Thursday, October 31, 2019

Roma Essay Example | Topics and Well Written Essays - 500 words - 1

Roma - Essay Example Early Rome was a monarchy, ruled by Etruscans kings, but after only seven of them had ruled, the Latins took power over their own city and transformed Rome into a republic. As a republic, the Rome was ruled by a group of leading citizens who began to take control of all Italy. Gradually, the Latins constructed a political organization (Senate) and designed the Roman constitution. Under the Roman constitution, the senate appointed a consul, who ruled Rome like a king, but only for a year, hence adopting notions of monarchy, aristocracy and democracy. Between 500 and 300 B.C. two social groups, patricians (nobles) and plebeians (commen men), evolved from the citizenry. The "Struggle of the Orders" – a struggle of legality between patricians and plebeians led to modifications of Roman constitution (History Guide). Owing to the Roman penchant for power and control, Rome was at war during most of the years as a Republic especially the three Punic Wars (264-146BC), in which Rome conquered Carthage (North Africa), Spain, France and other parts of Europe. Julius Caesur was one of the most famous citizens of Roman Empire for his rule and military campaigns (Roman Empire). Upon his death, the Roman world was divided between Marc Anthony, Octavian and Lepidus starting off a number of battles. With the battle of Actium, the Roman Republic transitioned itself into the Roman Empire ruled by Octavian. The Roman Empire was a much prosperous regime than the Roman republic with even more territorial expansion towards Western Europe and Middle East. At the peak of its power, around AD 150, Rome commanded the supreme realm ever seen in Europe at that time. Unlike the Greek empire under Alexandre, the captured nations profited from Roman rule as the Latin way of life and infrastructure building was inflicted u pon conquered societies such as Roman public baths, roads, water supplies, housing etc. Education (creation of

Tuesday, October 29, 2019

Barclays Bank Retail Banking Strategy Essay Example | Topics and Well Written Essays - 2000 words

Barclays Bank Retail Banking Strategy - Essay Example Some of these are helpful for every firm in the industry and are called opportunities, while others bring bad news for everyone and are regarded as threats. Besides these forces in the external environment, a particular firm may have internal strengths such as the skill and experience of its staff, or weaknesses such as frequent labor disputes because of lack of clearly defined polices for staff and workers. In sum the fortunes of the firm are dependent on how well its management deals with business opportunities and threats, while using the strengths of the firm to take advantage of the opportunities and minimize the effect of the threats through clever planning and strategic implementation of its vision for the company. This is what is called strategic management- or the planning and implementation to achieve its desired plans in the marketplace in the face of these internal and external forces. The legal, political, sociological, economic and other environments may pose a number o f challenges that must be overcome by the business if it is to survive and prosper in the marketplace. Barclays Bank PLC is one of the key players in the worldwide banking industry as well as in India and this paper will discuss how successfully it has managed to meet the challenges faced by the banking sector in India. II. Overview of the Banking Sector in India The major Indian banks can be classified under three categories in terms of ownership:(1) Public sector banks such as State Bank of India, the Bank of Baroda, Bank of India, Punjab National Bank and Canara Bank; (2) Private sector banks such as ICICI Bank and HDFC Bank; and (3) Foreign Banks such as Citibank, Barclays Bank of India and Standard Chartered Bank. By December 2008, there were 28 public sector banks, 29 private sector banks and 30 foreign banks, in addition to other regional and cooperative entities. The banking sector in India is one that is full of intense competition. Lately the banking sector, which had been hit by the worldwide 2007-2008 economic recession, has been in recovery mode and efforts are still being made to put the sector back on track. The recessionary trend saw a decrease in the percentage of consumer lending from 29.9 percent in 2007 to just 17.1 percent in 2008. The major contractions were seen in the autos, housing, personal loans and consumer durables sectors. III. Supervision and Control As in most nations of the world, the outlook on monetary policy and regulation of the financial system lies with the Central Bank. In India, this is the Reserve Bank of India (RBI). In keeping with the special functions of a central banking institution, it is also the issuer of local currency as well as the manager of foreign currency reserves and regulations in India. In the same fashion, the Securities and Exchange Board of India is the regulatory body that monitors stock market transactions and compliance with the rules. India also has an Insurance Regulatory & Development Authori ty like the FDIC in the USA that is responsible for protecting the interests of the policyholders. Â   IV. The State of the Retail Banking Sector in India Retail banking has been the major hub of activity in recent years. The banks have classified their customers into three major groups- consumer, small business and corporate. It has been acknowledged that the progress of retail banking would most likely rest of four pillars: innovative offerings, distribution optimization, quality of management and shared system/back-office. Barclays has adopted an innovative strategy upon its entry into India in 2008. Banking today can be characterized by the different products that are being dealt with, such as investment banking, asset management or debt management, or by the type of customer dealing, such as Wealth Management

Sunday, October 27, 2019

Review on Video Steganography Technique

Review on Video Steganography Technique Kamred Udham Singh Abstract In the era of information security, Steganography is a most secure method, used for concealing existence of secret data in any digital cover object such as image, audio, video and text files. In the last several decades broad research has been done on image steganography technique due to their easiness of data embedding and data extraction. Hide the existence of the embedded data in any digital object is the main objective of steganography. The main key factors of steganography are Undetectability, robustness and capacity of the concealed data that separate it from related techniques like cryptography and watermarking. Nowadays, video files are much more accepted because of large size and memory requirements. This paper intends to provide a survey on various video steganographic technique and covering its fundamental concepts. Keywords: Video steganography, data hiding, spatial domain, Transform domain, DWT, DCT. Introduction Today’s digital world it is very important for secret communication of any private information in safe and secure manner, it has created new challenge of information security. Here a most important question arise that which method we choose for containing its integrity and degree of security. Several methods have been proposed for addressing the issue of information security like cryptography, steganography and watermarking. In Cryptography information encrypted in such form that it becomes meaningless to eavesdroppers using any encryption algorithms such as DES but how strong is the encryption algorithm, it could be broken. Data can be easily replicated and distributed without owner’s consent due to lack of security. Watermarking modified the original data by embedding a watermark containing key information such as logo or copyright codes to protect the intellectual properties of digital content. Moreover, in some situation it was necessary to distribution of informati on without anyone detecting that the communication happened. So steganography comes arise in digital world to handle this case. Steganography technique is the art and science of invisible data communication. The word steganography originated from the Greek language and derived from two Greek words â€Å"stegos† which stands for â€Å"cover† and â€Å"grafia† which stands for â€Å"writing† [1]. Figure 1.The different disciplines of information hiding [21] Steganography developed driven by the necessity to conceal the existence of a secret data communication. Although steganography and cryptography both technique are try to protect data, but neither steganography nor cryptography alone is perfect. Consequently it is better to combine both technique together to increase the degree of security of the system [2]. Though steganography is technique for the communication being between two parties. So main concern of steganography is to conceal the existence of the data communication and protecting the hidden data against any alterations that may happen during communication such as format change or compression but integrity should be maintain. The major difference between Steganography and Cryptography is that the cryptography keeps the contents of information secret while steganography keeps the existence of information secret [3]. As video steganography is the focus of this review paper which can be viewed as an extension of image steganography. Really, video is a stream of a sequence of successive and equally time-spaced still images. So several image steganographic techniques are relevant to videos as well. Hu et al. [28],], Langelaar et al. [38], Shang [74], and Sherlyetal [76] extended various image data hiding techniques to video. Video steganographic techniques There are various applications such as intelligence agencies and military communications where video steganography can be employed [4]. Lie et al. [5], Yilmaz et al. [6] and Robie et al. [7] proposed another types of applications like video error correction during communication and for transmitting additional information without requiring more band-width [8]. Video steganography was used for hiding data in a video captured by a surveillance system was demonstrated by Zhang et al. [9]. There are various signal processing transform like DWT, FFT and DCT, any one of them can be used as video stenographic technique to hide data in the frequency domain of the cover object. Secret data can be hide either on per pixel basis or group of pixels called blocks [10]. Video steganographic techniques can classify in a number of ways. Sherly et al. [11] categorize them according to compression, compressed techniques [12, 13] and uncompressed video techniques [15]. Video steganographic techniques can also be classified on the basis of domain of embedding, these are transform domain techniques [14, 16] and spatial domain techniques [17]. Shirali-Shahreza [18] stated that video steganographic techniques can be also categorized on the basis of considering the video as a sequence of still images [17, 19]. Or utilizing the video saving format for data hiding [20]. Or finding new dimensions in the video which helps in the steganographic process [12, 15]. The fallowing figure depicts th ese possible classifications. Figure 2: Various Classification of video Steganography This paper will discuss classification based on embedded domain and cover-up all the literature related to video steganography. Bit Substitutions Methods Least Significant Bit (LSB) Bit Substitution-based steganography techniques replace the cover bit with the binary equivalent of secret data bit. The main advantages of bit substitution methods are the simple implementation and the high data hiding capacity in comparison to other techniques. Bit Substitution-based technique have many methods such as Least Significant Bit (LSB) method, Bit Plane Complexity Segmentation (BPCS) and Tri-way Pixel Value Differencing (TPVD) etc. Least significant bit (LSB) insertion is an oldest and most famous bit substitution-based approach for embedding data in a carrier file like video or image and it is capable of embedding huge secret data. Least significant bit technique operates by altering LSB bits of the cover file to conceal the secret data bit. Most of the bit substitution-based methods that exist are really inspired by the LSB technique. Data hiding technique developed to hide the secret data in definite frames of the video file and in definite position of the frame by LSB substitution using different polynomial equation. In this technique data will be hidden on the basis of stego key which is in the form of polynomial equations with different coefficients [22]. A. T. Thahab [23] proposed Digital Color Video Steganography Using YCbCr Color Space and Dynamic Least Significant Bit technique is apply to hide video data file inside the other video cover object .This techniques also found on the basis of least significant bit algorithm. Bit Plane Complexity Segmentation (BPCS) Normally the idea behind the LSB technique is to modify the least significant bits of the pixel with the binary equivalent of secret data. If more significant bits are used to hide the data then it deteriorating the quality of image. Due to this disadvantage of this technique leads to evolution of other technique which trying to overcome this disadvantage. Kawaguchi and Eason proposed Bit Plane Complexity Segmentation (BPCS) technique [24] and Chang et al. proposed Tri-Way Pixel-Value Differencing [25] .BPCS technique can be applied in the both spatial domain and transform domain [26,13] to address this problem. The basic idea of BPCS technique is to break down an image/frame into the bit planes and every bit plane treated as a slice of the image which is made up from all the bits of a definite significant location from each binary digit. Regions in the bit plane are categorized into informative and noise-like after that noise-like regions are substituted with the secret information and maintain the perceived quality. Jalab et al. [19] implemented the BPCS technique for hiding data in MPEG video format frames. This technique works in the YCbCr colour space instead of red, green and blue (RGB) components of a pixel for removing the correlation between the RGB and also decreasing the distortion produced by data embedding process. It is well-known that Human Visual System (HVS) are sensitive modifications in smooth parts than noise-like. Therefore, the BPCS method was applied for computing the complexity of every region in the cover frame. The complexity of every region of the bit plane is computed as the number of on edge transitions from 0 to 1 and 1 to 0, both vertically and horizontally. Tri-way Pixel-Value Differencing (TPVD) It is another bit substitution-based method is the Tri-way Pixel-Value Differencing (TPVD) [13] which is a modified form of the Pixel-Value Differencing method. To maintain the visual quality of cover object it is intuitive to think that data should be concealed in complex parts of the object. It hides the data in the difference of two neighbour pixels value which are classified into ranges, larger range index shows a sharp area where more secret data can be concealed and smaller range index shows a smooth area where less secret data can be concealed. In the data hiding process first partitioning the cover object image/frame into non-overlapping chunks of two neighbour pixels and its range are determined. After that number of secret data bits to be concealed is computed based on the range index. Lastly, the essential number of secret data bits is extracted from the secret data and corresponding their decimal value is used to generate a new difference and the pixel values are adjusted accordingly. This method provides high capacity and imperceptibility for human vision of the concealed secret data. Sherly et al. [11] implemented this technique to hide data in MPEG compressed videos and stated that secret data are hidden in the macro-blocks of the â€Å"I† frame with maximum scene modification and in macro-blocks of the P and B frames with maximum magnitude of motion vectors. Transform domain techniques Although Bit substitution-based methods are the simplest way for data hiding, but vulnerability is main disadvantage to any cover alteration like compression, format change, etc. This data embedding techniques can be easily cracked by an attacker. Transform domain methods are more complex than Bit substitution-based methods and try to improve the perceptual transparency and the robustness of the generated stego-objects. Any transform-domain technique contains of at least these phases, first transformed the cover object into the frequency domain, in second phase secret data is concealed in some or all of the transformed coefficients. In final phase modified coefficients are transformed back to the original form of the cover. Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT) and Discrete Wavelet Transform (DWT) are types of transform domain. Raja et al. [27] Stated that DFT methods introduce round-off errors which do not make it ideal for data hiding applications. So du e to this reason Discrete Fourier Transform methods are not popular in steganography. But, few techniques in steganography used DFT based steganography like McKeon [28] used the 2D DFT for steganography in videos. Discrete Cosine Transform (DCT) Discrete Cosine Transform (DCT) is a very popular transform and broadly used with image and video compression methods. Chae et al. [29] presented an algorithms in this field using texture masking and multidimensional lattice structure and used MPEG-2 compressed videos. Secret data and the cover video frames both are transformed using 88 Ãâ€"8 non-overlapping blocks. The secret data coefficients are quantized and then encoded by the multidimensional lattices, after that concealed into the cover frame DCT coefficients. Data hiding is adaptive to the local content of the video frame blocks. Steganographic techniques facing the challenge of improving the data embedding capacity without affecting visual quality. Large quantity of secret data can be embedding in the cover video is main objective of High bitrate techniques. A high bitrate algorithm is proposed by Yang et al. [16] which works on H.264/AVC Compressed videos. This method first convert the cover video frames to YUV colour spac e and then 1 data bit is embedded in each 4Ãâ€"4 DCT coefficient block . Strength points of this algorithm are large amount of data embedding capacity, robust to H.264 and MPEG-4 video compression techniques and also tamper resistant. Discrete Wavelet Transform (DWT) Discrete Wavelet Transform (DWT) is popular in signal processing and video/ image compression. Wavelet transform fragmented a signal into a set of basic functions called wavelets. The DWT has many advantages over DCT like providing a multi-resolution description and permitting for better modelling of Human Visual System (HVS). DWT delivers a multi-resolution analysis which analyzes the signal at diverse frequencies produce different resolutions. Temporal resolution is main advantage of DWT. It captures frequency and frame location information. At each level of transformation, a frame which is transformed with Haar wavelet transform [30] is decomposed into four bands. One of them is approximation band which represents the input frame after implementing a low pass filter and compressing it to half. Other remaining three bands are high pass filter and called detail band. High-resolution sub-bands permit simple detection of features like edges or textured parts in transform domain. DWT d oes not need to decompose the input cover object into non-overlapping 2-D blocks, which reduce the blocking artifacts. Wavelet transform produces floating point coefficients which are used to perfectly rebuild the original signal. Some video steganography techniques trusted on the integer-to-integer wavelet transform. Xu et al. [15] proposed an approach on this technique. In proposed scheme data is embedded in the motion component of video due to these two reasons first is not more affected by compression and second is HVS are not more sensitive to catch the changes in motion areas of video. The methodology of this algorithm is that, in first step motion component of video is computed from frame-by-frame basis, after that computed motion component are decomposed in two-level wavelet decomposition. In last step secret data bit are concealed into low frequency coefficients which are based on the values of coefficients. This technique maintaining the quality of video after the data embedding process. Requires a cover video with large motion component because data hiding capacity is depend on motion comp onent is the disadvantage of this algorithm. Adaptive steganographic techniques Adaptive steganography technique is a special case of the two former techniques which is also known as ‘‘Statistics-aware embedding’’ [31], ‘‘Masking’’ [32]. An adaptive technique basically implemented by studying the statistical structures of the cover object before changing with the secret data which helps to identify the best regions to embedded data [33]. Sur et al. [34] proposed an algorithm on temporal redundancy which select macro-blocks with low inter frame velocity and high prediction error as their regions-of-interest (ROI). Furthermore, the number of DCT coefficients used for data hiding is adaptively computed based on the relative stability of the prediction error block. This algorithm offers a very low data hiding capacity. Mansouri et al. [12] proposed a technique which combined the features of both spatial and temporal of the video and utilized a spatial key property. The objective of this technique is maximizing both perceptual invisibility and robustness by choosing frame regions which are perceptually unimportant. High data hiding capacity as it uses both temporal and spatial features of the cover video stream is the main advantage of this algorithm. Conclusion This paper presents a short review on video steganographic techniques and the key algorithms of video steganography. Steganography, cryptography, and watermarking technique and their differences is also discussed. An overview of steganography is presented and mainly focus on video steganography and its applications. Various video steganography techniques and classification of the existing video techniques are explained which are based on spatial domain, transform domain and other techniques. Advantages and disadvantages of these techniques are focused. Steganography techniques are mainly struggling for achieving a high data embedding rate. It is a good substitute channel for hide data in video files because it have many outstanding features such as large capacity and good imperceptibility. This paper delivers effective review on the design of a video steganographic system.

Friday, October 25, 2019

gatjay Failure of Jay Gatsby in The Great Gatsby by F. Scott Fitzgerald :: Great Gatsby Essays

Failure of Jay Gatsby of The Great Gatsby A society naturally breaks up into various social groups over time. Members of lower statuses constantly suppose that their problems will be resolved if they gain enough wealth to reach the upper class. Many interpret the American Dream as being this passage to high social status and, once reaching that point, not having to concern about money at all. Though, the American Dream involves more than the social and economic standings of an individual. The dream involves attaining a balance between the spiritual strength and the physical strength of an individual. Jay Gatsby, of F. Scott Fitzgerald's The Great Gatsby, fails to reach his ultimate dream of love for Daisy in that he chooses to pursue it by engaging in a lifestyle of high class. Gatsby realizes that life of the high class demands wealth to become priority; wealth becomes his superficial goal overshadowing his quest for love. He establishes his necessity to acquire wealth, which allows him to be with Daisy. The social elite of Gatsby's time sacrifice morality in order to attain wealth. Tom Buchanan, a man from an "enormously wealthy" family, seems to Nick to have lost all sense of being kind (Fitzgerald 10). Nick describes Tom's physical attributes as a metaphor for his true character when remarking that Tom had a "hard mouth and a supercilious manner...arrogant eyes had established dominance over his face...always leaning aggressively forward...a cruel body...[h]is speaking voice...added to the impression of fractiousness he conveyed" (Fitzgerald 11). The wealth Tom has inherited causes him to become arrogant and condescending to others, while losing his morals. Rather than becoming immoral from wealth as Tom has, Gatsby engages in criminal activ ity as his only path to being rich. His need for money had become so great that he "was in the drug business" (Fitzgerald 95). Furthermore, he lies to Nick about his past in order to cover up his criminal activity. Gatsby claims to others that he has inherited his wealth, but Nick discovers "[h]is parents were shiftless and unsuccessful farm people" (Fitzgerald 104). Gatsby enters a world where money takes precedence over moral integrity. Materialism has already overshadowed a portion of his spiritual side. A quest for true love is doomed for failure in the presence of immorality. Once wealth has taken priority over integrity, members of the high social class focus on immediate indulgences, rather than on long-term pleasures of life such as love.

Thursday, October 24, 2019

Original Course work †Urban Myths Essay

The scream rang through the trees. Pounding footsteps thudded their way through the wood. Twigs snapped and cracked like brittle bones. She slowed down to a trot, trying to make sense of where she was. Her ears pricked. Listening for following footsteps. Realising she had been holding her breath, she gasped and air flooded her body. Only half an hour before she had been sat perfectly happy with her boyfriend. Her vision glazed over as silent drops fell to the ground, remembering how Josh had got out of the car to investigate a noise they had heard. She sank down to the bottom of the tree, as she recalled how ten minutes later, when he hadn’t returned, she had got out, only to find his pale form hanging from the tree above. Blood stained the top of the car where it had spilt from his neck, draping down over his shoulder like a carpet of scarlet. Whoever done this mustn’t be too far away. They could be watching her, waiting for her†¦ â€Å"The bodies of two teenagers have been found in Thornby Woods early this morning by a local dog walker. The bodies have been described as horrifically mutilated and the result of a brutal murder. At the moment police are investigating leads including the name â€Å"Aidan† spelt in blood on the roof of the car. Hopefully this will bring the monster to justice.† â€Å"I can’t believe something like that could happen here, it’s just so unbelievable†, said Diana. The others nodded in agreement. The four were sat around a table in their local cafà ¯Ã‚ ¿Ã‚ ½. There was Diana, Jack and the twins, Kerry and Kevin. The twins with their unique coppery red hair and blue startling eyes, stood out from Diana and Jack with his plain name, and fairly plain features. â€Å"You know what this sounds like†, said Jack then hesitated, â€Å"the urban legend about the guy in the car with his girlfriend†. The others looked at him. â€Å"But they’re made up stories, they would never come true†, argued Diana. The twins, who had a habit of speaking in unison, started speaking but then fell silent, as the television in the corner of the cafà ¯Ã‚ ¿Ã‚ ½ flashed on again and more about the murders was broadcast. Later that night, Kerry was sat in the library. The essay she was trying to write was starting to give her a headache. The ticking clock, mounted on the wall, showed her it was nearly midnight. As she stifled a yawn, she pulled the books shut and gathered up her stuff. Silently, she made her way down the deserted corridors and up the stairs to her room. When she arrived she turned the key slowly in the lock, so as not to wake her roommate, Stacie. She climbed into bed and her eyes shut as her head rested on the pillow. The next morning, sunlight streamed through the windows. It was a Monday morning and everyone was trying to stay in bed as long as possible. Suddenly, the silence was broken as a scream rose from Kerry’s room. Kevin and Diana were first there. As they pushed the door open, they saw Stacie’s dead body surrounded by bloodstained sheets. Kerry was whimpering softly, slouched against the bed. Kevin noticed the mirror out of the corner of his eye. Smeared across the glass in blood-red lipstick were the words, â€Å"Bet you’re glad you didn’t turn on the light†. It was signed ‘Aidan’. Kevin rushed over to Kerry, trying to comfort her, glancing over his shoulder at Diana. She stood like a statue, a shocked expression spreading across her face. Jack came rushing into the room. â€Å"What’s happened†¦?†, he broke off. He had seen the body. The four friends sat bewildered, silently hugging each other. Kerry couldn’t concentrate. Everyone had thought it best if she went to her lessons and tried to forget about it, but she couldn’t. Her mind kept going back to that morning when she had opened her eyes. The first thing she had seen was the body. The bloody image flashed before her. Finally, after what had seemed like hours, the end of college bell rang. Kerry slowly made her way over to the cafà ¯Ã‚ ¿Ã‚ ½ where she was going to meet Jack and Kevin. When she arrived, no one else was there, so she pulled a magazine out of her bag. As she did so, a plain envelope came with it and dropped to the floor. Curiously, she tore it open and jerked the paper out. â€Å"You’re next†, it spelt out, in carefully cut out letters from a newspaper headline. Kerry crammed the paper back in the envelope, as Jack and Kevin came through the door. â€Å"You feeling any better?† asked Jack, concerned. Kerry nodded her head and had to force a smile. â€Å"You know, this murder also sounds like an urban legend, don’t you think?† Jack continued, ignoring Kevin’s warning look. â€Å"Who do you suppose is behind it?† Drew, the class swot, came over. â€Å"Have you not heard? The police are looking for a man with the name Aidan, round about 20 years old†, he recited, sounding like a news reporter. â€Å"Why?† asked Kerry, turning her head towards Drew. â€Å"The name has been found at both the murder scenes, so it’s likely it was left by the killer† â€Å"But I don’t know anyone called Aidan†, said Kerry puzzled. â€Å"Could be an outside job, it doesn’t have to be anyone on campus. Do you know anyone that would do something that sick?† â€Å"I suppose it makes it more likely to be some lunatic,† half-whispered Kerry, but Drew had already turned away and had started telling the news to the table next to them. â€Å"Hey guys.† Their conversation was interrupted by Diana’s arrival, which was always noticeable. Her slim figure and blonde hair made her popular with the boys. She joined them at the table. â€Å"So has everyone has a nice day?† she said with a smile. The others just looked at her. Kerry looked as though she was about to cry. â€Å"Oh sorry, I forgot about this morning,† she answered cheerfully. Kerry’s chair scraped back as she got up to go. She pulled her bag onto her shoulder and left without saying a word. â€Å"What’s up with her today?† questioned Diana. â€Å"Well maybe she’s upset ‘cos one of her friends was murdered right underneath her nose and she found the body!† exclaimed Jack. Kerry had gone to the library. She couldn’t stand being in her room after what had happened. As she sat, staring at the open book infront of her, but not taking one word in, a voice called out her name. Turning sharply around, thinking it could easily be the killer, she saw, to her relief, it was Jack. â€Å"I just came to see if you were all right.† He muttered his apology for scaring her. â€Å"Yeah. I’m okay†¦ well sort of,† she smiled back. â€Å"I just thought, well Diana wasn’t exactly being sympathetic before and when you walked out, you looked upset to me. I though someone had better come after you.† He paused and looked at her, â€Å"You sure you’re all right?† Kerry looked away and sighed. â€Å"Well not exactly, I got this letter, someone must have planted it in my bag.† She handed over the letter to Jack. His eyes scanned the letter and his expression turned into that of alarm. â€Å"You really should take this to the police,† he said, his eyes piercing her own with serious anxiety. She turned her head so she wouldn’t have to stare into his hazel eyes, so caring, so tender, so†¦ â€Å"What’s the point?† her voice shuddered, â€Å"It doesn’t mean its necessarily from him. It’s probably some dumb kid playing a sick joke to upset me† â€Å"Well, if you’re sure. But come on, don’t you think you should call it a day?† Jack said, standing up and taking Kerry’s bag. â€Å"Where am I going to sleep? I mean, I don’t want to sleep in my room tonight,† she shivered. â€Å"I’m sure you can share Diana’s room. Come on we’ll go up there now.† Kerry followed Jack and together they walked up the three flights of stairs to Diana’s room. Ten minutes later, Kerry sat on the spare bed, while Jack said his good byes. Finally they were left alone. â€Å"Look I’m really sorry about before you know. I really shouldn’t have said that,† apologised Diana, humbly. â€Å"Its okay,† said Kerry smiling at her friend and laying back on the bed. A large sigh rose from her chest. She looked around the room, so much different from her own. The walls were a soft shade of purple with various famous prints dotted around. Cream curtains hung at the windows, drawn back gracefully, allowing the orange, golden sunlight to stream in. Her eyes moved around the room and stopped at the desk placed in the corner. There, lying on a pile of schoolbooks, was a newspaper, maybe a day or two old. Kerry could clearly see off-cuts and torn pages nestled on top. â€Å"Have you been working on a project?† she asked, the sarcasm stung her words. â€Å"What do you mean, project†¦?† Diana’s eyes followed her gaze. Her laugh rang through the room. â€Å"Yeah, it’s a project all right.† Kerry instantly sat up on the bed and turned to face Diana. â€Å"You†¦Ã¢â‚¬  she spat accusingly. Diana let out a jeering laugh. â€Å"I wondered how long it would take you to realise,† she half laughed, half spoke. â€Å"Realise what exactly? That you sent me that letter? How could you be so cruel?† cried Kerry, scrambling off the bed and onto her feet to face Diana. â€Å"Cruel? You don’t even know the meaning of the word, cruel!† â€Å"What†¦What precisely do you mean?† questioned Kerry, her throat tightening. â€Å"When I saw that girl and boy in the car, I though that it was you and Jack†¦Ã¢â‚¬  â€Å"You mean, you†¦you didn’t, did you?† Kerry stared in disbelief. â€Å"Yeah, I followed them, then killed them, if that’s what you’re trying to say. The stupid thing was, I didn’t realise it wasn’t Jack until he was dead. And of course the girl had to go in case she saw anything,† sneered Diana, boasting about her serial killing. She quickly strode to the door and locked it before Kerry even had a chance to move. Kerry noticed for the first time, that even though Diana was pretty, she was tall, fit and could probably easily manage to hold someone in a struggle. Kerry caught her breath and inhaled deeply. â€Å"But why did you kill them because you thought they were Jack and I? Why did you want to kill us?† Diana hesitated. â€Å"You don’t understand anything? Do you? Well†¦ I suppose we have a few minutes before I have to kill you.† Her hand rose from behind her back. The sharp point of the knife sparkled in the autumn light, sending spears of the reflected spark, dancing on the walls. With the knife poised, ready for action, she continued. â€Å"I thought I could have anyone I wanted. But I didn’t want anyone I wanted Jack.† Her eyes flashed, dangerously. The knife still held, it’s flickering gleam reflected into Kerry’s eyes, dazzling her. Kerry swallowed, her heart beating faster, yearning to escape this torture. â€Å"I wanted Jack badly,† Diana continued, walking in circles around Kerry, as though she the predator and Kerry the prey. â€Å"But, he didn’t want me, did he? Oh no, he wanted you!† she hissed. â€Å"Me?† stammered Kerry, â€Å"I didn’t know.† â€Å"Of course, you, wouldn’t, spat Diana, â€Å"so I thought, well if I can’t have him, no one can. Especially you! So I came up with a nice, simple plan to kill you both. You could rot in hell together for all I cared.† â€Å"So when you killed Stacie, you thought†¦Ã¢â‚¬  â€Å"I was killing you,† Diana finished. â€Å"Yeah! Stupid mistake really, but I made up for it by making it look like it was to scare you. Funny really how urban legends can come true, isn’t it.† By now Diana was stood face to face with Kerry. â€Å"Anyway, enough talk! Now you get what’s been coming to you.† She laughed and thrust the knife down infront of her, ripping the air apart. Kerry stumbled backwards to the other side of the room. Her sweaty palms clambered at the door handle. â€Å"Looking for this?† taunted Diana holding the key out. Staring blindly around, Kerry picked up a chair and threw it at Diana. It narrowly missed her and smashed into the wall. Diana was moving forward, knowing that Kerry didn’t have anywhere to go. Only the bed stood between Kerry and her attacker. Diana drove the knife into the bed, ripping the duvet and shredding the sheets. In the commotion of feathers from the pillow, Kerry ran to the door and started banging and shouting for help. Surely someone would hear. In the meantime, Diana continued to pursue her. Kerry grabbed at anything; books, furniture, pens went flying. Some managed to hit Diana, obstructing her. Trying not to get injured by the knife, Kerry attempted to take it off Diana. Diana stood up, her eyes blazing like the fires of hell. â€Å"One thing I don’t understand,† said Kerry, trying to buy more time, â€Å"is why the name ‘Aidan’ was found at the murder scenes.† â€Å"Ever though of rearranging my name?† panted Diana, â€Å"Diana spells ‘Aidan’. No one was clever enough to guess that. It even managed to put the police off. Now stop this idle chit-chat and let me kill you, nice and slowly,† her voice cackled as she flew at Kerry, the knife close to her throat. Kerry tried to push her arm away. She couldn’t keep her off for much longer. She battled with Diana and they both lost their balance. Tumbling over Diana had the better position, holding the knife inches away from Kerry’s neck. â€Å"Goodbye Kerry†¦Ã¢â‚¬  The door to the room flew open. The surprise stopped Diana as she looked up. Jack and Kevin stood gaping in horror at the scene. Rapidly, they ran over and pulled Diana off Kerry. The knife dropped to the floor with a clang. Five policemen were standing in the entrance and with Kevin’s help, carried the screaming Diana away. Jack was left helping a very shaky Kerry to her feet. â€Å"I heard screaming,† he mumbled, â€Å"I rushed to help with Kevin.† Kerry didn’t say a word. Tears swept from her eyes, as she realised the terror was over, and she was still alive. A far away shriek disturbed the comforting silence surrounding Kerry and Jack. The wail of sirens echoed into the distance. â€Å"It’s all over now, I promise you,† Jack, holding Kerry, â€Å"I promise†

Wednesday, October 23, 2019

Metaphysics; Plato and Aristotle Essay

a. Introduction As a major assignment for this course, you are to write an essay paper on a topic relating to the subject matter of the course and drawing on course material. This should be a new paper, written by you individually, specifically for this class. You have two options to do this assignment. First option: You can write an essay paper in a rather classic style by selecting one of the listed topics in part b. If you decide to do the first option, you are required to pick one of the listed topics and write a philosophical essay according to the description provided for each topic. Second option: You can conduct a philosophical project and write an essay on the findings of the project. For this option, you need to become an â€Å"undercover philosopher† and interview 5 different people on a philosophical topic given in part c. The final outcome of your project should include the interviews results and your own analysis. Regardless of the option you choose you are required to follow these criteria: You are required to do only one of the mentioned options. But it is better to make decision as soon as possible since it will take time to accomplish either of them. This assignment is due no later than 11:59 p.m. on Monday, April 28. Late papers will only be accepted with an appropriate excuse and a point deduction. Your paper will be submitted via TurnItIn through the Blackboard site for the course. Just so you are aware, TurnItIn automatically checks your paper for plagiarism and will catch it if you try. No email or paper submission will be accepted. You should use the MS Word template file provided in your Blackboard. Papers not prepared in that format will not be graded. The final paper should be named as: Your Last Name_Your EU ID_Your Course Section.DOCX o For example if your last name is Jones and your EU ID is mhj034 and you are in PHIL 1050 section 001 then your file name should be: Jones_mhj034_001.docx. Another example: Ahmadi_kia9801_002.docx for student named Ahmadi with kia9801 as EU ID taking 002 section of the course. There must be â€Å"_† (underline) character between name, EU ID, and class section. o EU ID is the ID you use to login to your Blackboard account. You can find your class section by looking at the title of the course listed in your Blackboard account. Your paper must be no less than 1000 and no more than 1500 words (this is content only; this is not counting name, title, footnotes, bibliography, etc.) Papers with less than 1000 or more than 1500 words will be graded with a point deduction. You may find a PDF copy of Writing Philosophy on Blackboard, it is strongly recommended that you utilize this resource to help you write a good paper. All sources, including assigned readings, must be formally cited according to the Chicago Manual of Style (resources for which can be found online). Use of secondary sources is strongly encouraged but not required. Remember that failure to cite sources technically constitutes plagiarism! For further information, you can review the university’s policy on academic integrity at: http://www.vpaa.unt.edu/academic-integrity.htm. Regarding citations, long quotes of 4 or more lines are not allows and will result in a noticeable point penalty if used. Remember also that not only direct quotes also paraphrasing of another person’s material must be formally cited. All sources must be listed as footnotes. No bibliography or reference list at the end of the paper is required. Further details about citation can be found in the MS Word template file in your Blackboard account. This assignment makes up 25 out of 100 points for your final grade. You will be graded equally on writing, your summary of material, and your own critical response. Beyond these you can lose points for having a paper that is too short, failing to cite sources, or in any other way failing to adhere to the instructions and criteria for the assignment. Grading Criteria: An â€Å"A† paper is one that follows all format requirements, is at the standards of college writing, contains an excellent summary of course material, and  shows careful thinking about the topic. A â€Å"B† or â€Å"C† paper is one that follows most format requirements, is at or near the standards of college writing, contains a summary that shows a good or at least basic understanding of course material, and shows your own thinking about the topic. A â€Å"D† or â€Å"F† paper is one that is well below the paper requirements or the standards of college writing, contains a summary which shows a poor understanding of course material, and/or where any thought of your own on the topic is lacking. And, of course, any paper containing plagiarism will receive an â€Å"F†. Given that this a college course, it is expected that all students are capable of a certain level of writing quality. If you feel that your writing skills are not the best, I would strongly encourage you to seek help from the UNT Writing Lab (http://www.unt.edu/writinglab/). b. First Option: Classic Essay For your essay you may select from a list of topics below. Your topic will involve two aspects. First, you should summarize a theory or set of theories of philosophy that we have learned or discussed in class. Second, you should give your own argument for what is the proper view regarding that topic. Your paper must have both a summary of course material and your own original thinking on the topic, in roughly equal measure. Essay Topics: If you decide to write a classic essay paper you are required to choose one of the following topics. Otherwise you could do the second option described in part c. (1) Metaphysics; Plato and Aristotle: First,  summarize Plato’s theory of the Forms as ultimate reality (â€Å"The Republic†). Then, summarize Aristotle’s theory of the four causes and form/matter as ultimate reality (â€Å"Physics†). The second half of your paper should critically compare and contrast the two, and give your own argument for which you think is more correct, and ultimately state and argue for what you think the true nature of reality is. (2) Knowledge; Descartes and Hume: The first half of your paper will involve summarizing Descartes’ view of knowledge (â€Å"Meditations†), then summarizing Hume’s view of knowledge (â€Å"Enquiry Concerning Human Understanding†). The second half of your paper should critically compare and contrast the two, and give your own argument for which you think is more correct, and ultimately state and argue for how you think we acquire true knowledge and what the limits of knowledge are. (3) Cogito; Argument and Counter-Argument: The first half of your paper involve summarizing Descartes’ arguments in support of Cogito and philosophical implications of it (â€Å"Meditations†), then summarizing an strong counter argument from another philosopher (Modern or Contemporary) against Cogito and its implications. The second half of your paper should critically compare and contrast the two, and give your own argument for which you think is more correct, and ultimately state and argue for the relevance and validity of Cogito argument. (4) Ethics; Aristotle and Kant: The first half of your paper will involve summarizing Aristotle’s virtue ethics (â€Å"Nicomachean Ethics,† books I and II), then summarizing Kant’s deontological ethics (â€Å"Foundation for the Metaphysics of Morals†). The second half of your paper should critically compare and contrast the two, and give your own argument for which you think is more correct, and ultimately state and argue for what you think is the proper approach to ethics, including whether ethics should be approached through good character or rules for action. (5) Knowledge and Method; Aristotle and Descartes: The first half of your paper will involve summarizing Aristotle’s view on knowledge and method (â€Å"Physics†), with emphasis on the Empiricist method and his teleological account of nature; and further will involve summarizing Descartes’ view (â€Å"Meditations†), with emphasis on the Rationalist method and Cartesian doubt. The second half of your paper should critically compare and contrast the two, giving the pros and cons of each as well as your own  critical reflection on the proper approach and method for knowledge. c. Second Option: Philosophical Project For this option you are required to interview five different people on a philosophical topic listed below. First you need to understand the topic well in order to conduct your interviews. Then you pick your interviewees and ask the questions. You need to accurately record their answers. Then you summarize each interviewees’ responses in a very concise but clear paragraph. To do this you need to extract the philosophical core implied in the answers. You should not simply write down everything they say, because only philosophical arguments of their responses are important and relevant to this work. You should ask your questions is a way that makes interviewees reveal their principles or assumptions regarding the topic. Then you give your original thinking on those philosophical arguments and principles by comparing, criticizing, and challenging them. Generally speaking, your essay should include at least 8 paragraphs. First paragraph should include the questions you asked in your interviews. Five next paragraphs could be dedicated to the summaries of five interviews, and one paragraph for comparing the philosophical arguments and criticizing them, and one last paragraph for presenting your original thoughts on the issue. You should be creative in your questions and let the interviewees speak in their own voices. However you should guide the interview so that you can grasp the underlying philosophical principles. You should not include the interviewees name or identity in the paper. This is absolutely against UNT regulations for such research. Also you don’t need IRB approval since this is only a class assignment and the results will not be published in any way. Interview Topics: (1) Ethical relativism. The main question is â€Å"is ethics relative or absolute?†. However in addition to this question you should ask more questions to make the interviewees clear about their idea of ethical principles. You should ask interviewees to explain their reasons with examples. Also you can challenge their responses by giving them counter-examples. For example, for a person who thinks ethics is relative, a  counter argument could be â€Å"then everything is correct at the same time† or â€Å"why killing innocent people for fun is always wrong then?† Or for a person who believes that ethical principles are absolute, a counter example is â€Å"what if an ethically wrongdoing (such as lying to a murderer, or torturing a terrorist) is the only way to stop a disaster?† (2) Absolute Truth. The main question is â€Å"is there an absolute truth?† You should ask interviewees to explain their reason. Also you should ask them if absolute truth de pends on human mind or whether or not is attainable by human mind. A challenge to people who believe in absolute truth is â€Å"how exactly they know there is an absolute truth?† or â€Å"how can they justify their position?† On the other hand, if they believe in relativity of truth, then the challenge is â€Å"then everything can be true or false at the same time and this is contradictory (isn’t it?)†. Also you can ask if scientific truths are relative in their opinion or not. In addition, they should make it clear on what parameters truth depends (e.g. social contract, power, culture, personal preference, utility, etc). And also if truth is relative then why do we think we know the physical world better than ancient thinkers (don’t we?) (3) Environmental Ethics. The main question is â€Å"do we have moral duty to nature and environment?† You should ask questions such as â€Å"are we morally responsible for nature and environment?†, â€Å"is there anything morally wrong about destroying nature (intentionally or unintentionally)?†, â€Å"what if destroying nature is necessary for human life?† and â€Å"what makes us responsible for nature?† You can also ask questions about what elements and aspects in nature makes us responsible. For instance, we are responsible because it is useful for us, or because it is beautiful, or because animals and plants are alive (like us), or it is because of the next generations that we are responsible? Or combination of them. You should clarify what sort of ethical relationship each interviewee is assuming between them and nature. Also do they think that human is just a plain member of ecosystem or special member who stands above everything because it is human being? Also â€Å"to what extent we should care for nature?† (4) Existence. The main question is â€Å"what makes our existence valuable?†. You may ask questions such as â€Å"why we are here?†, â€Å"why we should not kill ourselves?†, â€Å"what is the most valuable in human life?†, â€Å"what makes life worthy of living?†, â€Å"what is  valuable about existence?†, â€Å"is the any purpose in human life?† and â€Å"is there any meaning in human existence?†. (5) Being Human. The main question is â€Å"what is human being?† Under this topic you should ask the interviewees to give a very clear and concise definition of human being and then ask them further questions to challenge their definition. For example, if human being is defined as a rational animal, then why we consider mentally impaired humans as human being? The main concern in this topic is to clarify the essence of human being. Also you should ask them to explain how philosophy/science/religion can help us understand the nature of human being. Also you may ask them to clarify whether or not human being has a fixed nature /essence. In this regards you can ask â€Å"do you think human beings have changed in their nature/essence over the course of history?† Also you may ask them how can we grasp the truth about human nature. P

Tuesday, October 22, 2019

Practice in Using Commas and Semicolons Correctly

Practice in Using Commas and Semicolons Correctly This exercise offers practice in applying the rules for using commas and semicolons correctly. Before attempting the exercise, you may find it helpful to review these three pages: Guidelines for Using Commas EffectivelyHow to Use the SemicolonSemicolons, Colons, and Dashes Throughout the following two paragraphs, you will find a number of empty paired brackets: [ ]. Replace each set of brackets with a comma or a semicolon, keeping in mind that the primary use of a semicolon is to separate two main clauses not joined by a coordinating conjunction. When you are done, compare your work with the correctly punctuated versions of the two paragraphs on page two. Exercise: Pasta Pasta[ ] a large family of shaped[ ] dried wheat pastes[ ] is a basic staple in many countries. Its origins are obscure. Rice pastes were known very early in China[ ] pastes made of wheat were used in India and Arabia long before they were introduced into Europe in the 11th or 12th century. According to legend[ ] Marco Polo brought a pasta recipe with him from Asia in 1295. Pasta quickly became a major element in the Italian diet[ ] and its use spread throughout Europe. Pasta is made from durum wheat flour[ ] which makes a strong[ ] elastic dough. Hard durum wheat has the highest wheat protein value. The flour is mixed with water[ ] kneaded to form a thick paste[ ] and then forced through perforated plates or dies that shape it into one of more than 100 different forms. The macaroni die is a hollow tube with a steel pin in its center[ ] the spaghetti die lacks the steel pin and produces a solid cylinder of paste. Ribbon pasta is made by forcing the paste through thin slits in a die[ ] shells and other curved shapes are produced with more intricate dies. The shaped dough is dried carefully to reduce the moisture content to about 12 percent[ ] and properly dried pasta should remain edible almost indefinitely. Pastas can be colored with spinach or beet juice. The addition of egg produces a richer[ ] yellower pasta that is usually made in noodle form and is often sold undried. When you are done, compare your work with the correctly punctuated versions of the two paragraphs on page two. Here are the two paragraphs that served as the model for the punctuation exercise on page one. Original Paragraphs: Pasta Pasta, a large family of shaped, dried wheat pastes, is a basic staple in many countries. Its origins are obscure. Rice pastes were known very early in China; pastes made of wheat were used in India and Arabia long before they were introduced into Europe in the 11th or 12th century. According to legend, Marco Polo brought a pasta recipe with him from Asia in 1295. Pasta quickly became a major element in the Italian diet, and its use spread throughout Europe. Pasta is made from durum wheat flour, which makes a strong, elastic dough. Hard durum wheat has the highest wheat protein value. The flour is mixed with water, kneaded to form a thick paste, and then forced through perforated plates or dies that shape it into one of more than 100 different forms. The macaroni die is a hollow tube with a steel pin in its center; the spaghetti die lacks the steel pin and produces a solid cylinder of paste. Ribbon pasta is made by forcing the paste through thin slits in a die; shells and other curved shapes are produced with more intricate dies. The shaped dough is dried carefully to reduce the moisture content to about 12 percent, and properly dried pasta should remain edible almost indefinitely. Pastas can be colored with spinach or beet juice. The addition of egg produces a richer, yellower pasta that is usually made in noodle form and is often sold undried.