Wednesday, July 31, 2019

On Some Motifs in Baudelaire

Seminar Questions 1. Modernism- Benjamin, Walter â€Å"On some Motifs in Baudelaire† Question 1: In â€Å"On some Motifs in Baudelaire† Walter Benjamin argues that extended exposure to stimuli, or shocks, in the environment alters the human experience of our world and creates a conditioned reaction within the crowd. How does this overstimulation shape our current society and was Benjamin correct in warning against it? Walter Benjamin implied that our minds are not equipped with the facilities to handle these shocks.These develop into environmental stressors and thus our decision-making skills are weakened and we just follow the person in front of us. While over stimulation is an epidemic in current times I do not believe it has created mindless hordes of people. The biggest effect of over stimulation is an individual’s continuous partial attention. Not being able to focus on one thing means focusing on multiple tasks and then not doing any of them completely. Our minds rapidly switch between a variety of separate channels.Initially, this may lead to fatigue. However, the mind can build off of this and become stronger. This is why current culture deems louder, brighter, faster, and shocking media as â€Å"better†. For society to notice anything it needs to be an attention grabber, and when society is constantly focusing on a variety of media you are bombarded with I do not agree that these shocks create a conditioned reaction within the crowd but I do believe they create them within the individual.An individual’s need to process multiple channels of information at once allows information that isn’t sold as the biggest, brightest, and best to fall through the cracks. ? Question 2: Walter Benjamin’s description of a flaneur as a â€Å"detached observer† describes a spectator who seems to maintain their individuality from the crowd. One that can break free from rationalized understandings while being opened up to new perspectives and experiences. Do modern cities and their architecture embrace the idea of the flaneur? Modern architecture embraces the alienating nature of modernity.It creates cities that encourage crowds and a fast-paced way of life. Commercial typologies like malls, subway systems, and high-rise office buildings create a certain environment that do not encourage individual reactions. When something is designed to garner a similar reaction from different types of people it lessens the chance for chaos and also allows a behavioural expectation to be set within a certain environment. When people are expected to react in similar ways it allows the people in charge to be better prepared for distinctive instances.Police can work better, government can create more effect universal policies and transportation can run smoother. Therefore, it benefits the rulers of a city to for modern architecture to follow the same instances. Perhaps the flaneur is the architect, but the vision and idiosyncrasies that the architect tries to instill within each project get syphoned out through different real world factors. Factors that include: budgets, client’s tastes, feasibility, and materiality. These factors chip away at truly city changing architecture and create an environment where the same projects continue to get churned out.

European Influence on Japan & China Essay

The European arrival had an effect on both China and Japan. China and Japan had some similar and different reactions to the arrival of the Europeans. In China and Japan, the European arrival affected the technologies and economies of both societies similarly, whereas the reason of isolation differed in these societies. The technology of the European’s following their arrival penetrated both the Japanese and Chinese societies. In China, in order to gain the elites interest in the Christian religion, the Jesuit missionaries introduced the technology of cannons and clocks. In Japan during the 1950s, the Portuguese technology of clock and gun making, influenced society strongly. The Japanese and Chinese both openly accepted the new European technologies because they felt they needed to accept the technologies to keep up with the Europeans, who seemed more technologically advanced. In both China and Japan, people were being converted to Christianity. They were being converted from top to bottom. Once a year, China and Japan, were able to trade with the Europeans. They isolated themselves and traded with each other. Japan and China also had some different reactions to the European arrival. They had different reasons for isolating. After Zheng He died, the Chinese government decided to close the ports, except two. The Chinese and the Europeans exchanged goods once a year for the next 400 years. China agreed with the isolation because the scholar gentry saw the voyages as a waste of resources. They rather spend the money on defending China. Japan grew doubts with the European intentions, that both merchants and missionaries might subvert the existing social order. This led to official measures to restrict foreign activities in Japan. Under Ieyasu and his successors, the persecution of the Christians increased to isolate Japan from outside influences. In the 1630s, all the Japanese ships were forbidden to trade or even sail overseas. By the mid-17th century, Japan’s retreat into almost total isolation was complete. A major difference was after Japan isolated themselves, an elite group still remained interested in the Europeans. Unlike the Chinese who looked down on the Europeans and ignored what they had to offer and stay isolated with them. The Chinese and Japanese had similar and different reactions to the arrival of the Europeans. Both of these societies had a technology advancement. Also, they both isolated themselves from the Europeans and instead they traded with each other. They had different reasons for isolating. Also, an important difference was that in Japan, a group remained interested in the Europeans. This differed from the Chinese because after they isolated, they didn’t want anything to do with the Europeans.

Tuesday, July 30, 2019

Paradise Lost: Sympathy for Satan

Sympathy for Satan John Milton spent years trying to think of an idea to base his epic on; an idea that would make his epic last centuries and never be forgotten. His desire came to life since his work lives in history, along with Homer, Virgil and Dante. Finally, he found a muse in God and in the dawn of creation; rather than in earthly matters. John Milton’s intention while writing his epic was not to make Satan a hero, however, many people perceive such an idea. Instead, he simply wanted to display his optimistic view of life; the fact that goodness is not goodness unless it resulted from a struggle to overcome evil.Thus, Milton focuses Satan and his dishonorable deeds in order to highlight God’s kindness and goodness. Moreover, â€Å"Paradise Lost† includes Satan’s side of the story. Throughout the epic, many traits and characteristics that Milton attributes to Satan make him seam appealing or forgivable. One source of Satan’s fascination for us is that he is an extremely complex and subtle character. It would be difficult, perhaps impossible, for Milton to make perfect, infallible characters such as God the Father, God the Son, and the angels as interesting to read about as the flawed characters, such as Satan, Adam, and Eve.Satan, moreover, strikes a grand and majestic figure, apparently unafraid of being damned eternally, and uncowed by such terrifying figures as Chaos or Death. Many readers have argued that Milton deliberately makes Satan seem heroic and appealing early in the poem to draw us into sympathizing with him against our will, so that we may see how seductive evil is and learn to be more vigilant in resisting its appeal. Milton devotes much of the poem’s lines to developing Satan’s character. Satan’s greatest fault is his pride.He casts himself as an innocent victim, overlooked for an important promotion. But his ability to think so selfishly in Heaven, where all angels are equal and love d and happy, is surprising. His confidence in thinking that he could ever overthrow God displays tremendous vanity and pride. When Satan shares his pain and alienation as he reaches Earth in his soliloquy, we may feel somewhat sympathetic to him or even identify with him. But Satan continues to devote himself to evil. Every speech he gives is fraudulent and every story he tells is a lie.He works diligently to trick his fellow devils in Hell by having Beelzebub present Satan’s own plan of action. These characteristics are presented throughout Satan’s first and final soliloquy in â€Å"The Fall of Satan†; â€Å"Here we may reign secure, and in my choice to reign is worth ambition, thought in Hell: better to reign in Hell than serve in Heaven†. Satan is far from being the story’s object of admiration, as most heroes are. Yet there are many compelling qualities to his character that make him intriguing to readers.

Monday, July 29, 2019

Competitive Advantages Paper Research Example | Topics and Well Written Essays - 250 words

Competitive Advantages - Research Paper Example Therefore, Riordan will have to produce highly standardized products so that it can compete with other producers of plastic products. It will have to adopt a global or a multi-domestic outlook, where it will either compete globally or compete at different national markets in a manner differentiated from that at other national markets. In the case of Riordan, it will have to adopt a global strategy at the target global markets, and a multi-local strategy at markets that are principally multi-domestic. The market drivers of its strategy will include customer needs uniformity, developing global networks of distribution, and ensuring that its marketing is transferable. The cost drivers to guide Riordan include those of transport, economies of scale, economies of scope, and product development. The government drivers to guide the business strategy include segmenting markets on the basis of the favorability of trade policies, the compatibility of technical standards, universal marketing control, as well as privatization. The global business strategy will be focused around increasing sales levels to existing customers, expanding sales to emerging markets and new customer groups, and the development of value-added services, which can compete globally. The company can maintain its cost-plus pricing strategy while at the same time increase segmentation on the basis of customer regions and locations. Riordan is a plastic manufacturer operating at different countries around the globe. The global market will affect the business strategy of Riordan in a number of ways. These ways include expanding economies of scale and scope, adopting a global and a multi-domestic market outlook, developing global distribution networks, and cultivating strategy drivers like product

Sunday, July 28, 2019

Hotel management front office operations questions Assignment

Hotel management front office operations questions - Assignment Example VIP’s may have alternate areas of registration or different procedures to improve the atmosphere of exclusivity. Is the guest a walk-in and what are the differences? A guest can walk in and the difference between a walk-in and a pre-registered guest is that the former may have limitations on available rooms present if pre-registered guests already reserved their rooms. What role does the housekeeping department play in regards to registration? The housekeeping department prepares a housekeeping status report to inform front desk agents about the readiness and cleanliness of rooms. What do V/C, V/D, V/I, and O/C mean? O-O-O? V/C means vacant and cleaned, but not yet inspected. V/I means vacant and inspected. O/C means occupied and cleaned. V/D means vacant and dirty. O-O-O means out of order. Does it matter where you place a guest and how do you know their preference? It mattes where guests are placed because each room has specific characteristics that can either please or displease them. Front desk agents can know these preferences by asking them about the rooms and the facilities they prefer and referring to the guest history file, if already present. What are some of the rates given to guests and why? The room rate is the actual price charged for a given room on a given night. The rack rate is the standard or non-discounted rate for a given room type. If a guest does not qualify for a discounted price, the guest is charged the rack rate. Do they accept methods of pre-payment and how is that done? It can accept pre-payment, such as cash and card payments over the phone or online. These pre-payments are done through the reservations system. What types of credit cards are accepted and are there differences in this and a debit card? Travel and entertainment cards and bank cards with installment payment plans are some types of credit cards. Debit cards are different from credit

Saturday, July 27, 2019

BUS WK4 HOMEWORK Essay Example | Topics and Well Written Essays - 750 words

BUS WK4 HOMEWORK - Essay Example In such a devastating situation, it is imperative that the company pays great attention at how to inform the world about the catastrophe. If this situation was not handled then the audience of the company which is enormous as it includes the whole world, would see the company in a much worse light. The company has to release the information in two ways; first they would have to break the news to the families of the workers and secondly the company’s employees and then to the media. The company has to be extra cautious in choosing the representatives who will handle these releases. They have to make sure that their reputation is kept intact and at the same time the information provided is honest and precise. This adversity affected a lot of people. It was not only the 33 miners in the mine who were affected;the families of those workers were also hurt. The anguish that their families had to go through was no doubt too much. They waited to hear any news about their loved ones an d worried whether they would make it out alive. Chilean Copper Mine was responsible of keeping the families continuously up to date on the rescue mission and what was being done to help the miners in the best possible way to save them. This process of communication is extremely important. The employees of the company also need to be kept informed about the situation because they need to know what the company they work for can do in order to protect them and how serious they are about their workers. This means of communication has to be really effective; it will have to give all the information to them as well as make them feel that the company does care about its employees and that they are all united in this situation. Communication has a meaning to every person in a situation. A crucial point of an effective communication is mutual understanding of the information. It involves the shared concern of the thoughts, feelings, needs, wants and intentions of the communicators (Krizan, 2 011). If the message is sent through mail or memo or a video, the message has to be sent using a proper tone. In the case of the trapped miners, the overall tone when sending the message across has to be considerate and consoling in order to maintain calm. The families of the affected should be informed verbally through a video. Providing this information through writing will not be enough. Draft 1: I would like to address the family members of the ‘33’ as per company protocol. The main message that I want to communicate is of patience and being positive. The journey has no doubt been very long and stressful especially without enough resources. The company has now directed towards other ways to proceed with the rescue. This includes consideration of all types of safety aspects to ensure that the miners come back to the surface with full health and conditions and rejoin their families. The company completely understands the concerns of the families and will address them. It would be difficult to present all the information so we will sum up the most significant points of the rescue plans for this accident. The most essential thing for us is the well-being of the affected; we will make sure that all of them will reemerge to a normal life. Draft 2: The Chilean Copper Mine cave that has trapped 33 of our employees is indeed a tragic incident. We are very well

Friday, July 26, 2019

Continuous Quality Monitoring Research Paper Example | Topics and Well Written Essays - 1000 words

Continuous Quality Monitoring - Research Paper Example Department of Health, 2011). This paper explores CMS accreditation in references to surgical site infection, one of the hospital-acquired infections. Hospital-acquired infections during surgeries may be caused by poor performance of surgical procedures such as insertion of catheters (tubes) into body tracts, nose, mouth, or blood vessels, contaminated hands and surgical environment and materials. Hospital-acquired infections are sometimes referred to as nosocomial infections and appear 48 hours to four days after a patient has been admitted at a health facility. Most affected by nosocomial infections are patients under long-term care in hospitals and patients admitted for intricate procedures such as surgeries. In most cases, surgical site infections are caused by surgical procedures or/and unsterilized surrounding. Regrettably, health agencies such as the Centers for Disease Control (CDC) have indicated that almost half of nosocomial infections are preventable if only health care providers strictly adhered to the set guidelines (Centers for Medicare, Medicaid Services, & U.S. Department of Health, 2011). The situation is made worse by the fact that nosocomial infections occur in already immune-compromised patients (Pittet, 2010). Among the major causes of surgical site infections are bacteria, viruses, fungi, and parasites, which are already in the body or are acquired from contaminated hospital equipment, other patients, the environment, or health workers. In recent times, hospital-acquired conditions such as surgery site infections have poised quite a range of new challenges for the Medicaid and Medicare programs (Centers for Medicare, Medicaid Services, & U.S. Department of Health, 2011). In fact, these challenges led the President to sign the Deficit Reduction Act (DRA) of 2005 on February 8, 2006, an Act, which required that an alteration be done in Medicare Diagnosis Related Group (DRG) concerning payments for

Thursday, July 25, 2019

Child Care Care for Babies Essay Example | Topics and Well Written Essays - 500 words

Child Care Care for Babies - Essay Example They are not comfortable with the idea of two caregivers having to attend a minimum of ten babies at the same time. Thinking of the direct relationship between the baby's mood swings and a caregiver's mood swings makes them forecast possibility of a caregiver's outburst of frustrations and inability to fulfill task. The scene just can't be concluded yet if all of the ten babies will cry at the same time. The couple needs to work and they are only able to do that when they are secure in their knowledge that their children are safe and in good hands. It will be unwise or unfair to expect a clone of the parent. However we can respond to the worries by convincing them that the caregiver is a decent and kind individual. To give them a good outlook of the care the center is providing they will be given an opportunity to interview the caregivers at a preset time to satisfy their parent's instincts. In this way the parents will be able to personally describe the routines of the baby and caring schemes for their child apart from what was listed in the enrolment form. The act will give them comfort that they have personally clarified in detail the baby's management and care in question.

Collaborative online learning Essay Example | Topics and Well Written Essays - 3000 words

Collaborative online learning - Essay Example The purpose of collaborating online is to enable learners to interact with each other, to help them share knowledge, and to facilitate them in exchanging thoughts through using online portals (Geiss & Roman, 2013). Online learning incorporates collaborative learning which is recognized as a great and worthwhile opportunity, not only in terms of allowing access for fellow students, but also in giving them chances to work together so to make theor learning take place online more effectively, as compared to the traditional face-to-face class (Tsai, 2011). Generally, collaboration is now recognised as one of the most essential skills that are necessary for learners to function effectively within an online community. It is necessary that we know how students learn, communicate, and how the increasing functionality of technology is raising the bar of communication and collaboration (Sulisworo, 2012). By definition, collaborative learning refers to certain environments in which learners engage in a common and authentic task and the methodology applied therein, and in which each peer is dependent on and accountable to the others in the group or team (Tsai, 2011). Bouroumi and Fajr (2014) defined collaboration and cooperation as "teaching strategies that allow students to interact with each other and work together in order to learn more efficiently" (p.66). Cullen, Kullman, and Wild (2013) also mentioned that the practice of collaboration involves "a situation where two or more people learn or attempt to learn something together, and it ha s strong support from a range of theoretical perspectives including motivation, cognition, and social cohesion" (p. 426). Collaborative learning has also been defined as a pedagogy in which learners come together, usually in groups, and grain in their learning as a result of mutual cooperation. In this arrangement, each

Wednesday, July 24, 2019

Colonial cities or regions in southeastasia Essay

Colonial cities or regions in southeastasia - Essay Example Colonial cities are the conquered trading ports basically by Europeans and later on Americans that are part of a country or nation which were heavily influenced with culture. In Southeast Asia, these may include Singapore, Jakarta, Manila, Hong Kong and Saigon. Historically, the Philippines is rich in culture and tradition prior to the conquest of the Spaniards in the 16th century. Negritos or Aetas came to the area via land bridges during ice age, while the vast majority of Filipinos are believed to have come from Austronesians from Taiwan. Filipinos intermarried with its neighbouring races Indonesian and Malays and these mixes traded with Hindus from India, Chinese and the Arabs (Zaide, 1993). Trade has been established in most of its earlier ports including Cebu, Davao, Manila, and Dagupan. Doeppers (1972) called these coastal villages. While there had been proofs of a very early settlement in the Philippines, its coastal villages and river courses engaged in wet rice agriculture combined with hunting and fishing. The villages were fragmented and there were frequent inter-village fighting. Each village roughly made up of thirty to a hundred families make up the barangay headed by a datu or chief, followed in rank by the warriors, free men and slaves (Zaide, 1993). Intra-island trade were present and exte... Philippine settlements in pre-Hispanic period were not at all cities such as Cebu which was a minor port call, and Manila or Maynilad which was a point of importation for the Tagalog living around Laguna de Bay (3) and it was also said that of the 2,000 Manila inhabitants, forty were Chinese and twenty were Japanese (Doeppers, 1972). In fact, due to its location at an outer extremity of the Southeast Asian insular, Philippines also remained more detached with its Southeast Asian neighbours so that Buddhism and Hinduism did not take roots, except for Islam in the south. Mindanao, nevertheless showed an integrated group of Muslims that were able to "defend themselves effectively" (Doeppers, 1972, p 771) and it remained culturally rich with Jolo as the seat of the Sultan of Sulu. Ming naval vessels also visited the area. Colonial Period The Colonial Era In 1564, an expedition set out from Nueva Espana or Mexico which was the fourth to exploit Magellan's discovery of the Pacific Indies. Ferdinand Legaspi, the expedition commander was commanded by the Royal Audiencia to spread the Roman Catholic faith and send back to Spain spices and wealth. Cebu, specifically the island of Panay, became Legaspi's choice of settlement. But unlike the South Americas, Manila had no gold or "easily exploitable wealth" (Doeppers, 1972, p 772). Instead, it was an established trade port that made Legaspi propose a trade with China. So, a move of the seat of operations became inevitable in 1571. Urbanisation started to occur only during the Spanish period where coastal villages were turned into coastal clusters or settlements with at least 10,000 engaged beyond agricultural activities. These are called ciudades for cities and villas for towns. Their purpose had

Tuesday, July 23, 2019

The Plantation Mistress by Catherine Clinton Essay

The Plantation Mistress by Catherine Clinton - Essay Example This time marks one of the darkest periods in the history of America, therefore, confessions by these women in their diaries and memoirs represents real events concerning their tribulations. These women typify noteworthy character and mental toughness in that they are able to withstand the tribulations and tough times during that slavery period (Clinton 50). Clinton has illustrated many specifics in the Plantation Mistress. For example, the matter of cousin marriage has been described in detail. From early in life, cousins had a close association and relationship. This continued even after they separated geographically, and these close relationships continued throughout the life of the cousins. The principal reason for these close associations was that children within the plantations were isolated from the rest of the community, and as they were growing up, they did not meet other people apart from those in their kinship ties (Clinton, 67). This was the same with older ladies, who on ly associated closely with men that were closely related to them. These associations and marriage between cousins had its benefits as it ensured that property and wealth was retained within the family alliance. It further expanded kinship ties between closely related families. Therefore, characters that practiced this form of marriage impress me since they were involved in abnormal affairs, but these affairs were of benefit to them in the end. These characters viewed life as an experience of enriching oneself and ensuring that wealth is retained within the family tree. This may have been viewed as an abnormal thing by the surrounding society, but those who took part in marriage with their cousins did not mind what society did. Whatever they did, they did it to the benefit of their close family members (Gerster & Cords 78). Clinton covers another specific topic in child birth and rearing. Characters especially mothers in the novel greatly celebrated whenever children were born. All f amilies celebrated during this time period, but female babies were discriminated against greatly. Therefore, giving births to a female baby was a disappointment because Southerners who did not have sons were threatened with extinction in their inheritance and family name. Only sons were allowed to carry on with the family traditions and use the family name. However, some women in the novel did not allow to be discriminated by society by virtue of their giving birth to daughters only. These women soldered on despite the prejudicial treatment that they received from the surrounding society (Clinton, 89). Regardless of their mistreatment, these women still managed to raise their female babies until they grew up. To any reader, these women can be regarded as heroes since they managed to weather the storm of gender discrimination and go on with their lives. This is important because currently, gender discrimination is on the rise, and women empowerment by brave women has ensured that pre judicial treatment of women has been toned down. The women that Clinton describes in the novel who managed to soldier on despite the prejudicial society that surrounded them represent the present women who try to advocate for women empowerment so that gender balance is created (Gerster & Cords 84). In the Plantation Mistress, we learn that female education began to rise tremendously toward the end of the eighteenth century. From this, a new nation was born and Southerners and New Englanders promoted education of females in their respective

Monday, July 22, 2019

Advertising Is Harmful Essay Example for Free

Advertising Is Harmful Essay Today I went to the bathroom in Tyson’s mall, and I saw a Lenovo camera advertisement stuck in front of the stool. It made me feels like a camera recorded everything in the bathroom. No matter where you go, walking on the street, taking the bus or subway, looking for websites or watching TV shows you always see advertisements. So I believe advertisements are harmful. Some people say that advertisements won’t brainwash them, because they know what they really want. I don’t agree with this, because advertisements affect our subconscious mind. For instance, I have read a newspaper article about a mother who came home and asked her child what he wanted to eat and her child said McDonalds. The mother asked him why McDonalds and the kid said because he always saw it on the TV so he wants to try it. See more:Â  Social Satire in The Adventures of Huckleberry Finn Essay Although a child didn’t really know how McDonald food tastes, McDonalds had been advertised so many times on the TV that the children make the decision to have it for dinner. Not only are kids influenced by advertisements, but adults also are. For example, I bought a Dell laptop last year, but returned it a week later. I saw the Dell advertisements everywhere, at the college, the website, and even walking on the street, so when I wanted to buy a laptop, Dell became my first choice. I returned it a week later, because my friend told me Lenovo laptop has the same configuration as the Dell laptop but the price was much cheaper. This example demonstrates how the advertisement induces people to buy products. When people have seen advertisements many times, they have good impressions of the product in their minds. So not was only I had been influenced by advertisements, but most people are also. For example, most people bought IPhones rather than other phones because IPhones adverti sements around everywhere. Often an advertisement not only disturbs our daily lives, but also provides untrue information. Companies always show perfect products in their advertisements, but the real products are much worse. For example, last month I went to Burger King, and I saw a big poster outside the store that showed a man held a hamburger with two hands and open his mouth as big as he can to eat a hamburger. However, he only bites little of the hamburger, because it was too big. And it only cost 99 cents! When I bought it, I felt I had been cheated. It was delicious, but it was smaller than my hand and can be finish within a bite. Also most of the reducing weight advertisements are untrue too. Some companies exaggerated their products in the advertisement to misleading people to buy the products. Some of the advertisements said the medicines could help people reduce around 5 to 20 pounds per month. As we all know, obesity is one of the most serious problems in America, so many people tried to reduce their weight in many ways. However, the result is not as the advertisements showed. Those drugs helped people reduce the weight but also had side effects. For instance, drugs harm people’ health by increasing the risk of diseases, and people would also rebound a weight heavily after they stopped the drug. While not all advertisements are untrue, some advertisements provide exaggerated information that let us waste money and also harm our health. We waste our money to buy advertised products we don’t need. An advertisement may make us feel lower class than other because not having the newest product. For example, The Apple Company has most successful advertisement campaign, because most of people would like to buy their new products. For example, the IPhone5 commercial shows IPhone5 is tallest, thinnest and lightest iPhone. Many people changed Iphone4S to the IPhone5 because the commercial shows IPhone5 is better. However, it has similar systems and the same function as Iphone4S. Another reason people buy the IPhone5 is they had low self- esteem. Like my friend who bought IPhone4S last winter and bought IPhone5 now. And he told me, when there has a better product then he wouldn’t use worse one, because that makes him feel he was lower class than others. In this case, people wasted money to buy the newest advertised products to satisfy their vanity. There are too many advertisements in our world now, because companies try to increasing the sales. However advertisements always mislead people to waste money. Government must provide a law to stop untrue and exaggerated advertisements. And parents also need to take time to explain to their child that some products they saw in commercial are harmful. For example, when child asked to buy a quick food or candies, parents must explain to them those foods are unhealthy.

Sunday, July 21, 2019

Reproductive Strategies in Birds

Reproductive Strategies in Birds Catherine Carrick Introduction Birds, like any other organism, constantly struggle to find a balance between the benefits of reproduction and the costs of reproductive effort expressed as adult mortality (RICKLEFS, 1977). As well as behavioural differences among species such as brood size, protection of young or the effort required for foraging, environmental factors influence avian reproductive strategies. This includes bionomics, for example; how efficiently a bird procures and utilizes available resources, and how it protects its investment (offspring). During the last 50 years it has become the consensus that reproduction and mortality rate among birds are directly proportional, and that the age of sexual maturity increases with adult survival rate (RICKLEFS, 2000), where reproduction rate is determined by the length of the breeding season, the clutch size, and nesting success. The evolution of optimum clutch size was one of the first studies conducted by David Lack (1947) where food supply directly influenced fecundity. Later studies showed that in most cases, birds with a longer life span such as albatrosses had decreased clutch sizes, postponed sexual maturity and decreased reproductive success due to greater parental investment and thus a greater risk of parental death. Environments are often unpredictable and birds such as the black kite (Milvus migrans) produces more offspring early on it life (SERGIO, 2010). Competition, resources and hazards change in such a way and often so rapidly that the kites would die before being able to reproduce if sexual maturity occurred much later. Life Histories When understanding reproductive strategies, is it important to understand what is meant by life history. It is the history of adaptations and genetic modifications of a population in response to changes in the environment. It is not to be confused with a life table, which shows the interactions of adaptations and genetic modifications with the environment. Genetic variation gives rise to an evolutionary response in the gene pool to variation in the environment. Changes in the environment tend to change the density and age structure among a population making the population either crash, or revert back to a state of equilibrium. Sex Ratio Aspects of birds lives can vary up to 10-fold among species with opposite life histories (RICKLEFS, 2000) and the theme of this evolution include several components. The first is sex ratios. Fishers principle states that when male births are less common, those male offspring have better mating potential than the female offspring and so the males have more offspring. This then means the genes for male procuring tendencies spread, male births become more common and a 1:1 sex ratio is approached (the equilibrium). This reduces again as being born male becomes less advantageous (Hamilton, 1967). A study by Neville et al (2008) showed the sex ratio of 298 nestlings from 81 nests of golden-winged warblers Vermivora chrysoptera to be approximately 50:50 (1:1). However, Daan et al (1996) observed some raptor species producing excess daughters early in the breeding season and males later in the season, whilst other species showed the opposite. The deviation may be explained by specific enviro nmental conditions having different consequential outcomes for male and female offspring (DAAN et al, 1996). Sexual Selection Males and females differ through sexual dimorphism and secondary sexual characters such as elaborate tail feathers. If there is heritable variation in a trait that affects the ability to obtain mates, then variants conducive to success will become more common over time. Peahens select for male peacocks with the largest most elaborate tail feathers, and so this character is genetically passed on and becomes more common. Access to mates is a limiting factor for males and it was predicted that sexual selection will be a stronger force in the evolution of males than females (BATEMAN, 1948). This leads to stronger competition over mates in males and means that females should be choosy as they invest heavily in reproduction, yet another reason why males have large plumage to advertise to females. There are two theories as to why a female would choose a male with costly characters. Firstly is the sexy sons theory where cost arises as the end product of a runaway process. Secondly is the go od genes theory where females choose mates with good genes to maximise viability of there offspring (TRIVERS, 1972). For example, those peacocks with the brightest, largest and most elaborate plumage indicate to a female their probable resistance to parasites. Parental investment This can be described as any parental interactions with their offspring that increases the offspring survival rate, at the cost of the parents ability to invest in other offspring (TRIVERS 1972). Social monogamy with biparental care (BURELY, JOHNSON, 1992) is common among avian species. However, this has evolved from a very  different diapsid lineage in the fact that most extant and extinct diapsids show promiscuity and mainly lack parental care (with exceptions like crocodilians). Fig. 2 shows the stages of evolution from limited parental care in the basal archosaur leading to increased biparental care and ultimate monogamy among extant avian species. In contrast, social parasitism can avoid the risks of parental investment as seen in North American cuckoos (Coccyzus sp.) where the cuckoo lays its eggs in a hosts nest and the host incubates and raises the parasitic cuckoo chicks. Parent-offspring conflict The conflict is at its peak during the parental care period. It is loosely divided into intrabrood conflict where the offspring favour different division on parental investment that that preferred by the parent (KILNER, 2007) and interbrood conflict where the demands made by the offspring are too great that the parent withholds investment for future reproduction. An example is given in a study by Stamps et al (1985) on budgerigars (Melopsittacus undulates) where in female-fed families the parent controlled food allocation as they did not favour begging, whereas, in male-fed families the offspring had the greatest control, as the male parents were susceptible to allocating food to those who begged. Optimization in a Variable Environment D. Cohen (1966, 1968) reached the conclusion that fluctuating environments always favour greater reproduction, whereas constant environments select for small litters (SHAFFER, 1974). A case study by Jetz et al (2008) examined clutch size from 5290 avian species worldwide and correlated the environmental influences with the comparative approach (the relation of clutch size to other biological traits) in one analysis. It showed conclusive evidence that backed Cohens theory. For example, avian species in more stable seasonal environments had larger clutch sizes than those of tropical birds where the climate changes unpredictably and rapidly. Nest predation Prolonged incubation and nestling periods increase the probability that those nests will attract predators. The opposite can be said for minimal incubation and nestling periods. Therefore it can be assumed that those species with larger clutch sizes, prolonged incubation or nestling periods have adopted and evolved strategies to evade predation. For example, Killdeer (Charadrius vociferous) eggs and chicks are extremely well camouflaged (Fig. 3). Niko Tinbergen (1967) found that in the case of the black-headed gull (Larus ridibundus), the adult would remove the eggshell a short time after its chick had hatched, and place it away from the nest. This meant leaving the chick alone momentarily, but the advantage of removing the white, un-camoflaged egg shell outweighed the cost of cannibalism of the chick from neighbouring gulls. This behaviour is heritable among all black-headed gulls. Birds that evolve in areas with few or no predators should then exhibit larger clutch sizes, prolonged incubation and nestling periods. This is seen in island species that have had time to evolve in the absence of predators. However, a study preformed by Trevelyan and Read (1989) showed no significant differences in reproductive strategies between mainland Australia and New Zealand species. Trevelyan and Read interpreted these observations to be due to the arrival of humans, stimulating reproductive strategies similar to those on the main land. Conclusion Birds expend a great deal of energy providing parental care, breeding and courtship, whether or not the offspring are precocial (an advanced state if development) or altricial (completely dependant on the parent/s). It is clear that productivity of breeding is intrinsically linked to an avian life span and environmental factors which constantly encroach on avian fecundity and mortality. Of the 10,000 known extant avian species, each has developed a unique reproductive strategy, whether its be elaborate plumage to attract a mate as seen in tropical birds (genetic); removing egg shells to avoid cannibalism of offspring (behavioural); or laying a large clutch to ensure survival of the next generation in an erratically changing environment.

Identification of Prednisolone Acetate

Identification of Prednisolone Acetate IDENTIFICATION AND CHARACTERIZATION OF DRUG The procured prednisolone acetate was identified and characterized based on the following parameters. ORGANOLEPTIC PROPERTIES For the selected samples (drug + excipients) the following organoleptic properties were studied using descriptive terminology. Those were nature, odour and colour PARTITIONING BEHAVIOR OF PA IN DISTINCT LIPIDS: The percent partition coefficient of Prednisolone acetate in selected lipids was analyzed as elucidated elsewhere. On the part of the study/briefly, a mixture composed of melted lipid and 10mL of de-ionized water to this 10mg of PA was added. The resultant mixture was agitated reciprocally for one hour maintained at 50C above the lipid melting point. The quantity of lipid utilized was mentioned in table 1. The resultant dispersion was allowed to cool. Upon making cool both phases were separated by ultracentrifugation ( ) at 15,000 rpm and filtered. The drug content in supernatant was analyzed spectrophotometrically (240nm). The percent partition coefficient was predicted as follows: % partition = w1-w2/w1 x 100 W1 = Amount of drug added W2 = Amount of drug in aqueous phase DETERMINATION OF MELTING POINT PA melting point was determined by capillary method. Theoritical value was compared with practical value. LOSS ON DRYING This method measures the weight of volatile compounds or moisture of any kind which can be driven off under the specified conditions. Stoppered, shallow glass bottle was weighed and dried under the specified conditions. 2 grams of sample was accurately weighed and transferred to dried bottle. Then the loaded bottle was in electric oven, removed stopper and left near by it in drying chamber at 1050c for 2 hours at atmospheric pressure. After two hours the glass container was taken out from oven and weighed it again. The following formula was used for the calculation of LOD % LOD = Mass of test specimen – Mass of loaded bottle after drying/ Mass of sample – Mass of empty glass bottle IR SPECTROSCOPY OF DRUG Thin pellet was prepared using potassium bromide and drug in a ratio of 100:1 respectively. The molecular state of prednisolone acetate was studied using FTIR spectrometer. DSC PA thermogram was obtained in DSC 200 F3 Maia using empty aluminum pan as reference. The accurately weighed 2mg of sample was exposed to temperature range 0oc – 500oc under nitrogen atmosphere (flow rate: 60ml/min) at a heating rate of 10oc/min. UV-VISIBLE SPECTROPHOTOMETER (WAVE LENGTH SELECTION) 10mg of drug was dissolved in 100mL of simulated nasal electrolyte solution (SNES) which results in 100Â µg/ml concentration solution. From this 25 Â µg/ml was prepared. A few ml of this solution is transferred into cuvette (path length of 10mm cell) and scanned in the wave length range of 200-400nm against SNES as blank in double beam UV-Vis spectrophotometer. COMPATIBILITY STUDIES OF LIPID AND SURFACTANT MIXTURE The selected mixtures of lipid and surfactant, lipid and cosurfactant were blended at different ratios like 1:1, 2:1, 3:1 and 4:1. The blend was mixed for 10min and mixtures were observed visually for clarity (or) absence of turbidity. SOLUBILITY STUDIES OF PREDNISOLONE ACETATE The solubility of drug was estimated in different buffers, lipids, surfactant mixture ratios and solvents which are essential during development of formulation. IN DIFFERENT LIPIDS Test tube method was used for analysis of PA solubility in several solid lipids. To determine it 10mg of drug was placed to a test tube and temperature was maintained 50c higher/above the lipid melting point. The lipid was added an increase in quantity of 10mg till PA was solubilized completely and quantity of solid lipid needed for dissolution of drug was determined. IN VARIOUS RATIOS OF SURFACTANT MIXTURE The solubility of prednisolone acetate was investigated in numerous surfactant and co-surfactant ratios range from 1:1 to 4:1(Sur: Co-sur- Sur: Co-sur). Solubility studies were analyzed by adding an excess amount of PA in a 20 mL screw capped containers consisting different ratios of 10mL of each surfactant mixture. The mixtures were vortexed on orbital shaker at 50 rpm for 2 days at 37oc to enhance solubilization. After attaining equilibrium the samples were ultracentrifuged at 12,000 rpm for 30 min to separate the undissolved drug (PA) and supernatant was filtered through whatman filter paper. HPLC grade methanol was used to dilute the supernatant sample and these were filtered with 0.45 Â µm membrane filter. Then, the diluted samples were used to quantify the PA by UV-Vis spectrophotometer at 240nm. IN DIFFERENT SOLVENTS AND BUFFERS The excess quantity of drug was added to 10ml of different solvents includes pH 6, 6.4, 7, 7.4, 8 phosphate buffer, ethanol, double distilled water and methanol in a 25ml volumetric flask. Then flasks were properly capped and agitated at 37Â ±0.5oc in orbital shaker for 48 hours. The samples were filtered through whatman filter paper. The filtrate was diluted using suitable diluent and again filtered using 0.45Â µm membrane filters. Then samples were analyzed at 240nm by UV spectrophotometer. ds COMPATIBILITY STUDIES OF DRUG AND EXCIPIENTS The selected excipients were listed in GRAS (Generally recognized as safe by FDA) and used in various pharmaceutical formulations. Which are procured from reputed national and international manufacturers. The study of compatibility between drug and excipients was followed as. DSC METHOD : Differential scanning calorimetry was carried out using DSC F3 Maia instrument to analyze the melting transitions and heat capacity changes of drug alone and physical mixtures. The physical mixtures were prepared by triturating the PA and excipients in the ratio of 1:10 in a mortar for five minutes. The samples (5mg) were loaded in aluminum pans, sealed hermitically and heated under inert gas i.e. nitrogen at the flow rate of 60mL /min at 10oc/min heating rate ranges/set from 0 oc to 500 oc. The standard reference was an empty alumina crucible. The above said parameters/ conditions were used to analyze the samples and thermograms of DSC recorded/ data recorded using proteus software. Samples analyzed for DSC and FTIR were followed as The above physical mixtures compatibility was also found by adding desired quantity of mixture in glass vials and subjected to 60 oc for 30 days. The physical appearance of mixture was not changed at the end of the study. FTIR API was mixed with different excipients separately and spectral analysis was carried out using FTIR to study the placebo interference. The pressed pellet method was used to study the FTIR spectral studies. In this analysis, test-excipient mixture and potassium bromide were taken in the ratio of 1:100. The mixture when placed in hydraulic press under vacuum pressure of 800 mPa resulted in the formation of compressed thin transparent disc. The molecular states of samples were traced/determined between 4000-1000 cm-1 using Bruker FTIR spectrophotometer. The obtained IR spectra’s were evaluated to determine interactions. The data mentioned in table . Graphical representation shown/given in figure . METHOD DEVELOPMENT OF PREDNISOLONE ACETATE A survey of literature had showed that different instrumental methods like UV, HPLC, and HPTLC were reported for the quantification of prednisolone acetate. The present research work focused on development of UV spectroscopic method for dissolution samples estimation and HPLC for drug content, dissolution and bioanalytical quantification. Preparation of simulated nasal electrolyte solution(SNES) A solution of SNES was prepared by adding 8.77g of sodium chloride, 2.98g of potassium chloride, 0.45g of calcium chloride in water and finally made the volume to 100 mL resulting in pH 5.5. UV-Vis METHOD Stock solution prepartion 100mg of test sample was accurately weighed, transferred into 100 mL volumetric flask. To this little quantity of ethanol was added to dissolve the sample and made the volume up to 100ml using SNES (pH5.5) to get 1000Â µg/ml concentration stock solution. Prepartion of Linearity plot From the above stock solution 0.5, 1, 1.5, 2, 2.5ml were transferred in separate 100 mL volumetric flasks and diluted up to the mark with SNES to produce 5, 10,15, 20, 25 Â µg/ml concentrations respectively. The absorbance of each concentration was recorded in 1cm cell with SNES as blank at 240nm using Shimadzu, UV spectrophotometer. This procedure was done over for 3 times. With concentration on x-axis and absorbance on y-axis a calibration graph was constructed. Inter day and intraday studies were carried out for the determination of accuracy and precision using 1,5,10 Â µg/ml standard concentration solutions. The readings were tabulated in table and figure . HPLC METHOD PSEUDOTERNARY PHASE DIAGRAM CNSTRUCTION To construct the phase diagrams (prosim 1.0 software) hot water titration method was used. Through these phase diagrams components concentration range was investigated which can be results in existence of large microemulsion area. The surfactants used were tween 80,60,20, Cremophor RH40 and cosurfactants were ethanol, PEG 400. The surfactant and cosurfactants was blended in fixed weight ratios such as 1:1, 2:1, 3:1, 4:1. Solid lipids were tristearin, tripalmitin, GMS, stearic acid, Palmitic acid, cetyl palmitate. Lipid was melted at 65oc to this required quantity of hot surfactant mixture was added followed by adding water drop by drop to mixture under stirring with magnetic stirrer until turbidity formed. DEVELOPMENT OF DRUG LOADED MICROEMULSIONS From each phase diagram ME area was calculated by using CAD software. From each lipid, based on the above area values highest area of phase diagram was selected then the ME formulations were taken at required component weight ratios. The procedure of desired microemulsion was as follows. Required amount of lipid heated at 65oc in this 10mg of PA was dissolved. Heated SM and water was added to the above melted lipid mixture under stirring. The mixture was categorized as microemulsions if melt was appeared clear. Then mixture was considered as microemulsion. SOLID LIPID NANOPARTICLES PREPAR TION USING PROBE SONICATOR PA SLNs were prepared by hot lipid microemulsion technique. Drug loaded ME procedure was aforementioned in page No . 2mL of loaded ME was taken in a glass syringe using 22 gauge needle. Then it was added dropwise to a 3mL of cold de-ionized water under ice bath (2-4oc) and sonicated by probe sonicator for different time periods (5, 10, 15 min) specified by box behnken design at 200w amplitude to solidify the SLNs. The tip diameter of probe 8mm was dipped in liquid of 10mm leads to reflecting upwards and wave moving downwards. DRUG CONTENT (ASSAY) DETERMINATION 1 mL of solid dispersion from the formulations selected for evaluation was transferred into 10mL volumetric flask and diluted up to the mark with methanol. Then the solution was subjected to ultracentrifugation for 15 min at 10,000 rpm. Then the supernatant was aspirated, filtered, suitably diluted and measured the absorbance at ÃŽ »max 243nm. The results given in Table HR TEM The surface morphology of prepared SLNs like particle size, particle shape and aggregation were analyzed by HRTEM operating at 120kv voltage. The samples were diluted properly, stained by 2% phosphotungistic acid. A drop of aqueous dispersion was placed /mounted on carbon coated 400mesh copper grids which is to be allowed for 5 min to dry the nanoparticles on grid before examination under IR lamp/AIR DRY and TEM images were recorded with mangnification range from 11500-50000x. PARTICLE POTENTIAL, SIZE AND POLYDISPERSITY INDEX(PI) For the prepared SLNs the mean particle size, zeta potential and PI were performed by dynamic light scattering (DLS) with a zetasizer Nano – ZS90 (Malvern application center, banglore), model ZEN 3690 and equipped with 4mW, 633nm He-Ne laser. The measurements were made at the following conditions: Refractive index of medium: 1.330 Dielectric constant value: 78.5 Viscosity of dispersion medium: 0.8872 Temperature: 250c Then the samples (100Â µl) were diluted to 1mL with de-ionized water to prevent multi scattering and transferred in to a disposable zeta cuvettes to record the particle size. The size measurement angle was 900. The PI value was used to determine particle size distribution. The same instrument was used for the determination of zeta potential using an laser Doppler electrophoresis technique. Zeta potential value was calculated from the mean mobility of electrophoresis values by henry equation. The measurements were done in triplicate. ENTRAMENT EFFICIENCY % EE of the PA was studied by determining the unentrapped drug concentration in supernatant layer(aqueous layer). Accurately measured 5ml of (equivalent to 10mg of PA) nanoparticle dispersion was transferred to eppendorf centrifuge tubes and centrifuged at 15000 rpm for 30 min at -3oc using ultra cooling centrifuge. Then the supernatant was separated, diluted appropriately using SNES and filtered using 0.45 Â µm membrane filter. The filtered samples were estimated by using UV spectrophotometer at ÃŽ »max 240nm against blank. Encapsulation efficiency was determined using the equation. % EE = Quantity of drug added – weight of drug in aqueous phase/ mass of drug added x 100 INVITRO DIFFUSION STUDIES Dialysis bag method was used to determine invitro diffusion release profile of PA and using a USP dissolution apparatus II. Before using dialysis membrane was soaked in SNES for 12 hours and the molecular cutoff of membrane was between 12000-14000. The following conditions were used to carry out diffusion studies. The run speed of paddle: 100 rpm Diffusion medium: SNES (pH 5.5) Volume of medium: 500mL Temperature: 37Â ±0.5oc Time intervals: The SLNs dispersion containing the 10mg/5mL(amount equivalent to one dose of drug) was transferred in dialysis bag and tied at both ends. Then the it was suspended in the receptor compartment containing SNES pH 5.5. An aliquot of 5ml samples were removed at fixed time points from receptor medium. The same volume of fresh buffer was replaced after every time point to maintain constant buffer volume. The fresh buffer was also maintained at the same temperature(37Â ±0.5oc ) similar to sample. The PA concentration was estimated using UV-Visible spectrophotometer at 240nm against blank (SNES). The final optimized sample concentration was further determined by HPLC. The selected formulation results data were shown in Table and graphical representation in figure RELEASE KINETICS The release mechanism of drug from solid lipid nanoparticles were analyzed and determined by fitting the invitro release data to different kinetic models includes Zero, first order, higuchi and peppas-korsemayer. References UV-VISIBLE E.G.C. Clarke, Isolation and Identifeation of Drugs, volume 1 , The Pharmaceutical Press, London, 1978, p. 270

Saturday, July 20, 2019

Before The Law :: Short Story Stories Essays

Before The Law BEFORE THE LAW stands a doorkeeper. To this doorkeeper there comes a man from the country and prays for admittance to the Law. But the doorkeeper says that he cannot grant admittance at the moment. The man thinks it over and then asks if he will be allowed in later. "It is possible," says the doorkeeper, "but not at the moment." Since the gate stands open, as usual, and the doorkeeper steps to one side, the man stoops to peer through the gateway into the interior. Observing that, the doorkeeper laughs and says: "If you are so drawn to it, 'just try to go in despite my veto. But take note: I am powerful. And I am only the least of the doorkeepers. From hall to hall there is one doorkeeper after another, each more powerful than the last. The third doorkeeper is already so terrible that even I cannot bear to look at him." These are difficulties the man from the country has not expected; the Law, he thinks, should surely be accessible at all times and to everyone, but as he now takes a c loser look at the doorkeeper in his fur coat, with his big sharp nose and long, thin, black Tartar beard, he decides that it is better to wait until he gets permission to enter. The doorkeeper gives him a stool and lets him sit down at one side of the door. There he sits for days and years. He makes many attempts to be admitted, and wearies the doorkeeper by his importunity. The doorkeeper frequently has little interviews with him, asking him questions about his home and many other things, but the questions are put indifferently, as great lords put them, and always finish with the statement that he cannot be let in yet. The man, who has furnished himself with many things for his journey, sacrifices all he has, however valuable, to bribe the doorkeeper. The doorkeeper accepts everything, but always with the remark: "I am only taking it to keep you from thinking you have omitted anything." During these many years the man fixes his attention almost continuously on the doorkeeper. He forgets the other doorkeepers, and this first one seems to him the sole obstacle preventing access to the Law. He curses his bad luck, in his early years boldly and loudly; later, as he grows old, he only grumbles to himself.

Friday, July 19, 2019

Explore the ways in which two or three of these poems present the :: English Literature

Explore the ways in which two or three of these poems present the experience of living between two cultures and the difficulties it causes. The two poems I am choosing are "Presents from my Aunts in Pakistan" and "Search for My Tongue". "Presents from my Aunts in Pakistan" is written by Moniza Alvi, a woman who was born in Pakistan but moved to England at an early age. Her mother was from England and white, her Father was Pakistani and so black. This makes Moniza 'half-caste', as well as the aunts in poem being from her father's side. Her poem begins with a description of the gifts her aunts send her; "They sent me a salwar kameez peacock-blue, and another glistening like an orange split openà ¢Ã¢â€š ¬Ã‚ ¦" The gifts are clothes in the typical Pakistani style, long tunic and loose trousers of blue and orange. Yet her indisposition towards the clothes is hinted at by her description of the first set of clothes. Peacock blue suggests that she feels like a peacock in them, showing off and flamboyant, something she doesn't want to be. They make her uncomfortable and self conscious. The next set of clothes show us the passage of time for Alvi with more clothes from her aunts. Yet as in England, and as she puts it, school, fashions change. The salwar bottoms are now broad and stiff then narrow towards the bottom. She tries on the clothes in sitting room, unwrapping them with her parents. She tries each one on and feels alien, as she puts is, to them. She doesn't' full reject them, but they are too exotic for her, too lovely for her. She acknowledges that they are pretty and acceptable clothes, but she cannot feel at ease in them. She longs for 'normal' clothes; "I longed for and corduroy." The clothes to her are a costume, something for other times, not now, "My costume clung to me and I was aflame, I couldn't rise out of this fire, half English, unlike Aunt Jamila." The clothes she is wearing are no doubt brightly coloured, perhaps like the orange ones from before. They seem like flames to her, and to others she presumes. They are too exotic, too foreign, and they draw too much attention. She cannot rise out of their flames; she cannot be seen through them. When people look at her wearing those, they will see the clothes, not a person. The clothes identify her as Pakistani, not English. That would be alright if she was sure of her own background, but she is not. By wearing those clothes her balance of ethnicity is thrown wildly askew. Explore the ways in which two or three of these poems present the :: English Literature Explore the ways in which two or three of these poems present the experience of living between two cultures and the difficulties it causes. The two poems I am choosing are "Presents from my Aunts in Pakistan" and "Search for My Tongue". "Presents from my Aunts in Pakistan" is written by Moniza Alvi, a woman who was born in Pakistan but moved to England at an early age. Her mother was from England and white, her Father was Pakistani and so black. This makes Moniza 'half-caste', as well as the aunts in poem being from her father's side. Her poem begins with a description of the gifts her aunts send her; "They sent me a salwar kameez peacock-blue, and another glistening like an orange split openà ¢Ã¢â€š ¬Ã‚ ¦" The gifts are clothes in the typical Pakistani style, long tunic and loose trousers of blue and orange. Yet her indisposition towards the clothes is hinted at by her description of the first set of clothes. Peacock blue suggests that she feels like a peacock in them, showing off and flamboyant, something she doesn't want to be. They make her uncomfortable and self conscious. The next set of clothes show us the passage of time for Alvi with more clothes from her aunts. Yet as in England, and as she puts it, school, fashions change. The salwar bottoms are now broad and stiff then narrow towards the bottom. She tries on the clothes in sitting room, unwrapping them with her parents. She tries each one on and feels alien, as she puts is, to them. She doesn't' full reject them, but they are too exotic for her, too lovely for her. She acknowledges that they are pretty and acceptable clothes, but she cannot feel at ease in them. She longs for 'normal' clothes; "I longed for and corduroy." The clothes to her are a costume, something for other times, not now, "My costume clung to me and I was aflame, I couldn't rise out of this fire, half English, unlike Aunt Jamila." The clothes she is wearing are no doubt brightly coloured, perhaps like the orange ones from before. They seem like flames to her, and to others she presumes. They are too exotic, too foreign, and they draw too much attention. She cannot rise out of their flames; she cannot be seen through them. When people look at her wearing those, they will see the clothes, not a person. The clothes identify her as Pakistani, not English. That would be alright if she was sure of her own background, but she is not. By wearing those clothes her balance of ethnicity is thrown wildly askew.

Thursday, July 18, 2019

Marijuana Legalization Essay examples -- Marijuana Law Reform, 2015

In the U.S. today, the use of recreational drugs and legislation concerning them revolves heavily around the most used illegal substance, marijuana. Marijuana is also known as cannabis, as well as a slew of other names, as it is derived from one of the three Cannabis plants: Cannabis sativa, Cannabis indica, and Cannabis ruderalis. Cannabis’ popularity can largely be accredited to its THC (tetrahydrocannabinol) content. THC is the main psychoactive component found in cannabis that produces the â€Å"high† that marijuana users may experience. The drug is most commonly rolled into a â€Å"joint†, or weed cigarette, and smoked. While weed may provide its users a feeling a euphoria, it gives lawmakers headaches as it presents several social and legal difficulties. In the United States, laws regarding marijuana vary from state to state, but the drug is generally illegal throughout the country. Decriminalization in many states allows for freer cannabis consumption, and medical marijuana allows for patients to intake prescribed drugs without any issue. With the relative availability for marijuana despite its legal standing, obvious social constraints are placed upon members of society. Cannabis has long been used as a medicinal agent. The first uses of medical marijuana can be traced to the Chinese emperor Shen Neng, and this practice dates as far back as 2700 B.C.. The use of medical marijuana has spread from China to India, to ancient Rome, and then through Asia, Europe, and Africa. The plant was used to treat any number of ailments, including â€Å"gout, malaria, beriberi, rheumatism, and, curiously, poor memory† (Understanding Marijuana 11). Marijuana was also used as a painkiller, an anesthetic, and even as a cure for flatulence. Today, the ... ...om/time/nation/article/0,8599,1912113,00.html>. Nakaya, Andrea C. Marijuana. San Diego, CA: ReferencePoint, 2007. Print. "National Institute on Drug Abuse - The Science of Drug Abuse and Addiction." Web. 30 Sept. 2011. . "Proposition 19." Voter Information Guide November 2, 2010 | California Secretary of State. Web. 30 Sept. 2011. . Robison, Jennifer. "Decades of Drug Use: Data From the '60s and '70s." Gallup.Com - Daily News, Polls, Public Opinion on Government, Politics, Economics, Management. 2 July 2002. Web. 30 Sept. 2011. . "VOTES FOR AND AGAINST NOVEMBER 2, 2010, STATEWIDE BALLOT MEASURES." Web. 30 Sept. 2011. . Marijuana Legalization Essay examples -- Marijuana Law Reform, 2015 In the U.S. today, the use of recreational drugs and legislation concerning them revolves heavily around the most used illegal substance, marijuana. Marijuana is also known as cannabis, as well as a slew of other names, as it is derived from one of the three Cannabis plants: Cannabis sativa, Cannabis indica, and Cannabis ruderalis. Cannabis’ popularity can largely be accredited to its THC (tetrahydrocannabinol) content. THC is the main psychoactive component found in cannabis that produces the â€Å"high† that marijuana users may experience. The drug is most commonly rolled into a â€Å"joint†, or weed cigarette, and smoked. While weed may provide its users a feeling a euphoria, it gives lawmakers headaches as it presents several social and legal difficulties. In the United States, laws regarding marijuana vary from state to state, but the drug is generally illegal throughout the country. Decriminalization in many states allows for freer cannabis consumption, and medical marijuana allows for patients to intake prescribed drugs without any issue. With the relative availability for marijuana despite its legal standing, obvious social constraints are placed upon members of society. Cannabis has long been used as a medicinal agent. The first uses of medical marijuana can be traced to the Chinese emperor Shen Neng, and this practice dates as far back as 2700 B.C.. The use of medical marijuana has spread from China to India, to ancient Rome, and then through Asia, Europe, and Africa. The plant was used to treat any number of ailments, including â€Å"gout, malaria, beriberi, rheumatism, and, curiously, poor memory† (Understanding Marijuana 11). Marijuana was also used as a painkiller, an anesthetic, and even as a cure for flatulence. Today, the ... ...om/time/nation/article/0,8599,1912113,00.html>. Nakaya, Andrea C. Marijuana. San Diego, CA: ReferencePoint, 2007. Print. "National Institute on Drug Abuse - The Science of Drug Abuse and Addiction." Web. 30 Sept. 2011. . "Proposition 19." Voter Information Guide November 2, 2010 | California Secretary of State. Web. 30 Sept. 2011. . Robison, Jennifer. "Decades of Drug Use: Data From the '60s and '70s." Gallup.Com - Daily News, Polls, Public Opinion on Government, Politics, Economics, Management. 2 July 2002. Web. 30 Sept. 2011. . "VOTES FOR AND AGAINST NOVEMBER 2, 2010, STATEWIDE BALLOT MEASURES." Web. 30 Sept. 2011. .

Data mining

This is an accounting calculation, followed by the application of a threshold. However, predicting the profitability of a new customer would be data mining. Dividing the customers off company according to their profitability. Yes, this is a data mining task because it requires data analysis to determine who the costumers are that brings more business to the company. Computing the total sales of the company. No, this is not a data mining task because there Is not analysis involve, this information can be pull out of any booking program. Sorting a student database based on student ID numbers.No, this Is not a data milling activity because sorting by ID numbers doesn't Involved any data mining task. This is a simple database query Predicting the future stock price of a company using historical records. Yes. We would attempt to create a model that can predict the continuous value of the stock price. This is an example of the area of data mining known as predictive modeling. We could use regression for this modeling, although researchers in many fields have developed a wide variety of techniques for predicting time series. Monitoring the heart rate of a patient for abnormalities. Yes.We would build a model of the normal behavior of heart rate and raise an alarm when an unusual heart behavior occurred. This would involve the area of data mining known as anomaly detection. This could also be considered as a classification problem If we had examples of both normal and abnormal heart behavior. For each of the following, identify the relevant data mining task(s): The Boston Celtic would like to approximate how many points their next opponent will score against them. A military intelligence officer is interested in learning about the captives proportions of Sunnis and Shies in a particular strategic region. A NORA defense computer must decide immediately whether a blip on the radar is a flick of geese or an incoming nuclear missile. A political strategist is seeking the b est groups to canvass for donations in particular county. A homeland security official would like to determine whether a certain sequence of financial and residence moves implies a tendency to terrorist acts. A Wall Street analyst has been asked to find out the expected change in stock price for a set of companies with similar price/earnings ratios.Question 3 For each of the following meetings, explain which phase in the CRISP-DIM process is represented: Managers want to know by next week whether deployment will take place. Therefore, analysts meet to discuss how useful and accurate their model is. This is the Evaluation phase in the CRISP-DIM process. In the evaluation phase the data mining analysts determine if the model and technique used meets business objectives established in the first phase. The data mining project manager meets with data warehousing manager to discuss how the data will be collected. This is theData Understanding phase in the CRISP-DIM process. The data wareh ouse is identified as a resource during the Business Understanding phase; however the actual data collection takes place during the Data Understanding Phase. In this phase data is collected and accessed from the resources listed and identified in the Business Understanding phase. The data mining consultant meets with the vice president for marketing, who says that he would like to move forward with customer relationship management. The main objective of business is to review during the Business Understanding Phase.So, therefore after the meeting it seems the data mining consultant gained success in convincing UP of marketing to provide approval for performing data mining on the customer relationship management system. The data mining project manager meets with the production line supervisor to discuss implementation of changes and improvements. The discussion of implementation of changes and improvements in the project whether specific improvements or process changes are required to ensure that all important aspects of the business are accounted is performed under the Evaluation Phase.The meeting held with business objective to collect and cleanse the data to ensure the quality of data. The analysts meet to discuss whether the neural network or decision tree model should be applied Question 4 [10 points] Describe the possible negative effects of proceeding directly to mine data that has not been preprocessed. Before data mining algorithms can be used, a target data set must be assembled. As data mining can only uncover patterns actually present in the data, the target data set must be large enough to contain these patterns while imagining concise enough to be mined within an acceptable time limit.A common source for data is a data mart or data warehouse. Pre-processing is essential to analyze the multivariate data sets before data mining. The target set is then cleaned. Data. Question 5 [1 5 points] Which of the three methods for handling missing values do you prefer? Which method is the most conservative and probably the safest, meaning that it fabricates the least amount of data? What are some drawbacks to this method? Methods for replacing missing field values with: User defined constants Means or modesRandom draws from the distribution of the variable Question 6 Describe the differences between the training set, test set, and validation set. The training set is used to build the model. This contains a set of data that has fricasseed target and predictor variables. Typically a hold-out dataset or test set is used to evaluate how well the model does with data outside the training set. The test set contains the fricasseed results data but they are not used when the test set data is run through the model until the end, when the fricasseed data are compared against the model results.The model is adjusted to minimize error on the test set. Another hold-out dataset or validation set is used to evaluate the adjusted model in step #2 where, a gain, the validation set data is run against the adjusted model and results compared to the unused fricasseed data. The training set (seen data) to build the model (determine its parameters) and the test set (unseen data) to measure its performance (holding the parameters constant). Sometimes, we also need a validation set to tune the model (e. G. , for pruning a decision tree). The validation set can't be used for testing (as it's not unseen). Data mining This is an accounting calculation, followed by the application of a threshold. However, predicting the profitability of a new customer would be data mining. Dividing the customers off company according to their profitability. Yes, this is a data mining task because it requires data analysis to determine who the costumers are that brings more business to the company. Computing the total sales of the company. No, this is not a data mining task because there Is not analysis involve, this information can be pull out of any booking program. Sorting a student database based on student ID numbers.No, this Is not a data milling activity because sorting by ID numbers doesn't Involved any data mining task. This is a simple database query Predicting the future stock price of a company using historical records. Yes. We would attempt to create a model that can predict the continuous value of the stock price. This is an example of the area of data mining known as predictive modeling. We could use regression for this modeling, although researchers in many fields have developed a wide variety of techniques for predicting time series. Monitoring the heart rate of a patient for abnormalities. Yes.We would build a model of the normal behavior of heart rate and raise an alarm when an unusual heart behavior occurred. This would involve the area of data mining known as anomaly detection. This could also be considered as a classification problem If we had examples of both normal and abnormal heart behavior. For each of the following, identify the relevant data mining task(s): The Boston Celtic would like to approximate how many points their next opponent will score against them. A military intelligence officer is interested in learning about the captives proportions of Sunnis and Shies in a particular strategic region. A NORA defense computer must decide immediately whether a blip on the radar is a flick of geese or an incoming nuclear missile. A political strategist is seeking the b est groups to canvass for donations in particular county. A homeland security official would like to determine whether a certain sequence of financial and residence moves implies a tendency to terrorist acts. A Wall Street analyst has been asked to find out the expected change in stock price for a set of companies with similar price/earnings ratios.Question 3 For each of the following meetings, explain which phase in the CRISP-DIM process is represented: Managers want to know by next week whether deployment will take place. Therefore, analysts meet to discuss how useful and accurate their model is. This is the Evaluation phase in the CRISP-DIM process. In the evaluation phase the data mining analysts determine if the model and technique used meets business objectives established in the first phase. The data mining project manager meets with data warehousing manager to discuss how the data will be collected. This is theData Understanding phase in the CRISP-DIM process. The data wareh ouse is identified as a resource during the Business Understanding phase; however the actual data collection takes place during the Data Understanding Phase. In this phase data is collected and accessed from the resources listed and identified in the Business Understanding phase. The data mining consultant meets with the vice president for marketing, who says that he would like to move forward with customer relationship management. The main objective of business is to review during the Business Understanding Phase.So, therefore after the meeting it seems the data mining consultant gained success in convincing UP of marketing to provide approval for performing data mining on the customer relationship management system. The data mining project manager meets with the production line supervisor to discuss implementation of changes and improvements. The discussion of implementation of changes and improvements in the project whether specific improvements or process changes are required to ensure that all important aspects of the business are accounted is performed under the Evaluation Phase.The meeting held with business objective to collect and cleanse the data to ensure the quality of data. The analysts meet to discuss whether the neural network or decision tree model should be applied Question 4 [10 points] Describe the possible negative effects of proceeding directly to mine data that has not been preprocessed. Before data mining algorithms can be used, a target data set must be assembled. As data mining can only uncover patterns actually present in the data, the target data set must be large enough to contain these patterns while imagining concise enough to be mined within an acceptable time limit.A common source for data is a data mart or data warehouse. Pre-processing is essential to analyze the multivariate data sets before data mining. The target set is then cleaned. Data. Question 5 [1 5 points] Which of the three methods for handling missing values do you prefer? Which method is the most conservative and probably the safest, meaning that it fabricates the least amount of data? What are some drawbacks to this method? Methods for replacing missing field values with: User defined constants Means or modesRandom draws from the distribution of the variable Question 6 Describe the differences between the training set, test set, and validation set. The training set is used to build the model. This contains a set of data that has fricasseed target and predictor variables. Typically a hold-out dataset or test set is used to evaluate how well the model does with data outside the training set. The test set contains the fricasseed results data but they are not used when the test set data is run through the model until the end, when the fricasseed data are compared against the model results.The model is adjusted to minimize error on the test set. Another hold-out dataset or validation set is used to evaluate the adjusted model in step #2 where, a gain, the validation set data is run against the adjusted model and results compared to the unused fricasseed data. The training set (seen data) to build the model (determine its parameters) and the test set (unseen data) to measure its performance (holding the parameters constant). Sometimes, we also need a validation set to tune the model (e. G. , for pruning a decision tree). The validation set can't be used for testing (as it's not unseen). Data Mining Determine the benefits of data mining to the businesses when employing 1. Predictive analytics to understand the behavior of customers Predictive analytics is business intelligence technology that produces a predictive score for each customer or other organizational element. Assigning these predictive scores is the job of a predictive model, which has, in turn been trained over your data, learning from the experience of your organization. Predictive analytics optimizes marketing campaigns and website behavior to increase customer responses, conversions and clicks, and to decrease churn. Each customer's predictive score informs actions to be taken with that customer. 1. Associations discovery in products sold to customers The way in which companies interact with their customers has changed dramatically over the past few years. A customer's continuing business is no longer guaranteed. As a result, companies have found that they need to understand their customers better, and to quickly respond to their wants and needs. In addition, the time frame in which these responses need to be made has been shrinking. It is no longer possible to wait until the signs of customer dissatisfaction are obvious before action must be taken. To succeed, companies must be proactive and anticipate what a customer desires. For an example in the old days, the storekeepers would simply keep track of all of their customers in their heads, and would know what to do when a customer walked into the store. Today’ store associates face a much more complex situation, more customers, more products, more competitors, and less time to react means that understanding your customers is now much harder to do. A number of forces are working together to increase the complexity of customer relationships, such as compressed marketing cycles, increased marketing costs, and a stream of new product offers. There are many kinds of models, such as linear formulas and business rules. And, for each kind of model, there are all the weights or rules or other mechanics that determine precisely how the predictors are combined. In fact, there are so many choices, it is literally impossible for a person to try them all and find the best one. Predictive analytics is data mining technology that uses the company’s customer data to automatically build a predictive model specialized for the business. This process learns from the organization's collective experience by leveraging the existing logs of customer purchases, behavior and demographics. The wisdom gained is encoded as the predictive model itself. Predictive modeling software has computer science at its core, undertaking a mixture of number crunching, trial, and error. 2. Web mining to discover business intelligence from Web customers The fast business growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to prefer from a number of alternatives, the business community has realized the essential of intelligent marketing strategies and relationship management. Web servers record and accumulate data about user relations whenever requirements for resources are received. Analy zing the Web access logs can help understand the user behavior and the web structure. From the business and applications point of view, knowledge obtained from the web usage patterns could be directly applied to efficiently manage activities correlated to e-business, e-services and e-education. Accurate web usage information could help to attract new customers, retain current customers, improve cross marketing/sales, effectiveness of promotional campaigns, tracking leaving customers etc. The usage information can be exploited to improve the performance of Web servers by developing proper perfecting and caching strategies so as to decrease the server response time. User profiles could be built by combining users? navigation paths with other data features, such as page viewing time, hyperlink structure, and page content†, according to Sonal Tiwari. 3. Clustering to find related customer information Clustering is a typical unsupervised learning technique for grouping similar data points. A clustering algorithm assigns a large number of data points to a smaller number of groups such that data points in the same group share the same properties while, in different groups, they are dissimilar. Clustering has many applications, including part family formation for group technology, image segmentation, information retrieval, web pages grouping, market segmentation, and scientific and engineering analysis. Many clustering methods have been proposed and they can be broadly classified into four categories such as partitioning methods, hierarchical methods, density-based methods and grid-based methods. Customer clustering is the most important data mining methodologies used in marketing and customer relationship management (CRM). Customer clustering would use customer-purchase transaction data to track buying behavior and create strategic business initiatives. Companies want to keep high-profit, high-value, and low-risk customers. This cluster typically represents the 10 to 20 percent of customers who create 50 to 80 percent of a company's profits. A company would not want to lose these customers, and the strategic initiative for the segment is obviously retention. A low-profit, high-value, and low-risk customer segment is also an attractive one, and the obvious goal here would be to increase profitability for this segment. Cross-selling (selling new products) and up-selling (selling more of what customers currently buy) to this segment are the marketing initiatives of choice. Assess the reliability of the data mining algorithms. Decide if they can be trusted and predict the errors they are likely to produce. Most methods for validating a data-mining model do not answer business questions directly, but provide the metrics that can be used to guide a business or development decision. There is no comprehensive rule that can tell you when a model is good enough, or when you have enough data. Accuracy is a measure of how well the model correlates an outcome with the attributes in the data that has been provided. There are various measures of accuracy, but all measures of accuracy are dependent on the data that is used. In reality, values might be missing or approximate, or the data might have been changed by multiple processes. Particularly in the phase of exploration and development, you might decide to accept a certain amount of error in the data, especially if the data is fairly uniform in its characteristics. For example, a model that predicts sales for a particular store based on past sales can be strongly correlated and very accurate, even if that store consistently used the wrong accounting method. Therefore, measurements of accuracy must be balanced by assessments of reliability. Reliability assesses the way that a data-mining model performs on different data sets. A data-mining model is reliable if it generates the same type of predictions or finds the same general kinds of patterns egardless of the test data that is supplied. For example, the model that you would use to generate for the store that used the wrong accounting method would not generalize well to other stores, and therefore would not be reliable. Analyze privacy concerns raised by the collection of personal data for mining purposes. 1. Choose and describe three (3) concerns raised by consumers. Recent surveys on privacy show a great concern about the use of personal data for purposes other than the one for which data has been collected. The handling of misinformation can cause serious and long-term damage, so individuals should be able challenge the correctness of data about themselves, such as personal records. The last concern is granulated access to personal information, such as personal information about someone’s health when applying for a job. 2. Decide if each of these concerns is valid and explain your decision for each. These concerns are valid, the first concerned mentioned caused an extreme case to occurred in 1989, collecting over $16 million USD by selling the driver-license data from 19. million Californian residents, the Department of Motor Vehicles in California revised its data selling policy after Robert Brado used their services to obtain the address of actress Rebecca Schaeffer and later killed her in her apartment. While it is very unlikely that KDDM tools will reveal directly precise confidential data, the exploratory Knowledge Discovery and Data Mining (KDDM), tools may correlate or dis close confidential, sensitive facts about individuals resulting in a significant reduction of possibilities. The second concern is valid due to incident happening in Washington; Cablevision fired an employee James Russell Wiggings, on the basis of information obtained from Equifax, Atlanta, about Wiggings' conviction for cocaine possession; the information was actually about James Ray Wiggings, and the case ended up in court. This illustrates a serious issue in defining property of the data containing personal records. The third issue is For example, employers are obliged to perform a background check when hiring a worker but it is widely accepted that information about diet and exercise habits should not affect hiring decisions. . Describe how each concern is being allayed. KDDM revitalizes some issues and possess new threats to privacy. Some of these can be directly attributed to the fact that this powerful technique may enable the correlation of separate data sets in other to significantly reduce the possible values of private information. Other can be more attributed to the interpretati on, application and actions taken from the inferences obtain with the tools. While this raises concerns, there is a body of knowledge in the field of statistical databases that could potentially be extended and adapted to develop new techniques to balance the rights to privacy and the needs for knowledge and analysis of large volumes of information. Some of these new privacy protection methods are emerging as the application of KDD tools moves to more controversial datasets. Provide at least three (3) examples where businesses have used predictive analysis to gain a competitive advantage and evaluate the effectiveness of each business’s strategy. The first advantage analysis helps when it comes to validity of a product by making a distinction between the positioning of a product and its ability to satisfy customer requirements. Another important attributes include ease of use, innovation, how well the product integrates with other technologies that customers need. The second advantage is the technology provides to customers. Even if a product is well designed, it must be able to help businesses achieve their business goals. Goals range from gaining insight about customers in order to be more competitive, to using the technology to increase revenue. A key attribute that is measured in this dimension is how well the product supports companies in meeting their objectives. The third advantage is the strength of the company’s strategy. It is not enough to simply have a good vision; a company must also have a well-designed road map that can support this vision. Vision attributes also include more tactical aspects of the company’s strategy such as a technology platform that can scale, well-articulated messaging, and positioning. A key component of this dimension is clarity: it must be clear what business problem the company is solving for which customer.ReferencesAlexander, D. (2012). Data Mining. Retrieved from: http://www.laits.utexas.edu/~anorman/BUS.FOR/course.mat/Alex/#8Josh, K. (2012). Analysis of Data Mining Algorithms. Retrieved from: http://www-users.cs.umn.edu/~desikan/research/dataminingoverview.html Exforsys. (2006). Execution for System: Connection between Data Mining and Customer Interaction. Retrieved from: http://www.exforsys.com/tutorials/data-mining/the-connection-between-data-mining-and-customer-interaction.html Frand, J. (1996). Data Mining: What is Data Mining? Retrieved from: http://www.anderson.ucla.edu/faculty/jason.frand/teacher/technologies/palace/index.htm Pupo, E. (2010). HIMSS News: Privacy and Security Concerns in Data Mining. Retrieved from: http://www.himss.org/ASP/ContentRedirector.asp?type=HIMSSNewsItem&ContentId=73526 Stein, J. (2011). Data Mining: How Companies Now Know Everything About You. Retrieved from: http://www.time.com/time/magazine/article/0,9171,2058205,00.html#ixzz25MwYNhuh

Wednesday, July 17, 2019

Poem Comparing Essay

Good flush Mr. Georges and fellow classmates, I have re marinerched some 2 poesys and made a parity between the cardinal. Im here(predicate) today to piffle to you roughly them and hear what you return at the end of the speech. The deuce songs I reoceanrched were (on the ocean, essayd John Keats) and ( sea fever, former John Masefield). as you dismiss go for from the title of the verses that they be bot intimately the sea further dont be conf utilise, theyre both completely divers(prenominal) stories.Both of these poems talk ab expose the sea, they argon both referring to the sea as a military personnel and identifying it in a human characteristic kind of counsel. As we skunk see along the praise (on the sea), the author uses terms as uproar rude, mighty swell, caverns, and vexed, desolate shores. He a alike mentions The Greco-Roman goddess Hecate associated with magic and the fantastical. This is referring to the sea and how ruthless it send word be.Thi s poem deals with temper, focusing on its insupportable and violent side. This poem also reflects on human actions. The poem is equivalence the nature with the human being, because we can also lay out wild and violent. It seems a criticism of the delirium of the human being -above all when reinforcement and working in big cities. So the author may be trading our attention the speaker of the poem addresses to us (Oh ye) -And giving us a adult male of advice- not to underestimate nature.John Masefields poem Sea Fever is a work of art that brings beauty to the side vocabulary through its use of rhythm, imaging and many complex figures of speech. The imagination in Sea Fever suggests an audacious ocean that appeals to all five senses. Along with an adventurous ocean, Sea Fever also sets a mood of freedom through imagery of traveling gypsies.These poems both use a cadenced tone in their stanzas. In the sonnet sea fever arguments 3 and four, it uses rhythmic language, these var.s say And the wheels kick and the sprains phone call and the white sails shaking, And a grey mist on the seas face, and a grey finish off breaking These are just two declines in the poem but if you in reality read the poem you can see examples of rhyme end-to-end the completely poem.In the sonnet On the sea examples of rhythmic language can be ready in the lines 4 and 5, these lines say Of Hecate leaves them their aged shadowy sound, Often tis in such(prenominal) gentle temper found and as in the first sonnet, this sonnet also has rhythmic language throughout the whole poem.These poems also have their differences they each talk about the sea but in a dissimilar perception. The sonnet, (on the sea), talks about the sea and how angry it can be, it is comparing the sea with human actions and is warning the earthly concern to be careful of the nature. It talks about the Greco-Roman goddess Hecate associated with magic and the wild. I oddment if the author is referring to something that happened to his life that made him so angry to write this poem, what do you think it could be?The Author uses language techniques like Personification, Capitalisation and rhyme. He personifies the Sea in line 5 by express it has a gentle temper. The author uses capitalisation for the word Sea which makes me believe that he was trying to make the subject of the poem a human. He uses Rhyme throughout the whole poem and it does make the poem seem more interesting to read.The sonnet (sea fever) is completely opposite to the sonnet (on the sea) because sea fever talks about the sea but it talks about a bluejacket and how he just cant wait to get on a ship and sail into the sea. This poem talks about a sailor who is very excited to go out to sea, he wants adventure, and he wants a wild journey into the ocean living the vagabond gypsy life. The author refers to the sea as a home to this sailor unlike the sonnet (on the sea) which refers to the sea as a wild, dangerous and ruthless place.The author uses language techniques like Metaphors, emotive language and Repetition. Examples of Metaphors used in this poem are (sea and the sky) line 1, (star to steer) line 2, (and gulls way and the whales way where the winds like a whetted knife) line 10. Examples of Emotive language used in this poem are (to the lonely sea and the sky) line 1 (and the sea gulls crying) line 8. An example of repletion is that he starts each stanza with the sentence (I must go down(p) to the seas again).So in conclusion these poems are similar but different in many ways, and like me and you each of them has their ups and downs. They both talk about the sea but each in a different perception. Thanks for listening to my speech and I hope you gained a little data from me today.