively. Factors leading to these efficiencies are the source construction and the secondary electron discharge as well as backscattering mainly from the collector. Experimentally, it was demonstrated that the efficiency of the tritium direct charge battery model with vacuum dielectrics and collectors with secondary electron emission suppression and backscattering coating reached 5.5%. This kind of battery has an activity of curies of approximately 108. The experiment also demonstrated a voltage of 5300 volts with short circuit current of 148 nanoamperes. However, the efficiency can be doubled with a double-sided source. A promethium-147 nuclear battery has an activity of above 2.6 curies. The experiment shows it generates a voltage of 60kv. The current for the short circuit is 6.0 nano-amperes reaching an efficiency of 15%. The effect of charge accumulation in dielectrics under mono-energetic electron beam irradiation was used for developing nuclear batteries. In this battery, the charge accumulated on the surface conducts electric current through an uncharged dielectric. A nuclear battery was fabricated and tested with a tritium source; taking into consideration that a dielectric layer is wider than the range of tritium beta elements and a metal collector is without a vacuum space, this model generated 0.4 microwatts of electricity. Natural radioactivity emits radiation that generates energy. Nuclear batteries also known as atomic batteries harness the energy. The power density of the final product and the application domains depend on a material employed to generate that energy. On the other hand, the output and the potential efficiency of the battery depend on the form of conversion employed. Thermal converter, that is a radioisotope generator, utilizes the thermal energy produced by radioisotope decay to generate electricity. Methods used for this process include thermocouple heating, a recognized charge accumulation effect found in the dielectrics. The nuclear batteries developed at the Missouri University consist of a platinum-coated titanium dioxide electrode that was with. Water was also incorporated in addition to radioactive strontium-90. Sr-90 can decay radioactively with 28.79 years half-life. It generates an electron referred to as beta radiation; it also produces anti-neutrino as well as the isotope yttrium-90. This Y-90 has a half-life of 65 hours. This causes decay of additional electrons and anti-neutrinos. Stable Zirconium is also generated as a result of the decay. The wisest aspect of employing Sr-90 as a source of energy is the fact that it emits less or zero gamma radiations. Nuclear batteries are safe to handle and also very easy to use. Apart from being used in smartphones they are used extensively in health departments, for example, for cancer radiotherapy . Design concept Safety of radioactive substance is ensured by introducing an aluminum material between a human body part and the source of the rays. Thus, the safety of betavoltaic is checked in this way to avoid damage to people. One of the greatest advantages of nuclear batteries in smartphones is the fact that recharging will not be done as in the case with chemical batteries. As mentioned above, nuclear batteries with efficient packaging possess an energy density that is greater than in chemical ones. Additionally, the radioactive isotopes used to develop nuclear batteries are easily available at affordable market prices. Nuclear cells have a life span not less than ten years. This is an overwhelming term as they supply energy to equipment non-stop. Thus, the reliability and the longevity incorporated together may suffice a minor power needs for a decade. However, radiation safety standards need to be met. Incorporation of safety measures to ensure nuclear batteries are safe to handle. Devices, like smartphones batteries emit nuclear radiation that includes beta and gamma ray beams. This radiation is however kept in closed packages. Individuals worry that tritium in these batteries may diffuse due to the small size of the package and its mobility. They fear that it could diffuse through graphitic matrix, due to the complicated process of covering it . The worry for this is counterattacked by the fact that it is experimentally proven that the radiation would remain in the matrix as long as the temperatures remain below 627 degrees Celsius. The operating environment temperature that people live in is far much below this limit. The remaining challenge is the moisture. Nevertheless, the scientists are making use of a robust, hermetically fastened package. In less than three years to come, research companies, if funded adequately, will produce nuclear powered devices for general market. On this time framework, though, the researchers argue that it would depend on the regulatory framework. The addition of water was arguably the breakthrough of these batteries since that water can absorb a great amount of beta radiation since when in large quantities it can detriment to a betavoltaic semiconductor. However, beta radiation rips apart the molecules of water, generating free radicals as well as electricity. Comparative study with previous concept The cost of developing these nuclear batteries is relatively high. As for the case of most innovations, the starting cost is rather huge. However, as the innovation goes operational, these drawbacks varnish as the product is produced in bulk. Nuclear batteries for some specific applications like the size of laptop batteries may lead to some problems though it can be eliminated as time progresses; for instance the Xcel in laptops batteries is much more compared to the conventional one. Prospective commercial application of nuclear batteries in smartphones The aerospace firms would welcome smartphones recharging themselves. Oil and the gas companies are also potential commercial markets for the nuclear batteries due to their recharging factor. All these companies require some reliable energy sources in physical extremes for instant low temperatures and low pressure . The betavoltaic battery integrated into a flight data detector may signal to the searching squad for years rather than months. The odds of coming up with a commercially viable substance are reasonably perfect since the ultra-thin kind of collectors exists anyway. There is a growing global interest in the development of these thin beta-electron kinds of emitters. Applications Nuclear batteries are used widely due to their long life capability and high efficiency. This sort of innovation will undoubtedly change the current technology for the better and eliminate the power limitations brought about by chemical cells. In space applications, nuclear energy units are more significant as compared to the solar cells and the ordinary chemical batteries. Solar cells are easily destroyed when passing through radiation areas. The second reason is that the operations on planets such as Mars and the moon, where long phases of darkness need heavy batteries to provide power. Solar cells can only get energy from the sun. The third is that the missions conducted in space in an opaque atmosphere for instant on Jupiter. There is no light there, thus solar cell are useless there. The nuclear source of power would be useful in space. Nuclear batteries would also eliminate the necessity of heating electronics in areas where temperatures are -245 degrees Celsius, for instance in space. These incredible advantages would ensure the nuclear batteries will easily replace current chemical sources of power. All applications including the phones that require large powers and a high lifetime and not forgetting a definite design over density will automatically prefer the nuclear source. The other application is the use of these batteries in mobile devices. A nuclear-powered battery for a laptop or a phone can provide supply approximate 8,000 times the life of the ordinary laptop or phone battery. Nuclear brings about forgetting the tedious process of recharging and replacing batteries. A nuclear battery through research has been found that it can endure a minimum of five years. The Xcel-N has never been switched off since it started its operation. It has been working for eight months in a row, without using any external energy supply. Low energy electronics are ending up being versatile. Therefore, these kinds of batteries are nowadays becoming commercially relevant. They act as power sources for machinery that ought to function unattended for a long time, like satellites. Also, if it packed correctly, it can be applied to spaceship and pacemakers. These batteries can provide energy to a variety of objects from the tiny sensors to enormous systems. The plans of these nuclear batteries A proof-of-principle form of analysis starts with an emitter. Irradiation of the high-energy grapheme-based kind of beta emitters is necessary. When this is fully optimized, then invention and development of nuclear powered cells is quite possible. The key hurdles are experienced in the transportation of these devices and their handling. It is advisable to collaborate with Defense Advanced Research Project Agency (DARPA) in developing the geometry, and in field-testing of these devices . Feasibility assessment The above-mentioned researches concerning the nuclear batteries present adequate hope in the supply of power and energy in future for devices and applications. Upon implementation of these technologies, feasibilities and credibility of devices such as smartphones will be elevated. This calls for keen observation of all standards while producing nuclear batteries so as to avoid the leakage of radioactive substances. Economic feasibility will be dictated by advantages and its applications. With a variety of features being added to these researchers, nuclear batteries will undoubtedly be one of the greatest inventions made in human history. Dose calculator Since we live in a radioactive universe where radiation is a part of the natural environment, its essential to measure the radiation dose. The unit used to measure is known as the millirem (mrem). The regarded annual dose in every person should be around 350mrems, whether it comes from a natural or a man-made source. It is nor desirable for any individual to receive more than that dose annually. Absorbed dose refers to a quantity of radiation experienced by a person in the body. The absorbed dose units are (rad) and gray (Gy). Dose equivalent adds together the radiation quantity that is absorbed with the medical effects of that radiation type. For the beta and the gamma rays found in smartphones have the same dose equivalent as the absorbed dose. The dose equivalent for these rays is much higher than those of the neutron and the alpha. This is because these types are more harmful to human body. The dose equivalent units are the roentgen man (rem) and the sievert (Sv). The biological equivalent of the dose is estimated in 1/1000th of a rem, which is known as millirem. For practical purpose, 1R (exposure) = 1rad (absorbed dose) = 1 rem or 1000mrem (dose equivalent). A measure presented as Ci shows substances radioactivity. A measure in rem or mrem indicates the energy amount that is deposited in living tissues by a radioactive substance. Nuclear energy source will replace conventional cells as well as the adaptors; hence, the future will be full of exciting innovations with new ways of powering the portable devices. Although automobiles are in the first phase of their development, it is a clear indication of how nuclear energy is being employed. It is highly promising that the nuclear cells will definitely find a niche in automobiles and issues like running out of fuel or the battery life will come to an end. Though they pose a negative effect, the advantages brought about by nuclear batteries outweigh the disadvantages. The good thing is that these demerits are controllable. In future, the world of science will continue to use electric power from indispensable radioisotope. The scientific world argues that small devices ought to use small batteries to supply them with power. The urge for extra power arises as technology improves.

Saturday, November 23, 2019

Statement of Cash Flows Theory essays

Statement of Cash Flows Theory essays The Federal Accounting Standards Board (FASB) creates generally accepted accounting principles (GAAP) within the United States. The FASB is a non-governmental, not-for-profit organization created to establish financial accounting and reporting standards, for the private-sector. Although the Securities and Exchange Commission (SEC) legally controls this function for public companies, as part of its mandate to administer and uphold federal securities laws provisions, it has relied on the FASB since 1973 to fulfill this role (Walker, 2004). Of the 159 pronouncements made by the FASB, Statement 95 was issued in November 1987 and focuses on Statement of Cash Flows. The term 'cash flow', in general, refers to the movement of money in and out of a business, with cash inflow typically being correlated to sales and other receipts and outflow attributed to cash payments to others such as suppliers or workers, or more simply the receipts and payments that are made by an organization (cited in Alver, 2005). In general, an organization's cash flow statement gives record to incoming and outgoing moneys, during a specific period of time. SFAS 95 establishes the standards for the reporting of cash flows, and sets the requirement that a statement of cash flows is a necessary component of financial statements for all business enterprises in place of a statement of changes in financial position (Summary of Statement, 1987, para. 1). Statement 95 states that cash receipts and payments must be classified according to where they stem from, if their source is operating activities, investing activities and financing activities. It is this classification of cash flows that allows analysis of cash flow data. Net cash flow has very little information alone. It is through classification and individual components that information is found. What can be problematic and is the lack of standard definition of ope...

Thursday, November 21, 2019

Punishment as the Main Deterrent for Wrongdoing Assignment

Punishment as the Main Deterrent for Wrongdoing - Assignment Example I would therefore rather take Kant’s wider viewpoint, that a sense of right and wrong is derived from individual experience, which may or may not include punishment and/or the religious ideal.  I would therefore rather take Kant’s wider viewpoint, that a sense of right and wrong is derived from individual experience, which may or may not include punishment and/or the religious ideal.  3. I would not say the needs of either society or the individual outweigh the other, particularly in the current paradigm of human rights and the individual’s right to happiness and freedom.   Society should never be allowed to suppress the needs of the individual because this is in direct contradiction to the human rights paradigm favored by the democratic world today.   Although Jeremy Bentham’s philosophy of justifying decisions by the number of people benefiting from it makes scientific sense, I would rather agree with John Stuart Mill’s caution that majori ty rule could deprive many citizens of important rights.   Slavery appears to be a case in point.4. From the humanistic and altruistic point of view, economic resources should be owned and controlled by communities.   In this way, the resources can be shared among all those sharing a community, without factors such as greed ruling the economy.   On the other hand, Adam Smith believed that self-interest is an ideal economic principle that all should be free to pursue.   According to him, self-interest translates to overall economic well-being, as all business people were interested in delivering quality services and goods in return for fair remuneration.   Smith’s system of built-in checks and balances were to prevent an imbalance of wealth creation for only a few companies.   However, history has taught that this system is not strong enough to prevent extreme greed and monopoly that marks today’s economy.   The gap between the extremely rich and the extre mely poor is widening on a global scale, with a disproportionate amount of humanity using all the earth’s resources.   This sector of society deprives not only today’s poor of their right to life but also the generations to come.   From this point of view, I believe a sharing economy is better than one in which a monopoly is the main paradigm.

Wednesday, November 20, 2019

Stress Essay Example | Topics and Well Written Essays - 1000 words - 3

Stress - Essay Example So, since most employees are used to their normal routines and working conditions, such form of changes leads to a wide range of psychological disturbance and strain that finally adds up to stress (Cambridge Educational , 2005). On the other hand, employees are faced with this menace especially when there are some standards that have been set within the organizational operations. Such standards often require employees to sign the performance contracts such that; they fully commit themselves towards attaining those set goals and objectives in whatever possible means (Cambridge Educational, 2005). Numerous studies indicate that workplace stress happens to be the main cause of stress in life, and has progressively escalated in the past few years Cambridge Educational (Firm) (2005) says that the  increased job stress levels as appraised by the sole discernment of bearing minimal control with lots of upcoming demands have usually been exhibited to be interrelated with enhanced rates of hypertension, heart attack, among other disorders.  It is an extremely personalized occurrence and can widely vary even in the most identical scenarios for various reasons (Cambridge Educational (Firm), 2005). A particular research study showed that completion of paper work is more stressful for several police officers other than the threats associated with dealing with criminals. The job severity sets basis on the enormity of the raised demands and the person’s sense of decision-making or control latitude that one has to deal with them. The Scientific research based on this form authen ticates that employees who perceive the subjection to higher demands but possess minimal control are often at high risks of cardiovascular disease (Cambridge Educational (Firm), 2005). From the practical experience, the source of stress that I witnessed in the

Sunday, November 17, 2019

Influence of Recreation Essay Example for Free

Influence of Recreation Essay ?I. Introduction Tourism is travel for recreational, leisure or business purposes. People have always traveled, whether it is to conquer worlds, discover new places, for business or for pleasure. This need of man has consequently led to the development of different attractions whether man-made or natural. Recreation, it is a term that denotes the refreshment of ones body or mind after work that stimulates amusement or play. People have become too busy to take out time to look within, no time to interact, and have become so dedicated to work. Working can lead to increased stress, illness, disease or more. People werent meant to work themselves to death. There should be a balance of work and recreation. Our bodies need rest, relaxation and enjoyment every once in a while. Recreation is an activity, rather an opportunity to take a break, the much-needed break from work. The more recreation one engages after work, the happier and enjoyable life becomes. Recreational activities are widely popular across the globe. Some enjoy exploring to beautiful places around the world whereas others take interest in pursuing their hobbies as a means of recreation. Whichever way, recreation needs to be made a vital component of the fast life of the present times. Positive and enjoyable recreation experiences can decrease stress and psychological tensions. Leisure activities offer people with the opportunity to boost energy and emotion not being released in other aspects of their lives. Family bonds are enhanced by the sharing of leisure time. Families that do recreational activities together tend to be closer and improve their chances of staying together. There are a lot of activities to choose from with recreation. Some people prefer to do adventurous sporting activities and experience the thrills and excitement, while others prefer to light activities. Adventure and recreation in Philippines has been a part of the Filipino culture. The tropical weather allows Filipinos to spend most of their free time outdoors; children commonly play outside with friends. With this condition, the researcher is highly interested to propose a Recreation Center to cater tourists, families, sporting enthusiasts and host events which will enable to develop the tourism strategy of Batangas City. This center can provide best service that every individual should experience. Near in the future, it will be famous to everyone. II. Pre-Feasibility Nowadays tourists are discovering a lot new things especially to the place where they can visit. They really want to explore unique places for them to meet their expectation and satisfaction. From this, feasibility study regarding to the development of a recreation center will meet its objectives as part of our industry. These are the condition that will justify its objective: (a. ) The Recreation Center as part of Hospitality Industry (b. ) To increase the number of customers by at least 20% per year through superior customer service and word-of mouth referrals. (c. ) To create a service-based company which exceeds customers expectations. (d. ) To provide high quality equipment use in the recreation center (e. ) To provide extraordinary, proficient and suitable architectural design for the proposed â€Å"Recreation Center† that will accommodate tourists and the locals by introducing innovative activities to further promote tourism and exposure to the local market. (f. ) To provide excellent child play care in a eco-friendly atmosphere while ensuring our customers, receive excellent service in a playful, educational, and safe environment. III. Detailed Economic Feasibility Study In this part of our feasibility study, it contains the four analysis that tackles about the potentiality of the place to become a tourist destination, its future outcome and structure, what strategies we used in promoting the plan to the public and the possible expenses of the project. 3. 1 Site Analysis In establishing a business, location is always considered. The transportation that will be use is the primary needs of this business. In this study, this is well analyzed all the details according to the distance from the nearest town center. The next is the site itself. The property of the business and how the transaction of all the papers includes. It will not be successful without the environmental issues, because the recreation center that will be build involves with this condition. This market research show that these are the customer groups that are likely to be served. The business will serve a relaxation area because of the different activities it offers. For the building aesthetics of our project, we choose the ecological architecture. It is also known as environmental design combining aspects of landscape design. This building character will complement the outdoor scenes especially designed for leisure and sporting activities whilst considering appropriate facilities for the users. It deals with building materials and aims at minimizing the use of not replenishable raw materials. This means preferring such building materials as wood, stone, earth and recycled material like used boxes and barrels, and naturally it necessitates a peculiar style of architectural design as well. This design follow the concept of â€Å"GO GREEN† because of its efficiency and sustainability. Many eco-friendly building techniques with aesthetics that match the natural surroundings are now being incorporated in the designs. Ecological architecture is the most suitable character that works best for developments that are bounded by nature and caters leisure facilities and outdoor activities. The character of the structure will complement the nature where recreation and sporting activities occur. 3. 2 Economic Feasibility Study The researcher conduct some research and it’s true that tourism is one of the basic aspects that really affects the economic status of our country. In this feasibility study, the researcher aims to help in contributing to its aspect with the help of this tourist destination. This business will be known by giving and providing the best facilities and activities whoever will visit the center. The income of the business itself will increase and also its production. 3. 3 Market Analysis When it talks about marketing, first thing that comes to the mind of a person is about promotion, advertising and something that has to do in catching the attention of the tourists. The researcher’s marketing strategy is focused on establishing and promoting our project through a variety of marketing channels. An overview of our marketing strategy includes: Identity Development. This plan will be promoted through a broad mix of identity pieces including business cards, stationery, car signage, and other communications. Brochures. A brochure will be designed to communicate our presence, the services we offer, and the clients we serve in the community. Flyers. Flyers will be designed for posting at community locations that attract high traffic volumes of consumers within our target market. Public Relations. As owners, we will promote our company and its benefits to the community through efforts to have articles published in new media and efforts to gain coverage on local radio and television programming. Website. All brochures, flyers and other marketing tools will promote our website, detailing our services that benefit the community. Our website will also provide all information about us, our operational hours, schedules of events, and a registration form for online enrollment. Email. Email will be used to connect with our clients frequently through monthly newsletters and updates on upcoming events and special offers. 3. 4 Cost/Benefit Analysis One of the key of the business is to meet their costs and especially the benefit it have. Without the help of our generous sponsors Lucio Tan and Henry Sy, the researcher will not be able to operate without their financial support. The following lists will show the total cost in establishing the business. Expenses: Property/Land – 4 Million Php Corporate Sponsorship – 10 Million Php Installation of Machine – 1 Million Php Researcher’s Savings – 8,050,000 Php Increased Revenue – 250,000 PhpTotal Budget – 10 Million Php Material Cost – 2. 5 Million PhpTotal Cost – 18,050,000 Php Labor Cost – 3 Million Php. Operator – 600,000 Php Utilities – 1. 5 Million Php Insurance – 750,000 Php Operating Licenses/Permits – 350,000 Php Pest Control – 300,000 Php Minor Repair Maintenance – 800,000 Facilities – 3 Million Php The proposed project entitled â€Å"Batangas City Recreation Center† intends to introduce new innovative facilities to the locals and tourists with advanced, effective and functional design. This study will be beneficial to the following: Province of Batangas This study may serve as a reference to whatsoever future developments and plans that will be conducted by the city or the province in relative to the tourism industry. To the Local and Foreign Tourists This study is significant to the tourists as a reference for their activities to be conducted during vacations or leisure. To the Enthusiasts and Professionals This will serve as a guide in choosing the ideal location for team building activities. It will also aid professionals in selecting the perfect venue for their programs and competition. For everybody (families, couples, single) The Recreation Center was designed with you and your family in mind. We focus on providing an environment to bring the community together. It is a place for children, teens, adults, families, and seniors to socialize and exercise. The Center Focused on family entertainment in a family-oriented community, the Recreation Center is a project primed to take advantage of an expanding and profitable industry. IV. Conclusion The researcher therefore conclude the factors that influence the people to come to the recreation center. These are divided into five characteristics: 1. The Recreation Center can be used in any activities whether in group or individual. 2. The Recreation Center can provide highest quality performance that every individual can experience. 3. The researcher provide strategies on how they can meet the target market and how the profit will increase. 4. The Recreation Center, as describes above, offers numerous advantages for developers and also for the people who lives in Batangas. 5. The implementation of a Recreation Center here in Batangas City is highly successful because it will surely be a famous tourist destination. V. Recommendation After analyzing all the details of this project, the researcher recommended and suggested five criteria on how the business will achieve success in the future. 1. The People in-charge of the center should increase the number of supported services in order to maintain the clients and at the same time, they should continue attracting more tourist. 2. The developers should always give and furnish the best amenities and facilities to the tourist who will stay in the center. 3. The developers should have proper and wide marketing in advertising globally. They could make use of new techniques that will help gain more tourists. 4. Giving opportunities by hiring of employees coming from the people living in Batangas. 5. Continuing to give a hundred percent best service to the visitors.

Friday, November 15, 2019

Of Nightingales That Weep by Katherine Paterson Essay -- Of Nightingal

Of Nightingales That Weep Chapter 1 This chapter is about Takiko and her first family home. It tells a lot about her family. They talk about the war In this chapter also. Takiko’s mother decides that she will remarry after her father dies. Takiko’s finds out that her father is died. Chapter 2 This chapter the book tells about Goro who is Takiko’s stepfather. Takiko finds out that Goro is a injured man. She thinks it will be very hard to live with Goro because of his problem. Chapter 3 This chapter tells about Takiko living with Goro for a few months now. It tells how the family has a party for the new year, and they hope that the family will work out. Chapter 4 This chapter is about the child that Takiko’s mother has. She has the baby with Goro. This is when Takiko thinks about her future and she wants to leave the farm and go on into the city and start a new life there. Chapter 5 This chapter is about when Takiko starts her new free life in the capital. She finds a job with the Emperor and makes money to survive on. The job is that she is a servant for the Emperor. She also plays as a musician playing her Kyoto. Chapter 6 In this chapter Takiko plays the Kyoto in from of a large audience that gathered just to here her play on it. This is a trial or a test to see if she belongs at the capital. Chapter 7 In this chapter a war becomes abrupt into the capital, and it forces everyone to leave. Takiko’s mother hears about it and tells her husband t...

Tuesday, November 12, 2019

Black Like Me

Enri Duka A. P. United States History Ms. Bellemare, Ms. Loughlin, Mr. Marko 08/09/2012 Analyzation of â€Å"Black Like Me† Catastrophic events are a part of life just like the air that people breathe. Most of these catastrophes occur as a result of nature’s causes such as earthquakes, tornadoes, tsunamis, and etc. Unfortunately they kill millions of people every year. As painful as this is to hear, most people still disregard the amount of people that are killed and massacred every year due to race and religion. It is sad to think that instead of working together to build a better future, humans still fight and have social injustice.Many like to argue this statement seeing how the constitution forbids human inequality in front of the law. As true as this might be, discrimination still exists and is a part in our lives to this day. â€Å"Black Like Me† is a perfect example of this social crime. Unlike many other books, â€Å"Black Like Me†, is written in a n autobiographical memoir instead of a novel. The author, also being the main protagonist, is John Howard Griffin. The book takes place between the years of 1959 and 1960 and is build with chapters according to the different dates that main concepts occur.The reason for this book is to portray the horrors that segregation has to offer. Griffin starts his unbelievable adventure because of the curiosity and sympathy that he feels towards blacks. In order to quench his curiosity, Griffin believes that he has to be black as well and the only way is by undergoing surgery. He first proposes his idea to George Levitan and Adele Jackson, the owner and editor of Sepia magazine and asks them to publish his article. Although passionate and supportive of Griffin they warn him about the dangers that he will face when and after he is a black man.John Howard Griffin goes through a period of internal conflict for he is aware of the dangers imposed on a black man during these years of segregation. A lso, he is afraid for his family because of all the white racists who will try to harm them once they realize that a white man was disguised as a black. However, Griffin decides to follow through with the plan. In the book, he compares the situation of segregation to the years when he was partially blind. Griffin believes that white people are blind for they can not see through the eyes of a black man.John Griffin’s passion and sympathy for the social injustice applied on blacks overcome his fear of danger so he moves to New Orleans and is given medicine so he can turn black. On the process of becoming black, he is very surprised to see how an educated and liberal man such as a doctor could speak so poorly of the black race. As a matter of fact, this theme keeps on reoccurring throughout the whole novel. In a very short period of time he notices the differences between the two races. Instead of eating at a fancy restaurant like the previous day, now he is eating raccoon meat and rice out of a can.The difference between the two races is staggering as well as painful to see for Griffin. Not only is he denied a job by white employers; he is also hit with fruit by a group of white people, denied the right to bring in checks, and is humiliated by bus drivers who do not stop the bus at his destination just because of his color. The most important part of all these tragedies is the fact that even Griffin views himself differently. He begins to despise himself and other blacks for the pains that are being caused to him.Just like the blacks in New Orleans, Mississippi, and Alabama, he feels defeated and hopeless. Fortunately Griffin undergoes some good experiences as a black man. Although he is despised and hated by most whites; he still feels warm from the love and support that black people show for each other. There are even some whites who help him throughout his career as a black man. One of these helpers happens to be a good friend of Griffin and his name i s P. D. East. This person shows love and sympathy towards blacks and offers Griffin to stay as long as he needs.Upon his meeting with East, Griffin finds out that racism is a social problem that is enforced by white leaders such as politicians and lawyers who encourage and feed other white men with hatred toward blacks. Although Griffin is flattered by the courtesy of East, he decides to go to Montgomery. On the way he is unfortunately familiarized to the perspective that white males have towards blacks’ sexuality. He finds out that sexually frustrated white males use black girls for sex and when he is hitchhiking many are curious about his sexuality as well. This goes to the extreme point where one white male tries to convince him to show his penis.Once this long trip ends, Griffin finds himself in Montgomery where black people are more organized and have been influenced by Dr. King to resist the whites passively instead of with violence. Even so, Griffin decides that he has had enough suffering so he stops taking his medicine and turns white again. Again he sees major differences about the way that people look at him. When he is black, he is treated with hatred from white people and sympathy as well as camaraderie from the black community. On the other hand, when he is white, the black community greets him with fear and loathing while whites are extremely friendly.He decides to turn black again seeing how when he’s white he has the easy way out; something that is not available to a black person. Upon deciding, Griffin finds himself in Atlanta. Throughout the story, the readers see the protagonist in different cities in the South and almost every place that he visits is different when it comes to the level of segregation as well as how the black community react to it. In New Orleans, Mobile, and other towns of Alabama and Mississippi people are desperate as well as hopeless and defeated.On the other hand, in Montgomery and Atlanta, blacks are mo re optimistic and the community is filled with strong black leaders. Once Griffin visits all these towns he feels that he has found out enough about social injustice and prejudice against the black community. The third phase of this book focuses more on how John Griffin is treated after he publicizes his article. Once again he is warned about all the dangers as a cause of the release of this article. Once again he is so passionate about what he has done that it outweighs the risk.When the Sepia Magazine publishes the article, many TV stations and news broadcasts invite Griffin for interviews and are very astonished and proud of what he has done. He recieves many letters from many white people and understands the main reason of why so many people are racist in the South. Many white southerners write that they are not actually racists but that they are just afraid of the real racists. For this reason they neglect and tolerate racism. On the other hand, people in Mansfield, the town wh ere he lived, strongly oppose the deeds that Griffin has done so they make threatening calls and plan to assault and castrate him.Nonetheless, Griffin maintains his courage and sympathy. Because of all the hostility in the town, Griffin decides that it would be better if they moved to Mexico. While packing he talks to a black boy and realizes that blacks don’t understand whites just like whites don’t understand blacks. Just like the whites, the blacks have this recent rise of supremacy which is instilled in them by Malcolm X and other black leaders, just like the whites are influenced by politicians. This supremacy from both sides needs to end so we could finally have an equal America according to Griffin.An â€Å"equal America† started after the 13th, 14th, and 15th Amendments were written which is right after the Civil War ended. Although blacks got the rights to escape slavery and be equal under the Constitution when it came to voting and other rights; it sti ll did not stop whites in America to treat them horribly. During the hard times of Reconstruction after the Civil War, the black Americans not only had to fight poverty; they also had to deal with racial segregation or in other words Jim Crow. According to the website, socialsitalternative. rg, the concept of Jim Crow is not only being a piece of legislation. It is considered to be a very well thought out plan by the higher end of society during the times of segregation. This legislation gave the right to the ruling class to make laws about lowering the wages of black workers and to divide the races so black workers could get pitiful wages. It is themes like these that keep on reoccurring in the fascinating book that John Griffin wrote. For example, his doctor, a well-educated and liberal man, had really racist views pertaining the black race.At the same time, we are familiarized with the concept that it is the ruling class such as politicians and lawyers who feed the rest of the pe ople with the hatred about the blacks. If it wasn’t for these influential figures, where would a regular white person get the idea of showing so much hatred toward a person that he does not even know. In one speech, Martin Luther King said: â€Å"The black revolution is much more than a struggle for the rights of Negroes. It is interrelated†¦ racism, poverty, militarism and imperialism. Evils that are deeply rooted in the whole structure of our society. This time period in American history will be remembered for decades because it really shows the injustices that the people that we choose as leaders commit in order to favor their own race. â€Å"Black Like Me† really gets to the main roots of segregation. There is no better way of showing this racial injustice unless you have experienced both sides of the situation. John Griffin gives the readers an opportunity to live on both sides of segregation. It really portrays the horrors of racial injustice and prejudice at its’ best. â€Å"Black Like Me† really grips the themes of American diversity and reform.The black and white race as described in this book are very different from one another and how they view their community, yet very similar at how they view each other. Throughout the book, Griffin noticed the difference between the living conditions and standards of both societies. When he is white, he is able to visit any restaurant, any store, and apply to any job with the optimistic view that they are most likely going to hire him because of his abilities. On the other hand, when he is black he is forced to eat very bad standard food.Although he has the money to buy food, restaurants would not sell it to him. At the same time, although he was well dressed and articulate in his job interviews; white employers would not even consider hiring him because of his skin color. Another enormous difference between the two races was the way that they view their community. In troubled pa rts of the South such as Mississippi and Alabama, Griffin describes the black community as hopeless and defeated. They were this way because the ruling class did not support them in any way. In contrast, they did anything to favor the whites over the blacks.One great example from the book is the lynching of Mack Parker. In the book he is accused of raping a white lady and then is lynched by a mob. Although the FBI found who lynched him, the all white jury decided that the people that did it were not guilty. The same sort of discrimination and segregation was shown against the Irish when they first moved to America because of the potato famine. According to the article â€Å"Prejudices and Discrimination Against Our Irish Ancestors†, Irish immigrants first began moving to the United States around 1847 when the Great Famine hit their country.When moving here they were laughed at and forced to move in little slums where only Irish people lived. Many caught diseases and died. Thi s sort of discrimination is very similar to the one that blacks had to endure for they had to build their own ghettos when they moved to the North for jobs. Another important theme of â€Å"Black Like Me† is that of reform. In order for the blacks to be equal to whites to this day they had to go through civil rights movements which were led by very adored people such as MLK and Malcolm X.The theme of reform is apparent in the book when Griffin goes to cities such as Montgomery and Atlanta. Instead of being hopeless and defeated, people there were optimistic and were opposing nonviolently. In the book it mentions of a time where two black people were sitting in a bus and the driver asks them to move so a white lady could sit there. Non violently the two black people did not move and a white person in the bus got up to hurt them and is stopped by the bus driver and the lady. In other words, the nonviolent resistance was working.American Diversity and Reformation are two major t hemes that the United States has experienced throughout the years. If these two themes did not exist, the United States that we know today would not be the same. In a way historians have always described America as a melting pot of cultures which is a very legitement statement seeing how its’ earliest populations migrated from different parts of Europe whether it was England, France, or Spain. This early migration caused the American Diversity that we know today.Also without all the reforms and wars to protect civil rights, America would no longer be called the land of the free or the place where all dreams come true. â€Å"Black Like Me† is a book that strongly fits both these themes and in a way it even defines them. Works Cited â€Å"The Civil Rights Movement. †Ã‚  The Civil Rights Movement. Socialist Alternative, n. d. Web. 13 Aug. 2012. . Daw, Chad. â€Å"Prejudices and Discrimination Against Our Irish Ancestors. †Ã‚  Yahoo! Contributor Network. N. p . , 19 Mar. 2009. Web. 13 Aug. 2012. . â€Å"The Civil Rights Movement. †Ã‚  Calisphere -. UC Libraries, 2012. Web. 13 Aug. 2012. Black Like Me Enri Duka A. P. United States History Ms. Bellemare, Ms. Loughlin, Mr. Marko 08/09/2012 Analyzation of â€Å"Black Like Me† Catastrophic events are a part of life just like the air that people breathe. Most of these catastrophes occur as a result of nature’s causes such as earthquakes, tornadoes, tsunamis, and etc. Unfortunately they kill millions of people every year. As painful as this is to hear, most people still disregard the amount of people that are killed and massacred every year due to race and religion. It is sad to think that instead of working together to build a better future, humans still fight and have social injustice.Many like to argue this statement seeing how the constitution forbids human inequality in front of the law. As true as this might be, discrimination still exists and is a part in our lives to this day. â€Å"Black Like Me† is a perfect example of this social crime. Unlike many other books, â€Å"Black Like Me†, is written in a n autobiographical memoir instead of a novel. The author, also being the main protagonist, is John Howard Griffin. The book takes place between the years of 1959 and 1960 and is build with chapters according to the different dates that main concepts occur.The reason for this book is to portray the horrors that segregation has to offer. Griffin starts his unbelievable adventure because of the curiosity and sympathy that he feels towards blacks. In order to quench his curiosity, Griffin believes that he has to be black as well and the only way is by undergoing surgery. He first proposes his idea to George Levitan and Adele Jackson, the owner and editor of Sepia magazine and asks them to publish his article. Although passionate and supportive of Griffin they warn him about the dangers that he will face when and after he is a black man.John Howard Griffin goes through a period of internal conflict for he is aware of the dangers imposed on a black man during these years of segregation. A lso, he is afraid for his family because of all the white racists who will try to harm them once they realize that a white man was disguised as a black. However, Griffin decides to follow through with the plan. In the book, he compares the situation of segregation to the years when he was partially blind. Griffin believes that white people are blind for they can not see through the eyes of a black man.John Griffin’s passion and sympathy for the social injustice applied on blacks overcome his fear of danger so he moves to New Orleans and is given medicine so he can turn black. On the process of becoming black, he is very surprised to see how an educated and liberal man such as a doctor could speak so poorly of the black race. As a matter of fact, this theme keeps on reoccurring throughout the whole novel. In a very short period of time he notices the differences between the two races. Instead of eating at a fancy restaurant like the previous day, now he is eating raccoon meat and rice out of a can.The difference between the two races is staggering as well as painful to see for Griffin. Not only is he denied a job by white employers; he is also hit with fruit by a group of white people, denied the right to bring in checks, and is humiliated by bus drivers who do not stop the bus at his destination just because of his color. The most important part of all these tragedies is the fact that even Griffin views himself differently. He begins to despise himself and other blacks for the pains that are being caused to him.Just like the blacks in New Orleans, Mississippi, and Alabama, he feels defeated and hopeless. Fortunately Griffin undergoes some good experiences as a black man. Although he is despised and hated by most whites; he still feels warm from the love and support that black people show for each other. There are even some whites who help him throughout his career as a black man. One of these helpers happens to be a good friend of Griffin and his name i s P. D. East. This person shows love and sympathy towards blacks and offers Griffin to stay as long as he needs.Upon his meeting with East, Griffin finds out that racism is a social problem that is enforced by white leaders such as politicians and lawyers who encourage and feed other white men with hatred toward blacks. Although Griffin is flattered by the courtesy of East, he decides to go to Montgomery. On the way he is unfortunately familiarized to the perspective that white males have towards blacks’ sexuality. He finds out that sexually frustrated white males use black girls for sex and when he is hitchhiking many are curious about his sexuality as well. This goes to the extreme point where one white male tries to convince him to show his penis.Once this long trip ends, Griffin finds himself in Montgomery where black people are more organized and have been influenced by Dr. King to resist the whites passively instead of with violence. Even so, Griffin decides that he has had enough suffering so he stops taking his medicine and turns white again. Again he sees major differences about the way that people look at him. When he is black, he is treated with hatred from white people and sympathy as well as camaraderie from the black community. On the other hand, when he is white, the black community greets him with fear and loathing while whites are extremely friendly.He decides to turn black again seeing how when he’s white he has the easy way out; something that is not available to a black person. Upon deciding, Griffin finds himself in Atlanta. Throughout the story, the readers see the protagonist in different cities in the South and almost every place that he visits is different when it comes to the level of segregation as well as how the black community react to it. In New Orleans, Mobile, and other towns of Alabama and Mississippi people are desperate as well as hopeless and defeated.On the other hand, in Montgomery and Atlanta, blacks are mo re optimistic and the community is filled with strong black leaders. Once Griffin visits all these towns he feels that he has found out enough about social injustice and prejudice against the black community. The third phase of this book focuses more on how John Griffin is treated after he publicizes his article. Once again he is warned about all the dangers as a cause of the release of this article. Once again he is so passionate about what he has done that it outweighs the risk.When the Sepia Magazine publishes the article, many TV stations and news broadcasts invite Griffin for interviews and are very astonished and proud of what he has done. He recieves many letters from many white people and understands the main reason of why so many people are racist in the South. Many white southerners write that they are not actually racists but that they are just afraid of the real racists. For this reason they neglect and tolerate racism. On the other hand, people in Mansfield, the town wh ere he lived, strongly oppose the deeds that Griffin has done so they make threatening calls and plan to assault and castrate him.Nonetheless, Griffin maintains his courage and sympathy. Because of all the hostility in the town, Griffin decides that it would be better if they moved to Mexico. While packing he talks to a black boy and realizes that blacks don’t understand whites just like whites don’t understand blacks. Just like the whites, the blacks have this recent rise of supremacy which is instilled in them by Malcolm X and other black leaders, just like the whites are influenced by politicians. This supremacy from both sides needs to end so we could finally have an equal America according to Griffin.An â€Å"equal America† started after the 13th, 14th, and 15th Amendments were written which is right after the Civil War ended. Although blacks got the rights to escape slavery and be equal under the Constitution when it came to voting and other rights; it sti ll did not stop whites in America to treat them horribly. During the hard times of Reconstruction after the Civil War, the black Americans not only had to fight poverty; they also had to deal with racial segregation or in other words Jim Crow. According to the website, socialsitalternative. rg, the concept of Jim Crow is not only being a piece of legislation. It is considered to be a very well thought out plan by the higher end of society during the times of segregation. This legislation gave the right to the ruling class to make laws about lowering the wages of black workers and to divide the races so black workers could get pitiful wages. It is themes like these that keep on reoccurring in the fascinating book that John Griffin wrote. For example, his doctor, a well-educated and liberal man, had really racist views pertaining the black race.At the same time, we are familiarized with the concept that it is the ruling class such as politicians and lawyers who feed the rest of the pe ople with the hatred about the blacks. If it wasn’t for these influential figures, where would a regular white person get the idea of showing so much hatred toward a person that he does not even know. In one speech, Martin Luther King said: â€Å"The black revolution is much more than a struggle for the rights of Negroes. It is interrelated†¦ racism, poverty, militarism and imperialism. Evils that are deeply rooted in the whole structure of our society. This time period in American history will be remembered for decades because it really shows the injustices that the people that we choose as leaders commit in order to favor their own race. â€Å"Black Like Me† really gets to the main roots of segregation. There is no better way of showing this racial injustice unless you have experienced both sides of the situation. John Griffin gives the readers an opportunity to live on both sides of segregation. It really portrays the horrors of racial injustice and prejudice at its’ best. â€Å"Black Like Me† really grips the themes of American diversity and reform.The black and white race as described in this book are very different from one another and how they view their community, yet very similar at how they view each other. Throughout the book, Griffin noticed the difference between the living conditions and standards of both societies. When he is white, he is able to visit any restaurant, any store, and apply to any job with the optimistic view that they are most likely going to hire him because of his abilities. On the other hand, when he is black he is forced to eat very bad standard food.Although he has the money to buy food, restaurants would not sell it to him. At the same time, although he was well dressed and articulate in his job interviews; white employers would not even consider hiring him because of his skin color. Another enormous difference between the two races was the way that they view their community. In troubled pa rts of the South such as Mississippi and Alabama, Griffin describes the black community as hopeless and defeated. They were this way because the ruling class did not support them in any way. In contrast, they did anything to favor the whites over the blacks.One great example from the book is the lynching of Mack Parker. In the book he is accused of raping a white lady and then is lynched by a mob. Although the FBI found who lynched him, the all white jury decided that the people that did it were not guilty. The same sort of discrimination and segregation was shown against the Irish when they first moved to America because of the potato famine. According to the article â€Å"Prejudices and Discrimination Against Our Irish Ancestors†, Irish immigrants first began moving to the United States around 1847 when the Great Famine hit their country.When moving here they were laughed at and forced to move in little slums where only Irish people lived. Many caught diseases and died. Thi s sort of discrimination is very similar to the one that blacks had to endure for they had to build their own ghettos when they moved to the North for jobs. Another important theme of â€Å"Black Like Me† is that of reform. In order for the blacks to be equal to whites to this day they had to go through civil rights movements which were led by very adored people such as MLK and Malcolm X.The theme of reform is apparent in the book when Griffin goes to cities such as Montgomery and Atlanta. Instead of being hopeless and defeated, people there were optimistic and were opposing nonviolently. In the book it mentions of a time where two black people were sitting in a bus and the driver asks them to move so a white lady could sit there. Non violently the two black people did not move and a white person in the bus got up to hurt them and is stopped by the bus driver and the lady. In other words, the nonviolent resistance was working.American Diversity and Reformation are two major t hemes that the United States has experienced throughout the years. If these two themes did not exist, the United States that we know today would not be the same. In a way historians have always described America as a melting pot of cultures which is a very legitement statement seeing how its’ earliest populations migrated from different parts of Europe whether it was England, France, or Spain. This early migration caused the American Diversity that we know today.Also without all the reforms and wars to protect civil rights, America would no longer be called the land of the free or the place where all dreams come true. â€Å"Black Like Me† is a book that strongly fits both these themes and in a way it even defines them. Works Cited â€Å"The Civil Rights Movement. †Ã‚  The Civil Rights Movement. Socialist Alternative, n. d. Web. 13 Aug. 2012. . Daw, Chad. â€Å"Prejudices and Discrimination Against Our Irish Ancestors. †Ã‚  Yahoo! Contributor Network. N. p . , 19 Mar. 2009. Web. 13 Aug. 2012. . â€Å"The Civil Rights Movement. †Ã‚  Calisphere -. UC Libraries, 2012. Web. 13 Aug. 2012.