Monday, September 30, 2019

Constructivist Approach to Grammer Teaching

? A ‘’Constructivist Approach’’ in grammar teaching helps inexperienced teachers understand the learning and teaching of aspect,a core grammatical concept. ?   The Constructivists’ approach to grammar involves teaching grammar in context. This simply means that grammar is taught using the students’ own writing as models. ? The constructivists’ approach helps students understand that evaluating grammar in their writing is a part of the revision process. Instructors using the constructivist’s approach teach grammar using one or a combination of the following methods: Mini-lessons Grammar journals One-on-one conferences Peer group activities MINI-LESSONS ? Mini-lessons are â€Å"teaching moments† inspired by student work. They are designed to be brief . (5-10 minutes) ? They address student writing needs in context as they arise. This technique provides students with additional opportunities to discuss their own writing as well as the writing of their peers. GRAMMaR JOURNALS ? A Grammar Journal is a notebook in which students keep records of sentences they have written that contain grammatical errors. ? Sentences are obtained from student work submitted to instructors. (Teachers can guide students to these errors without correcting them by placing a dot in the margin where the error occurs. ) After identifying the errors themselves, students then copy problematic sentences in their journals and rewrite the sentences, making alternative stylistic choices to improve each sentence. ? To take full advantage of their choices, students can rewrite their improved sentences several different ways. ? Students who do not have significant grammar problems can use the Grammar Journals to recognize their range of stylistic choices. ONE-ON-ONE CONFERENCES ? During one-on-one conferences, instructors may require students to bring their Grammar Journals They discuss some of the editing choices they have made in their editing journals and to monitor students’ progress in identifying and correcting grammatical errors identified as problematic in their work. ? PEER GROUPSMini-lessons can often be used as a group activity. ? The group activity provides students with the opportunity to â€Å"talk out† the rationale for the grammatical choices they have made. ? . This strategy is successful because students engage in dialogue with their peers about their writing ? This approach reinforces the concept of learning communities.

Observation of Mitosis

Observation of Mitosis Introduction: Reproduction is the biological process by which new individual organisms are produced. There are two types of reproduction, which are; asexual and sexual reproduction. Asexual reproduction is creation of offspring whose genes all come from one parent. Sexual reproduction is creation of offspring by fusion of male gametes (sperm) and female gametes (eggs) to form zygotes. Asexual reproduction involves a type of cell division known as mitosis. Mitosis is the scientific term for nuclear cell division, where the  nucleus  of the cell divides, resulting in two sets of identical  chromosomes.Mitosis is accompanied by  cytokinesis  in which the end result is two completely separate cells called daughter cells. There are four phases of mitosis: prophase,  metaphase, anaphase and telophase. The active sites of cell division in plants are known as meristems and they are convenient source of mitotic cells for observation under the light microscop e. In this experiment two different methods had been used. One of the methods that have been used was; Feulgen Reaction, root tips have been fixed and stained using this reaction.This histochemical method is specific for DNA which is stained deep red-purple. Aim: Investigate the stages of mitosis under light microscope. Method 1: Preparation of Root Squash and Observation of Mitosis in Garlic Root Meristems Firstly, one root tip was taken from a container by using a pipette. This root tip was putted on a slide and a drop of 80% glycerol was added, than a coverslip applied. After coverslip was applied, slide was covered with a sheet of blotting paper and squashed gently.Lastly this sample was observed under light microscope both with low power and high power objective. Method 2: Observation of Mitosis in Allium SP. Root Meristems Slides of Allium sp. Root tip squashes was prepared and provided. These ready slides were observed under light microscope both low and high power objectives and stages of mitosis were drawn. Disscusion: Meiosis has many similarities to mitosis. However, there are major differences that it is essential to note. The table below shows the comparison of the stages of mitosis and meiosis. Stages| Meiosis| Mitosis|Interphase| – begins with a diploid cell| – begins with a diploid cell| Prophase| – four chromosomes combine to form two tetrads   – the chromosomes in the tetrad cross over each other, allowing them to exchange genetic material| -four chromatids combine to form two chromosomes linked by a centromere| Metaphase| – the two tetrads line up in the centre| – the two chromosomes line up in the centre| Anaphase| – the two tetrads split up into four chromosomes which go to both poles| – the two chromosomes split up into four chromatids which move to both of the poles| Telophase| – the two sets of chromosomes become enclosed by the nuclear envelope| – the two sets of c hromatids are enclosed by the nuclear envelope| Cytokinesis| – two cells are formed with two sets of chromosomes in each one| – Two cells are created with two chromatids in each one. – Mitosis is now complete. | Prophase II| – DNA replication is skipped and the two cell's nuclear envelope are dissolved and the spindle reformed   – the four chromatids in each cell are connected together to form two chromosomes| | Metaphase II| – the two chromosomes line up in the centre| | Anaphase II| – the two chromosomes are split up into their daughter chromatids and moved towards opposites poles| | Telophase II| –The nuclear envelope is reformed around the two poles on each cell. | Cytokenesis| – the cells are split up again and four haploid cells remain as a result   – meiosis is now complete| | The second table below shows the general difference between mitosis and meiosis. Mitosis| Meiosis| Produces body cells(Somatic c ells) cells for growth and repair| Produces sex cells(Gametes) cells for sexual reproduction| One nuclear division, separating chromatids| Two nuclear divisions, first separating homologous chromosomes and second separating chromatids| Two daughter cells produced| Four daughter cells produced| Chromosome number remains same| Chromosome number halved| No association between homologous chromosomes| Homologous chromosomes associate and form bivalents| No crossing over ccurs| Crossing over many occur at chiasmata| Chromosomes only form single row at equator at metaphase| At metaphase 1, chromosomes form double row at equator| Daughter cells genetically identical with each other and parent cell| Daughter cells differ genetically from each other and parent cell| Daughter cells have two sets of chromosomes(pairs)| Daughter cells have only one member of each pair of chromosomes| In metaphase chromosomes line up singly| In metaphase I chromosomes line up as homologous pairs (synapsis). The t wo double chromosomes are called a tetrad when they are lined| Comparison of the biological significance of mitosis and meiosis: * The Significance of MitosisThe significance of mitosis is its ability to produce daughter cells which are exactly the same as the parent cell. It is important for three reasons†¦   1. Growth If a tissue wants to get bigger by growth needs new cells that are identical to the existing ones. Cells division must therefore be by mitosis. 2. Repair Damaged cells have to be replaced by exact copies of the organism so that it repairs the tissues to their former condition. Mitosis is the means by which this is achieved. 3. Asexual reproduction If a species is good at colonizing a habitat, there might be no point, in producing offspring which are different from the parents, because they might be less effective at survival.Therefore it might be  better, in the short term,  to make a colony which is similar to the parents. In simple animals and most plant s this is achieved by mitotic division. * Significance of Meiosis The long term survival of a species depends on its ability to adapt to a changing environment. To do this the offspring need to be different from their parents and each other. These are three ways in which variety occurs because of meiosis. 1. Production and fusion of haploid gametes: The variety of offspring is increased by mixing the genotype of one parent with that of the other. It involves the production of special sex cells, called gametes, which fuse together to produce a new organism.Each gamete contains half the number of chromosomes of the adult. It is important that meiosis, which halves the number of chromosomes in daughter cells, happens at some stage in the life cycle of a sexually reproducing organism. Therefore Meiosis is important in order for variety in organisms, and allowing them to evolve. 2. The creation of genetic variety by the random distribution of chromosomes during metaphase 1. When the pair s of homologous chromosomes arrange themselves on the equator of the spindle during metaphase 1 of meiosis, they do it randomly. Even though each one of the pair determines the same general features, they’re detail of the feature is different.The randomness of this distribution and independent assortment of these chromosomes produces new genetic combinations. 3. The creation of genetic variety by crossing over between homologous chromosomes. During prophase 1 of meiosis, equal portions of homologous chromosomes may be swapped. In this way new genetic combinations are made and linked genes separated. The variety which meiosis brings vital for to the process of evolution. By providing a varied stock of individuals it allows the natural selection of those best suited to the existing conditions and makes sure that species constantly change and adapt when these conditions change. This is the main biological significance of meiosis. Gizem KARAGOZLU 19026857.

Saturday, September 28, 2019

Evaluate the roles of named players Essay

Managing future energy needs is certainly a global challenge that requires the cooperation of many named players both on a small and large scale. It has been estimated that global demand for primary energy is set to grow 55% by 2030 and that $22 trillion of new investment is need to meet future energy forecasts. The main player in providing future energy security can be argued to be OPEC as they control the production of over 2/3’s of the world’s supply of oil, therefore leading them be price makers in the industry. OPEC is considered to be the most important player in global energy provision, it currently consists of 12 members and was created in 1960 mainly to protect the interests of member countries and to stabilise oil prices for a regular supply to oil consuming countries. However, OPEC’s obligations have been controversial as they have been accused of holding back on production of oil and gas in order to drive up prices, therefore using the market mechanism of demand and supply to increase profits for member states. Currently it has been proven that collectively, OPEC has stored 900,000 million barrels of crude oil, they own 78% of global resources and have a combined market share of 45% for oil and 18% for gas. This inherently makes them the largest producer of fossil fuels in the world meaning they will have a large if not absolute say in future energy provision and energy security. The responsibility of oil distribution will then fall on OPEC when supply of oil runs low leading to a bidding system for allocation of oil to where demand and price is highest. Another large player involved in providing energy security for the future is multinational oil companies; they are involved in the exploration and extraction of oil as well as transporting and refining the oil to consumers meaning they, as well as OPEC control the prices directly to consumers. Most of the top 20 oil companies in 2005 were state owned with companies such as Saudi Aramco in Saudi Arabia and PDV in Venezuela, this could be beneficial for domestic industry as they may charge less, stimulating the economy with lower production costs. However, many of the largest oil companies are relatively free of direct political influence and are therefore driven by the market mechanism leading to higher prices, above production costs. An example of a petro chemical company that has a direct impact on us in the UK is Gazprom in Russia. It solely controls one third of the world’s gas reserves and accounts for more than 92% of Russia’s gas production, but more importantly it provides 25% of the EU’s natural gas as we are consistently becoming net importers. The security of the energy provision is open to risk as Europe’s fear is that Russia will be able to name its price for gas because Europe is predominately dependent on its supply. In addition, the reliability is further doubted since Russia temporarily shut off gas supply to Ukraine in 2006 and therefore the whole of Europe. Fossil fuels are of course a finite resource meaning they will one day deplete to such an extent that it will not be cost effective to extract and refine to sell. This insinuates that it is the combined role of governments and oil producing companies to innovate and invest in new technology to sustain increasing energy demands. International Governments is the last and one of the main players in providing future energy security. Governments have the option of allowing oil companies to further exploit their own environment in order to increase oil production such as the case with the province of Alberto. It is estimated up to 2. 5 trillion barrels of are held within the sedimentary oil-shale – more so than in Saudi Arabia. This may relieve pressure for rising energy demand in the US as Canada does in fact have a surplus of primary energy. It will also relieve the US from its dominant reliance on the unreliable Saudi Arabian oil reserves with growing political challenges and the threat of terrorism and piracy. However, environmentalists see the exploitation of oil-shale are sands as a disaster in the making, not only does it already have detrimental environmental scars but with current technology, huge amounts of energy are needed in heating the sands to extract the oil (every 3 barrels of oil produced requires 1 barrel to be burnt). Conversely, Governments may opt to incentives conservation of energy through fuel duties or green taxes and emission trading as it leads to industries investing in cleaner technology. In addition, investment in greener fuels such as renewable and nuclear energy is a way for governments to secure energy provision in the future as it can be sustainable and everlasting. In conclusion, each player has a unique role in providing future energy security either with price stability with OPEC, investment into greener technology with oil companies and correct management and legislation from governments to both the exploitation of their environment and their fiscal system in incentive taxation. All in all it depends on the magnitude of integration of all these ideas brought forward that will secure actual energy provision in the future and allow for a sustained and secure increase in consumption of energy.

Friday, September 27, 2019

Free writing Essay Example | Topics and Well Written Essays - 3250 words

Free writing - Essay Example Confusing the issue regarding the origin of the eyeglass, though, are reports in China of similar inventions coming to them earlier than the Italian invention. Spectacles may have introduced into China as early as the twelfth century, coming in from Malacca â€Å"in the Western Regions.† This date was derived by comparing the original documents and reviewing the probable date regarding when they were written given what is known about the life of the author. This also places spectacles in China at least a century earlier than had been determined based on readings of the Western texts, especially the texts coming out of Italy. (Chiu, 1936) As complex as the discussion regarding the invention of the eyeglass, certain developments in its evolution have been almost as hotly debated. Acknowledging that a large portion of the credit for this invention has been attributed to Benjamin Franklin, two other men probably played a large role in the creation and development of this specializ ed vision aid, Sir Joshua Reynolds and Benjamin West. Tracing through these letters, the author indicates that Franklin’s recipient had already been familiar with the idea prior to Franklin’s letter, further indicating an earlier invention. Other materials have also surfaced revolving around Benjamin West that indicated he, as well as several painters and other artists, were accustomed to wearing divided glasses for many years prior to the man’s death in 1820. However, it is unknown whether these ‘many years’ predated or postdated Franklin’s use of bifocals. However, the man that created West’s bifocals knew of other artists, particularly Sir Joshua Reynolds, who also used bifocals who would have needed them prior to Franklin’s invention of them in 1784. In addition, it would have been unlikely that Reynolds would have been able to adopt the invention from Franklin as Franklin had been in France at the time and finally, it is be lieved West got his idea for bifocals from Reynolds rather than Franklin. What is known is that all three men knew each other and all three men wore bifocals. (Levene, 1972) What is not know is whom exactly invented eyeglasses we are familiar with now or when. Eyeglasses, or spectacles, in the earliest forms of what might be familiar today, had its beginnings in the thirteenth century. Salvino degli Armati is widely credited as being the inventor of the familiar two-lens apparatus that rests on the bridge of the nose although English Franciscan and intellectual Roger Bacon (1220 -1292), designed a similar version a couple of decades earlier. The discovery that curved glass improved vision led to other innovations such as the telescope and microscope which led to the rise of modern science, greatly advancing the breadth of knowledge and well-being of the human race. Reading glasses themselves represent one of the most significant inventions of human kind as they were developed by a c ollaboration of several talented craftsmen including glassmakers, jewelers and clockmakers along with â€Å"philosophers, monks, mathematicians, physicists, astronomers, and chemists who all played vital roles in developing this instrument† (Rosenthal, 1994, p. 489). The Greeks, Egyptians, Romans and Chinese are all recorded to have experimented with varying types of ocular manipulations using glass. A prominent astronomer and mathematician

Thursday, September 26, 2019

How businesses can position themselves to take advantage of huge Term Paper

How businesses can position themselves to take advantage of huge changes and maximize on their values - Term Paper Example The introduction captures the background of change in business with the implications and consequences. The main body evaluates the advantages that business can derive from the business changes to maximize on its values, the actions that business should take to be ready for future changes expected and finally the skills and competencies, which are most appropriate in the ‘new world’ of business. The conclusion section reinstates the thesis and presents the major arguments of discussed. Taking Advantage of Business Changes to Maximize On Value Introduction Businesses have to respond to changes in their operations because of various factors. The business regulations often change. Technological innovations and the need to respond to globalization have all contributed to changes in business operations. Societal shifts and trends change continually, and business have to respond to the needs of their customers by changing their processes, strategies, and operations. Innovations and advances in information technologies have contributed immensely to changes in business processes and operations across the globe through the capacity to bridge the geographical divide. The consequences and implications of advances in information technology in businesses are varied. These changes may affect some businesses positively whereas others may be affected negatively. Nevertheless, an appropriate response to the changes should be by taking advantage of the change forces to maximize on various business dimensions, including shareholder’s wealth, profits and social responsibilities among other things. Businesses need to prepare adequately for the future changes. Skills and competencies are essential assets for dealing with the changes experienced continually. How businesses should take advantage of the changes, mainly on information technologies, to maximize of their value is discussed expansively. Further, recommendations on the appropriate requirements that they n eed to have and the actions they ought to take to prepare effectively for future changes are provided. In addition, the prerequisite skills and competencies to work effectively in the ‘new world’ of business are offered. Opportunities Provided By Changes in Business to Maximize On Return Value Advances in Information Technologies Advancements in information technologies offer opportunities for businesses to change into innovations that may help in maximizing their business value. Advances in technology can help businesses introduce new products and services into the market to meet the needs of their customers. Further, new technologies can help in developing new business models, which may be used as a competitive advantage against the competitors (Lorenzo, Kawalek and Ramdani 107). Changes in business processes brought about by information technologies may be used by an organization to build on customer value proposition. Technologies and changes may influence businesse s to provide their services to the customers efficiently, and with high quality. Quality and effective services and products can be offered to clients and customers using new information technologies that reduce on costs and optimize time. Such changes may help businesses retain and attract huge customer base because of enhanced customer responsiveness (Lorenzo, Kawalek and Ramdani 107). Information technologies are dynamic but businesses use them as essential organizational assets. These new technologies may

Not sure it is about media study Essay Example | Topics and Well Written Essays - 3000 words

Not sure it is about media study - Essay Example 76). Althusser’s then considered that class is never inherent but instead culturally created, and individual desires, attitude, behaviours and choices are creation of ideology. Furthermore, he argued that ideology controls people via despotic state machineries built in ideological state devices, and as such, it is impossible to conceive a structure of images plus objects whose connotations can exist separately of language. Althusser’s observes that ideology interpellates existing individuals as material subjects through pre-existing classes comprising the subject (Montag, 2003, p. 45). Foucault, on the other hand observes ideology as an intolerable concept of universal judiciousness, which are based on subjectivity (Mills, 2012, p. 64). Foucault scepticism on ideology is based on his belief that dissimilar rationalities are composed in historical structures. Thus, he mystifies power due to its emphasis on universal truth. Foucault asserts that, subjectivity is the validation of a progression, and it is rather provisional leading to subject(s) (Ransom, 2008, p. 4). To Foucault subjectivities are rather multiple instead of being unified even as it fluctuates instead of being fixed, per se, subjects are socially constituted. Hence, subjectivity possesses a permanent provocation to the discourse or conversation which defines it (Strozier, 2002, p. 21). On the other hand, Althusser’s defines subjectivity as the roles, characteristics or subject possessed by individuals, and willingly undertake in response to an ideology. Thus, according to Althusser’s, su bjectivity is the hub of initiatives, an author of, along with being responsible for its actions. Therefore, an individual is for all time a subject, even before he or she is born (Ferretter, 2012, p. 88). The aim of this paper is to discuss the statement that language is always already ideological,

Wednesday, September 25, 2019

PR Advertising or Social Media Campaign Dissertation

PR Advertising or Social Media Campaign - Dissertation Example Companies have now begun to realize the sheer scope and outreach of social media and the Internet in general as a highly effective communication platform. Thus using the various social media platforms to launch their social media campaigns has become integral for them since it enables the organizations to leverage their marketing practices in the most cost-effective way possible. The effective use of social media to market the products or services could prove to be highly profitable resulting in the delivery of measurable business results. However, if not executed effectively, it may lead to disastrous results. Starbucks is a case in point. This report â€Å"PR Advertising or Social Media Campaign† aims to discuss the recently launched and highly controversial social media campaign – Race Together, launched by Starbucks. The Starbucks’ â€Å"Race Together† Campaign: Critical Analysis Starbucks, the Seattle based multinational coffee giant launched one of its most ambitious social media campaigns, â€Å"Race Together† in association with USA Today, on March 18, 2015. The key aim of this campaign was to get its customers and the world around them, talking about a highly sensitive issue in American history – Race. The company took out full-page newspaper advertisements and encouraged open discussions about race on open forums (USA Today, 2015).

Tuesday, September 24, 2019

Performance Measures Research Paper Example | Topics and Well Written Essays - 750 words - 2

Performance Measures - Research Paper Example Forensic Psychology is understood as a mixture of both psychology of the brain and the legal psychology in any given location. The field is important in that it assists in the assessment and the understanding of people that may be diagnosed with a mental condition and involved in crimes (Ryan, 2007, 98). The field developed after the acknowledgement of the fact that many people had been sent to prison and were not in the proper state of mind. This has had scientists involved in finding means through which these sick people can be sent to mental institutions for the resolution of their issues other than send them to prison to suffer. This is from the fact that they do not deserve a sentence and their mental conditions should stand up in court. Diversion is a major part of Forensic Mental Health (Samuels, 2011, 167). This is a term that is used to refer to the change of custody of a patient with extreme mental conditions from the legal Justice System and straight to the health system for assistance. Psychosocial issues have been of great importance with relation to forensic mental health. Psychosocial issues are the ones that relate to the mind in a psychological manner and thus directly link to Forensic Mental Health. Most of these issues involve the engagement of various job descriptions and locations in an effort to assist people with severe mental conditions. Association of the community with these mentally impaired people is very important for the maintenance of the patient’s character (Candice, 2010, 109). This is a major psychosocial issue in that when these people do not feel at ease with the person, he begins having ideas that he is all alone and that nobody is interested with his company. This may put the person in a worse mental state and drive him to committing another crime of which the justice system does not act on as leniently as the first case. Another sector that has a big role to

Monday, September 23, 2019

Conflict paper Essay Example | Topics and Well Written Essays - 4000 words

Conflict paper - Essay Example e different forces or ideologies that there exists miss understanding between the individuals, groups, parties, or forces involved in the conflict (Raines, 2013). The two conflicting sides in a conflict are usually referred to as the protagonists and antagonists. There are various classifications of conflict, these include man against society: this is where man is in conflict with a social institution that is man-made. Conflicts that come under this classification, include the social conflicts, for example slavery, and bullying (Wandberg, 2001). The underlying principle here is that man is forced to make moral choices or is deeply forced by society’s moral values and rules that make him or her frustrated and desperately long for change. Man against man: this is wherepeople are usually against other people, it is also referred to as external conflict, and it may be in terms of direct opposition, for example, buy the use of weapons, for example, the Vietnam War, or World War II or reflect a subtle conflict of desires between two or more parties, for example, family disputes or a romance war (Dana, 2001). Man against nature: this is a type of conflict where man is in conflict with a particular force of nature, for example, animals; this has greatly been depicted in various parts of the world as man encroaches into territories that are usually in habited by animals (IrsÃŒÅ'icÃŒÅ', 2007). Additionally man could be experiencing weird forces of nature which include storms, tornedoes, snow storms as well as snow storms. Man against self: this is a classification of conflict where man tries too hard to overcome his or her own nature and follow a particular path that he or she deems desirable. It is also referred to as internal conflict and individuals apply the logic of good or evil, for example, a drug addict desperately trying to fight his addiction, a sinner desperately trying to avoid sin and embrace salvation (Hocker & Wilmot, 2013). In this particular piece of work,

Sunday, September 22, 2019

Merchant of Venice Essay Outline Essay Example for Free

Merchant of Venice Essay Outline Essay I. INTRODUCTION: A. Is Shylock a man more sinned against than sinning,† or does he take his revenge too far in the pursuit of his pound of flesh? B. The wrongs against Shylock climax in the courtroom scene. He has lost his ducats, daughter, and now his religion. C. Thesis: The absolute epitome of selfishness can be described from within Shylock’s character; that selfishness is what prevents any would-be sympathizers from being able to fully commit themselves to Shylock’s case. II. BODY PARAGRAPH 1: A. Topic Sentence: Being the antagonist and villain throughout the play Shylock must be the antithesis to the general characteristics of the protagonist and supporting cast. B. Shylock was a Jew, a not very admirable quality during the late 16th century in Venice. C. â€Å"Shylock, albeit I neither lend nor borrow/ by taking nor by giving of excess† (Act 1, Scene 3, Lines 61-62) D. He is a usurer, something that Antonia literally despises and spits upon. E. This shows the hypocrisy of Antonio’s actions F. The daughter of his, Jessica, wishes to be free of him while he cloisters her and denies her liberties in order to keep her for himself. G. Shylocks character is what fuels him, but the treatment he has had to endure has affected the way the reacts to people. III. BODY PARAGRAPH II: * A. Transition/Topic Sentence: The power Shylock has to be a constant obstacle is abused often and with no guilt, he is fueled from only the intense urge of revenge. * B. The bond, from which Antonio is tied to, has no loophole from the pound of flesh, even when Bassanio wishes to not be tied to it. * C. â€Å"You’ll ask me, why I rather choose to have/ A weight of carrion flesh than to receive/ Three thousand ducats. I’ll not answer that,/ but say it is my humour†¦Ã¢â‚¬  (Act IV, Scene I, lines 40-43) D.Shylock will not allow a counteroffer to his pound of flesh, even though it was offered threefold. * E. Shylock is a direct obstacle to Lancelet’s happiness and has kept him for too long. * G. Having to go live in the ghetto has given Shylock a home where he can nurture his despisement of Christians. IV. BODY PARAGRAPH III: * A. Transition/Opening   * Sentence: Anti-Semitism debates are a central theme, and the hypocrisies that stem from it are defined in Shylocks views of Christians. * B. He is portrayed as more consumed by the fear his ducats are gone than his own daughter. * C. â€Å"My daughter, O my ducats, O my daughter!/ Fled with a Christian! O my Christian ducats!† (Act II, Scene 8, lines 15-16) * D. â€Å"If you wrong us,/ shall we not revenge?/ If we are like you in the rest,/ we will resemble you in that†¦Ã¢â‚¬  (Act III, Scene I, Lines 54-62) * E. When he is taunted by Solania and Salerio he points out the differences between Jews and Christians and claims that the evil he has been taught he will execute even better. * F. He does not believe that they can co exist and refuses to dine with them or pray with them, only conduct business. * G. â€Å"I will buy with you, sell with you, talk with you†¦Ã¢â‚¬  (Act I, Scene III, lines 32-34) V. BODY PARAGRAPH IV: * A. Transition/Opening Sentence: The entire court scene is the showcase of how all the wrongs committed upon Shylocks Jewish soul will now come back to haunt his wrongdoer. * B. tries to bargain himself out of his punishment even when he has lost * C. â€Å"Shall I not barely have my principal?† (Act IV, Scene1, lines 356) VI. CONCLUSION: * * A. In determining whether or not it is right to sympathize with the plight of Shylock, it is necessary to forgive him for his revenge. But why is he forgiven when he could not forgive Antonio; for if he had then the character of Shylock would not be in question. * B. Reconfirmed Thesis: In his refusal of mercy and forgiveness, Shylock sets himself up for failure, and fails without grace leaving as a broken man without money, religion, or his precious ducats. * C. The debate of the humanness of Shylock has withstood the hardy hands of time because of his relatableness as a villain. It is harder to hate the villain when you have reasons to hate the hero.

Saturday, September 21, 2019

Measuring Binding Constant of Ethidium Bromide (EtBr) to DNA

Measuring Binding Constant of Ethidium Bromide (EtBr) to DNA ABSTRACT: The principle behind this lab experiment was to determine the binding constant of ethidium bromide to DNA using the known concentrations and the calculated value of X obtained from the equation. Ethidium bromide is said to have a high affinity to DNA, therefore, the expected value for the binding constant should be large. Two method were implemented in determining the binding constant of EtBr to DNA. The first method was by inputting the absorbance data using a fixed excel worksheet. The main goal was to manipulate the value in cell I24 to be as low as possible. After several trails and error, the final value of cell I24 was 0.00011316 and logK was 3.99. The second method was by simple manual calculation. The two methods yielded two very different results. By manual calculation the obtained value for K was 37,108.63 M-1, which was indicative that the final EB complex of DNA was larger than that of unbound DNA and unbound EB. The high value of the binding constant (K), demonstrates th at there is a high affinity of ethidium bromide to DNA. This correlates to the expected values of EtBr, which are reported to be in between 104 M to 106 M. INTRODUCTION: DNA plays an important role in biological systems being that it contains hereditary materials that is passed on to generations after generations. DNA contains sequences of specific bases within the DNA strands where it stores genetic information that can be readily replicated (Jeremy M. Berg, 2015). It is this sequence that determines the sequence of RNA and other protein molecules and it also transports most of the activities within the cells. RNA synthesis is a key step in the expression of genetic information (Jeremy M. Berg, 2015, p. 859). DNA is more than just a source of sequence information, but it is also the platform where binding proteins collate. This is an important factor for the development of many clinical drugs. The structure and function of drug targets are the basis for designs of effective and specific inhibitors. Though to be considered effective, the target drugs must bind to the enzymes or receptors with great affinity and specificity. Ethidium bromide, (EtBr), is widely used in many scientific laboratories to study the binding properties of DNA. Ethidium bromide is an aromatic dye that slips in between the base pairs of DNA. This binding of ethidium bromide to DNA is a process called intercalation. During this process, the structure of the DNA is changed and the distance among the base pairs in which it directly binds to increases. Resultant in the overall expansion of the dimension of DNA. Ethidium bromide exhibits diminutive base pair partiality containing moderate binding affinity depending on its ionic strength. The intercalation specificity depends greatly on electrostatic interactions and the formation of Van der Waals interactions between base pairs. It has the capability to bind itself to the hydrophobic interior in the stacked base pairs of DNA. However, Ethidium bromide is known to be a very potent mutagen, which is a chemical agent that can cause mutation in DNA cells and other certain diseases such as cancer. It is called an intercalating agent due to its ability to inhibit cell growth, DNA replication and transcription. In this experiment, we will be measuring the binding constant of the dye, ethidium bromide, using herring testes by method of absorption spectroscopy. Herring testes DNA (htDNA) is a natural DNA used in studies of DNA binding agents that modulate DNA structure and function (Sigma-Aldrich, Inc). This method involves titrating a series of solutions varying in DNA concentrations but with a constant concentration of the intercalating agent, ethidium bromide. By implementing this order of magnitude, it is likely to obtain samples with entirely unbound DNA and DNA that is saturated with ethidium. The solutions will run through the absorbance spectrometer at a wavelength of 480 nm. The absorbance measured will be used to calculate the bound ethidium. To determine the amount of bound ethidium the following expressions below is used, given that the information of DÕ†¢ and EÕ†¢ are known; where EÕ†¢ is the total ethidium bromide concentration and DÕ†¢ is the total DNA concentration. This information will allow us to calculate the binding constant of ethidium toward DNA. The equilibrium: D + E à ¢Ã¢â‚¬  Ã¢â‚¬â„¢ C D = DNA E = Ethidium Bromide C = Complex K = [C] / [D][E](1) Solve for K: K = x/[EÕ†¢ x][DÕ†¢ x](2) Kx2 x(K[DÕ†¢] + K[EÕ†¢] + 1) +K[DÕ†¢][EÕ†¢] = 0 (3) Determination of the amount of bound ethidium (amount of complex, C): Aobs = ÃŽÂ µb x + ÃŽÂ µf [EÕ†¢ x](4) ÃŽÂ µb (480 nm) = 2,497 M-1 cm-1 ÃŽÂ µf (480 nm) = 5,600 M-1 cm-1 EXPERIMENTAL PROCEDURES: MATERIALS: 2 mM DNA (bp) stock solution with BPES buffer 2  µM DNA (bp) stock solution with BPES buffer 10  µM stock solution of Ethidium Bromide Micropipettes Microcentrifuge tubes Absorbance spectrometer PROCEDURES: Determine the volume of stock DNA solution and the amount of buffer needed for each of the nineteen samples before proceeding. *Refer to data tables* In the microcentrifuge tubes, make nineteen 1 mL DNA solutions by diluting from the 2 mM, and the 2  µM DNA stock solutions with BPES buffer. Then add 10  µL of ethidium bromide to the nineteen prepared solutions. Mix well and measure the absorbance at 480 nm. Record the absorbance for each of the nineteen solutions and use the information to calculate the binding constant K. RESULTS: DATA TABLE: Absorbance at 480 nm -Log[bp] [DNA(bp)] Volume 2 mM DNA Solution (in  µL) Volume 2  µM DNA Solution (in  µL) Volume of BPES buffer (in  µL) 0.018 3.0 0.001 500.0 XXXXXX 500.0 0.023 3.3 5.01187ÃÆ'-10-4 251.0 XXXXXX 749.0 0.024 3.7 1.99526ÃÆ'-10-4 100.0 XXXXXX 900.0 0.032 4.0 0.0001 50.0 XXXXXX 950.0 0.032 4.3 5.01187ÃÆ'-10-5 25.0 XXXXXX 975.0 0.029 4.7 1.99526ÃÆ'-10-5 10.0 XXXXXX 990.0 0.032 5.0 0.00001 5.0 XXXXXX 995.0 0.031 5.3 5.01187 ÃÆ'-10-6 3.0 XXXXXX 997.0 0.030 5.7 1.99526ÃÆ'-10-6 1.0 XXXXXX 999.0 0.032 6.0 0.000001 XXXXXX 500.0 500.0 0.033 6.3 5.01187ÃÆ'-10-7 XXXXXX 251.0 749.0 0.033 6.7 2.51189ÃÆ'-10-7 XXXXXX 100.0 900.0 0.032 7.0 0.0000001 XXXXXX 50.0 950.0 0.032 7.3 5.01187ÃÆ'-10-8 XXXXXX 25.0 975.0 0.034 7.7 1.99526ÃÆ'-10-8 XXXXXX 10.0 990.0 0.035 8.0 0.00000001 XXXXXX 5.0 995.0 0.035 8.3 5.01187ÃÆ'-10-9 XXXXXX 2.5 997.5 0.033 8.7 2.51189ÃÆ'-10-9 XXXXXX 1.0 999.0 0.030 9.0 0.000000001 XXXXXX 0.5 999.5 DATA GRAPH: CALCULATIONS: Sample Calculation for K: Using sample #4 Known Information: Aobs = ÃŽÂ µb x + ÃŽÂ µf [EÕ†¢ x] Aobs = 0.032 ÃŽÂ µb (480 nm) = 2,497 M-1 cm-1 [E]initial = 10  µM = 1.0 ÃÆ'-10-5 M ÃŽÂ µf (480 nm) = 5,600 M-1 cm-1 [DNA(bp)]initial = log(bp) = -4.0 = 1.0 ÃÆ'-10-4 M Solve for X: Aobs = ÃŽÂ µb x + ÃŽÂ µf [EÕ†¢ x] 0.032 = (2497 M-1cm-1)x + (5600 M-1cm-1)[(1.0 ÃÆ'-10-5 M) x] x = 7.73943 ÃÆ'-10-6 M Plug in value of x to solve for K: K = x/[EÕ†¢ x][DÕ†¢ x] K = (7.739 ÃÆ'-10-6 M)à ·[( 1.0 ÃÆ'-10-5 M) (7.739 ÃÆ'-10-6 M)][( 1.0 ÃÆ'-10-4 M) (7.739 ÃÆ'-10-6 M)] K = (7.73943 ÃÆ'-10-6 M) à · [2.26057 ÃÆ'-10-6 M][9.22606 ÃÆ'-10-5 M] K = (7.73943 ÃÆ'-10-6 M) à · (2.0856148 ÃÆ'-10-10 M2) K = 37108.63 M-1 K = 3.71 ÃÆ'-104 M-1 FINAL EXCEL WORKSHEET: After refinement DISCUSSION: The principle behind this lab experiment was to determine the binding constant of ethidium bromide to DNA using the known concentrations and the calculated value of X obtained from the equation. Ethidium bromide is said to have a high affinity to DNA, therefore, the expected value for the binding constant should be large. However, two methods were used to obtain the value K (binding constant). The first method was by using excel worksheet and inputting our data. The main goal was to manipulate the value in cell I24 to be as low as possible. After several trails and error, the final value of cell I24 was 0.00011316 and logK was 3.99, if you take the antilog of that value K would equal to approx. 9772.37, which is low in comparison to method two which was done by manual calculation. By manual calculation the obtained value for K was 37,108.63 M-1 which indicates that the final EB complex of DNA was larger than that of unbound DNA and unbound EB. The high value of the binding constant ( K), demonstrates that there is a high affinity of ethidium bromide to DNA. This correlates to the expected values of EtBr, which are reported to be in between 104 M to 106 M. Using a buffer that does not contain added NaCl, such as BPE, will have different results than that of a buffer with NaCl, such as BPES. The BPE buffer will yield a lower binding constant than that measured in BPES buffer. It is well known that the interaction within the process of intercalation is driven by electrostatic factors and à Ã¢â€š ¬-stacking with the bases (lab manual). The electrostatic binding of ethidium bromide to DNA has a preference to binding to the phosphate backbone the DNA strand. The DNA-ligand binding is salt-dependent due to the counter-ion release thats carried out during binding. This is indicative that the salt component in the buffer demonstrates a relatively greater stability in DNA due to its preference to the binding site within the GC-rich DNA region. With that said, it is apparent that an outlying positive charge is essential for intercalation. The positive charge on the intercalation diminishes as the aromatic system increases. Like ethidium bromide, Actinomycin D is another known intercalator with a high affinity to DNA. Though the two differ by means of binding sites. Actinomycin D intercalates at GC sites, which indicates that the two intercalators would not compete with one another at the exact binding sites. Therefore, by adding Actinomycin to a solution of herring testes DNA Ethidium bromide, resulting in two different results. An example of the plot is shown below: The plot is simply an example of what it might look like. There are a lot of variables that must be considered in choosing the proper intercalator. Factors to consider are concentrations of solutions and DNA, buffers, whether its a low salt concentration or high salt concentration buffer. The difference in buffers could possibly yield two very different results. Another factor to consider is the magnitude of the absorbance. All these factors combined could hinder the final outcome, so it is hard to conclude exactly how the actinomycin D would react in combination with ethidium bromide to DNA within this experiment. REFERENCES: Jeremy M. Berg, J. L. (2015). Biochemistry 8th ed. Kate Ahr Parker. Eva M. Talavera, Pablo Guerrero, Francisco Ocana, and Jose M. Alvarez-Pez, Photophysical and Direct Determination of Binding Constants of Ethidium Bromide Complexed to E. coli DNA, Appl. Spectrosc. 56, 362-369 (2002) Fuller, W., and M. J. Waring. 1964. A Molecular model for the interaction of ethidium bromide with deoxyribonucleic acid. Ber. Bunsen Ges. Phys. Chem. 68:805-808. Qiao C, Bi S, Sun Y, Song D, Zhang H, Zhou W (2008) Study of interactions of anthraquinones with DNA using ethidium bromide as a fluorescence probe. Spectrochim Acta A 70: 136-143 Graves, D. E., C. L. Watkins, and L. W. Yielding. 1981. Ethidium bromide and its photoreactive analogues: spectroscopic analysis of deoxyribonucleic acid binding properties. Biochemistry. 20:1887-1892. [PubMed] Suh D, Chaires J B (1995) Criteria for the mode of binding of DNA binding agents. Bioorg Mediclin Chem 3(6): 723-728

Friday, September 20, 2019

Syrian Refugees in Canada and Cosmopolitanism

Syrian Refugees in Canada and Cosmopolitanism Cosmopolitanism, Global Citizenship, and Syrian Refugees in Canada Introduction Canada, as a nation, pledged globally to take in 25,000 Syrian refugees before February 2016 with this initiative being ongoing (Government of Canada, 2017). This policy has left the nation divided on Canada’s roles and responsibilities within the global community. While there has been extensive media attention drawn to the United States of America’s recent problematic policies pertaining to immigration and security, the global community has been led to believe that Canada is a progressive and accepting nation. However, a study conducted in 2016 by the Angus Reid Institute and the Canadian Broadcasting Corporation found that Canadians aren’t as accepting and globally conscious as the Federal Government’s rhetoric has led global citizens to believe. This study found that 79% of Canadians felt that priority should be given to Canada’s own economic and workforce needs over the prioritization of people in crisis abroad (Proctor, 2016). Furthermore, 68% of Canadians believed that minorities should do more to fit in with mainstream Canadian/American society (Proctor, 2016). As both of these polls reveal strong nationalistic ways of thinking, the cosmopolitanism and global citizenship of Canadian citizens may be debated. As cosmopolitanism is the ideology of all human-beings being a part of a global community, having a shared set of morals, rights, and mutual responsibilities; such poll results encourage the exploration of the varying challenges and limitations of globalization. With the global community and global events continuing to become more interlinked due to market deregulation, climactic events, security instability, and transportation technologies; an increased emphasis needs to be placed on the duality of cosmopolitanism with individuals being encouraged to situate themselves within a global setting. It is through elaborating on this ideology that the contrast between centripetal geopolitical forces towards and the opposin g centrifugal forces that have deeply divided geography and history may be challenged.   Cosmopolitanism, Globalization, and Global Citizenship The ideology of cosmopolitanism has continually evolved throughout time, being debated as to the nature of its affiliation with globalization, nationalism, privilege, and global citizenship. As it was first theorized in Ancient Greece, cosmopolitanism was viewed as a manner in which an individual’s loyalty lay not solely with the state or the relationships of kin and community, but with a universal shared identity – furthermore, becoming a ‘citizen of the universe’. This ideology of one belonging to a global community, as opposed to a nation-state has been discussed and debated across various works, with each theorist contributing to the narrative of what cosmopolitanism is and how it is subsequently linked to nationalism. With cosmopolitanism and nationalism occurring concurrently, the manner of scale in which each exist has been examined and evaluated. With global interactions becoming increasingly interconnected due to neoliberal policy and shared markets, the relation between individual, state, and identity has been increasingly discussed over the past two decades. It is due to such recent institutional structures and change that scholar Pheng Cheah argues that cosmopolitanism is dependent and sustained by the state or institution. As Cheah views current institutions to have a global reach in their regulatory function, she further theorizes that power is embedded within regulation and that political consciousness or solidarity is dependent state functions, of which can be further influenced by the individual. Her writing further builds upon the theories of Immanuel Kant who initially viewed cosmopolitanism as having four central modalities. These pillars of cosmopolitanism included: (1) a world federation as the legal and political institutional basis for cosmopolitanism as a form of right; (2) the historical basis of cosmopolitanism in world trade; (3) the idea of a global public sphere; and (4) the importance of cosmopolitan culture in instilling a sense of belonging to humanity. However, while several of Kant’s theoretical foundations are still applicable today, the majority of his work does not yield answer for current global circumstances. Due to his work originating in the 18th century, his ideologies were unable to reflect upon the current globalized state of cosmopolitanism. As Kant believed that state had a fundamental role in the moral-cultural education of its citizens, his work did not take into account the individual agency and the violence imposed on various groups- further limiting the notion of global citizenship. Such ideologies of cosmopolitanism being dependent on the state are further contested in the works of fellow cosmopolitan theorist Keely Badger. As her work in response to Kant highlights the ethnic, religious and racial conflicts that continue to degrade life quality, human rights and freedom – she highlights that cosmopolitanism is based on an individual’s education and their feelings of obligation to mankind, free of external government or temporal power. Contrary to the formalized structures presented by Cheah, Badger views cosmopolitanism as being dependent on conversations across boundaries of identity – including national, religious or other; further allowing for an evolving cosmopolitan worldview. Furthermore, Badger emphasizes human plurality of being of the highest value, as well as, through discrediting state violence. Her work continues to further call cosmopolitanism to be centered upon a need for the toleration of the beliefs of others and what one may fail to understand. This notion of individual agency is also agreed upon and addressed in Cheah’s work, as she addresses cosmopolitanism in respect to the relation between cosmopolitanism and nationalism. Due to Cheah highlighting a distinction between the normativity of morality and that of cosmopolitan right, she argues that cosmopolitanism is not identical to moral freedom but is merely an institutional vehicle for its actualization. While this indicates that cosmopolitanism is not necessarily opposed to nationalism, her writing shows that solidarity associated with cosmopolitanism is not affiliated with national character. Therefore, her view of cosmopolitanism is not opposed to nationalism but to absolute statism. While both articles present the limitations to nationalism and the potential violence that has resulted from nation-state tendencies, Cheah and Badger call for the role of non-government organizations (NGOs) to fill a leadership role in our agglomerated world. Both authors theorize that such organizations have a role to administer international cooperation, economic development, international law, and human rights. However, the authors discuss potential limitations of such organizations, of which can be exemplified in Badger’s critique of the United Nations and how the organization walks a fine line between exercising its governance power and working within the confines of conflicting sovereignties. While the work of Cheah does not mention grass-roots initiatives, Badger’s article goes on to call for the need of grass-roots NGOs to combat the rampant neoliberal capitalism that has propagated globally since the 1990s. However, she further theorizes that this manner of overcoming neoliberalism can only be sustained through continual consciousness transcending and overcoming the constraining rhetoric presented by nationalism/statism driven by corporations, as well as nation states. Therefore, it is suggested that cosmopolitanism is distanced from the state and nationalistic identification, as cosmopolitanism from below via normative and politically oriented forms of social action are determined to be more powerful in cultivating a shared cosmopolitan consciousness. Nevertheless, this argument is challenged within limitations of Cheah’s writing as she questions who is privileged as being cosmopolitan and how are transnational underclasses or marginalized groups limited from participating in such ideologies and what constitutes as legitimate solidarity. As the works go onto later agree that social and political movements are needed to challenge nationalistic thinking through the use of non-violent institutional groundings and uprising in attempt to disrupt political loyalties, allegiances, and group identities. Such anarchic ideologies of social disruption are later discussed in the work of Badger, as she highlights the potential usage of social media and the Internet for physical mobilization of cosmopolitan resistance, as well as, facilitating uprisings from below. Such examples in the writing included anti-sweatshop campaigns, democratic revolutions, and shifting conscience of the global community. As both Cheah and Badger discuss the anarchistic nature of cosmopolitanism, this ideology is further built upon in the work of Graham Maddox. As he initially highlights cosmopolitanism’s love for mankind and the rejection of state imposed thinking- his writing contrasts the work of the other author’s, stating that ‘the [average] cosmopolitan’ is a pacifist at heart. His work goes on to challenge the previous writing of Cheah and Badger, highlighting that while the global population has become more interconnected due to globalization- this may have resulted in the rise of nationalistic ideologies and xenophobia. His writing goes on to exemplify this concept by highlighting the prominence of global terrorism and the impact this has had on minority populations in Australia. As global consciousness has the potential to make people nervous and resentful, there may be a shift from cosmopolitan thinking often resulting in increased xenophobia with vulnerable groups becoming scape goats for the public to inflict violence upon.   Similar to the work of Cheah, he addresses the role of capitalism and neoliberalism in relation the power struggle with corporate or nationalistic power often prevailing, resulting in the will of the people receding – addressing the masculine nature of Western dominant thought and hegemony. While Maddox’s work address cosmopolitanism in Australia, a nation that has followed a similar colonial narrative as Canada – his work has tied in closely to fellow theorist, Jean-Francois Caron. While the work of Caron agrees with the other theorists that cosmopolitanism can be seen as a superior to national patriotism in regards to the inclusion, she highlights that this idealistic moral posture of cosmopolitanism has no chance of replacing national identities. As she highlights that while national identities are not static and remain intangible throughout time, it is through national narratives and collective mentalities that circumstances are challenged and limits are reinterpreted. Similar to the work of Maddox her work highlights Canada’s cosmopolitan worldview in relation to the nation’s colonial history, adding that it was a distrust of American culture and a sense of ‘moral superiority’ that led to Canada’s national rhetoric being reinforced. While she highlights the nation’s identity as being inherently anti-American, she also gives praise to Canada’s sense of multiculturalism – stating it as a success story, contrary to other countries where such diversity often results in violence. This is later exemplified as she goes on further proclaim that immigrants coming to Canada are welcomed to society and that inter-racial marriage serves as a benchmark for Canada’s openness. However, her thoughts in relation to Canada’s rooted cosmopolitan nature can be challenged due to this work being problematic, failing to account for the complexities of multiculturalism, the experiences of minority individuals, and the continued need for Canada to be more globally consciousness and welcoming of foreigners. The shortcomings and complexities presented within the work of the four cosmopolitan theorists can be further exemplified and expanded upon through an evaluation of Canadians society’s worldviews and realities in relation to the intake of Syrian refugees. As Canada is proclaimed to be one of the most multicultural and globally conscious nations in the world, it is necessary for Canadians to reflect inward to question how we situate ourselves globally, as well as to critically examine the ‘#refugeeswelcome’ initiative. Syrian Refugees in Canada The United Nations High Commissioner for Refugees (UNHCR) estimates that 960,000 refugees are currently in need of resettlement in a third country (Martin, 2016). These are refugees who, according to the UNHCR, can neither return to their country of origin nor integrate into their country of first asylum (Martin, 2016). Together, the international community has committed to resettle around 80,000 refugees each year with Canada resettling approximately 10% of this total (Government of Canada, 2017). The Canadian government’s current goal is to resettle between 8% and 12% of all refugees (Government of Canada, 2017). Several factors contributed to the Canadian public’s initial response to the Syrian refugee crisis, including public outcry for support following the death of Ayan Kurdi, a Syrian child who drown while travelling by boat from Turkey to Greece a child of a family that had been refused resettlement to Canada; and, the 2015 national election serving as a platfo rm for all prime ministerial candidates to debate the ideology of  accepting refugees openly. Similar to the ideologies relating to media and the Internet presented in the article of Badger, this serves as an example of how cosmopolitan media has resulted in public conscientiousness and outcry. However, this also exemplifies the limitations of global citizenship presented by Maddox and Cheah as to how migration has become a political issue with bureaucrats, policy makers, and citizens (in a limited manner) determining who can and can’t be a citizen of a country or the world. At this time, Canadian citizens also wanted the federal government to match the rhetoric of Canadian identity as compassionate, openly engaged in the international community and open to newcomers.   The newly elected government’s commitment to resettle Syrians was primarily driven by the momentum of the election, and later by the need to demonstrate the new government’s capacity to swiftly implement promises. It is through this shift in political being that Cheah’s theory of the state being made up of the citizens may be illustrated due to the majority of Canadian voters presenting more liberal or globally conscious values. The Canadian government further committed to resettling more than 25,000 Syrian refugees specifically between November, 2015 and February, 2016 with commitments extending into 2017 (Government of Canada, 2017). To date, a total of 40,081 Syrian refugees have resettled across 350 Canadian communities since the initiative was first introduced in 2015 (Government of Canada, 2017). Of these Syrian refugees 21,876 are Government Assisted, meaning that the government will provide the refugee (and their family, if applicable) with accommodation, clothing, food, assistance finding employment, and other resettlement assistance for one year or until they are able to support themselves (Government of Canada, 2017). A further 3,931Syrian refugees were resettled as Blended Visa-Referred Refugees, being selected by the UNHCR with further support being provided by the federal government and private sponsors (Government of Canada, 2017). The remaining 14,274 Syrian refugees are privately sponsored (Government of Canada, 2017). While the number of privately sponsored refugees has increased over recent years the Canadian government has decreased the number of Syrian refugees that are privately sponsored, further limiting the number of refugees allowed to resettle in the country. It is through this permissive nature of allocating the number of citizens Canada allows within its borders, that the notion of cosmopolitanism is challenged by nationalism. As the world is theorized to be interacting on a global scale, the use of borders, immigration, and political discourse pertaining to the acceptance or bigotry towards Syrian refugees remains problematic. This connects with both Badger and Cheah’s theories as this highlights the role government plays in regulating global citizenship and movement. Through disallowing privately sponsored refugees into the country, this top-down approach challenges the bottom-up outcry and mobilization to increase the number of refugees coming into the country. While the government presents the ‘#refugeeswelcome’ rhetoric, through limiting the number of total refugees permitted into the country this representation of ‘welcoming’ may be challenged in a cosmopolitan context. With matching and arrival times between the initial phase of the program from November 2015 to February 2016 being quick, an unrealistic expectation for private individuals or groups waiting to be matched with a new coming refugee family has resulted (Marwah, 2016). Now that the target of 25,000 Syrian Refugees has been met, the process has significantly slowed down, leaving various parties on a waiting list to provide sponsorship (Marwah, 2016).   Other groups that were matched in this process have still been waiting for refugees to arrive, with some groups being stuck with empty rented apartments, have wasted resources, and are struggling with the sponsorship morale (Marwah, 2016). Additionally, further challenges exist keeping sponsors engaged and motivated as they may not be matched until the end of the year (Marwah, 2016).  This can be associated with the article of Karen Badger as her theology highlights the need for individual consciousness and a conscious civil society. Through citizens being disallowed from sponsoring a refugee, this may potentially discourage sponsorship and result in a reduction of ‘cosmopolitan thinking’ – further encouraging ‘the pacifist’ theorized by Graham Maddox. While there is a need for the Canadian Government to articulate the complexities and the timing of a resettlement initiative of this scale, this process of refugee intake needs to be re-evaluated. With complex decision-making and political structures being overseen increased communication among partnering agencies, as well as, further patience and commitment to support refugees is needed.   There is also a need for Canadian society to reflect upon the nature of which the country accepts refugees. While there is a stark difference between the services and preconception of Syrian and non-Syrian refugees, there is a need for increased attention as to the dualistic nature of the acceptance of refugees. Primarily this difference can be seen as Syrian refugees who arrived after the Liberal government came to power do not in contrast to refugees of other nationalities and previous Syrian refugees have to repay the government’s travel loan which enabled their journey to Canada (McMurdo, 2016). While the theory of Caron highlights a multicultural nation, full of welcoming and accepting individuals (as opposed to the USA), this does not accredit the challenges refugees may face upon re-settling. This may be related to this two-tiered system of refugee intake, as the nation ‘being cosmopolitan’ was quick to respond to the Syrian ‘crisis’ yet was not ‘globally conscious’ as to the needs and backgrounds of past refugees. Furthermore, while non-Syrian refugees have arrived with debt and hundreds of cases to slowly make their way through the resettlement process, some Syrian refugees have been expedited and arrived in Canada with special treatment, loan free (Marwah, 2016). By putting forward a helpful and empathetic view towards the Syrian population, the government has effectively created two classes of refugees, disregarding fairness and equality towards all marginalized refugee groups. Others, including the private sector and social services have followed suit in offering various benefits to newly arriving Syrians to Canada. Yet, this welcome has the effect of making invisible any other refugees (Marwah, 2016). With the recent terror attacks throughout the world, and the resulting rhetoric of islamophobia, the initiative to resettle Syrians to Canada has become an increasingly debated topic among Canadians. Similar to the work of Maddox, this notion of uncertainty, fear, and xenophobia have been present in Canada in regards to the intake of refugees. Due to security in the resettlement processing has becoming a point of public contention, the Liberal government has shared and updated regular information/data to ease the fears of Canadian citizens.  However, this has not limited the number of hate crimes and racist violence imposed on minority groups (refugee or not). As the nation fears uncertainty, and has been negatively influenced by media portraying terroristic events abroad, the way Canada situates itself within the global setting could become more conscious and aware of the limitation of such thinking. Also, disappointingly, settlement services in Canada have not yet received the same support from the government as was offered in physically resettling the refugees to Canada (McMurdo, 2016). With a huge and rapid influx of refugees, settlement services have been stretched beyond capacity, without sufficient resources to adequately address the refugees’ needs, or the time to invest in additional fundraising (McMurdo, 2016).   As a result of the scale of arrivals, enrolling the refugees in language classes and/or schools and allocating housing, along with other basic services has proven challenging (McMurdo, 2016). Certain refugees have been staying in temporary accommodation for weeks longer than usual (McMurdo, 2016). The private sector and civil society have played an active role in responding to the needs of the thousands of Syrian arrivals and to fill this gap (McMurdo, 2016).   Further training is needed for professionals to support this specific group of people and their varied needs, particularly government-assisted refugees, who have greater needs and vulnerabilities (McMurdo, 2016). Therefore, like the works of the theorists discussed in the earlier half of the paper, there is a need for civil consciousness and the support of non-government organizations and community groups to implement the services government falls short of providing. Through this anarchistic nature of cosmopolitanism and overall shared responsibility of our fellow countrymen (and women) or ‘global neighbours’, the limitations of nationalism and neoliberal globalization can be continually contested and reframed. By allowing individuals to take ownership of their behaviours on a domestic and international scale, the cosmopolitan revolution may continue to occur, further limiting the nationalistic fear and xenophobia shift the globe may current be seeing.   Conclusion As the global population continues to be more interlinked, the theology of cosmopolitanism will continue to change and be reframed through future years. While it may seem that the ‘global citizen’ is being challenged ‘the most’ in recent years due to shifts towards nationalistic thinking and hate crimes increasing, the potential for globally conscious, aware citizens needs to be promoted. While this may be best done at a grass-roots, individualistic level – the potential for positive change may result. With the rhetoric surrounding Canadians and Syrian refugees might not being as ‘accepting’ as the government wants the nation to perceive it to be, increased education and interaction between Canadians and our newest refugee citizens (Syrian or not) yields the potential to break down the barriers of nationalism, further preventing ‘us’ from seeing the benefit of diversity and acceptance. Bibliography Badger, K. (2015). Cosmopolitanism and Globalization: A Project of Collectivity. Caron, J.-F. (2012). Rooted Cosmopolitanism in Canada and Quebec. National Identities, 14(4), 351–366. http://doi.org/10.1080/14608944.2011.616954 Cheah, P. (2006). Cosmopolitanism. Theory, culture & society, 23(2-3), 486-496. Government of Canada. (2017). #WelcomeRefugees: Key Figures. Retrieved from http://www.cic.gc.ca/english/refugees/welcome/milestones.asp Maddox, G. (2015). Cosmopolitanism. Social Alternatives, 34(1), 3. Martin, S. F. (2016). Rethinking Protection of Those Displaced by Humanitarian Crises. TheAmerican Economic Review, 106(5), 446-450. Marwah, S. (2016, Summer). Syrian refugees in Canada: lessons learned and insights gained. Ploughshares Monitor, 37(2), 9+. Retrieved from http://go.galegroup.com.ezproxy.library.uvic.ca/ps/i.do?p=CPI&sw=w&u=uvictoria&v=2.1&it=r&id=GALE%7CA459227943&asid=4c7546bee52ffbb9988d6f7497ecf8c7 McMurdo, A. B. (2016). Causes and consequences of Canadas resettlement of Syrian refugees. Forced Migration Review, 1(52), 82-84. Proctor, J. (2016). CBC-Angus Reid Institute poll: Canadians want minorities to do more to fit in. Retrieved from http://www.cbc.ca/news/canada/british-columbia/poll-canadians-multiculturalism-immigrants-1.3784194

Thursday, September 19, 2019

Andrea Palladio Essay examples -- Andrea Palladio

The Renaissance produced a wealth of great skill and craftsmanship. Describe in detail the work of one of its great artists or architects. Andrea Palladio (1508-80) was one of the most influential figures of Renaissance architecture, who worked in Vicenza in northern Italy as well as in Venice and the surrounding Veneto. Born in Padua, Palladio trained as a stonemason moving to Vicenza in 1524 to continue his training. Giangiorgio Trissino (1478-1550), his patron, introduced him to classical and humanist studies and took him on his first trip to Rome – where he later spent two years studying. His architectural development was deeply influenced by this direct study of Roman antiquity. Trissino’s patronage gave Palladio access to a powerful humanist circle who provided him with commissions for the duration of his career – including Palladio’s public projects such as the Palazzo della Ragione, or Basilica, and the Teatro Olimpico which together permanently changed Vicenza’s public architecture. Originally a Gothic town hall, the Palazzo della Ragione or Basilica (commissioned in 1549), was on the verge of crumbling and Palladio won a competition to redesign it. His answer was to encase it on three sides with a two-storey loggia that provided reinforcement and transformed the exterior with classic columned arcades on two levels. Arches were placed between pilasters, Doric on the lower level, Ionic above, supporting entablatures. In each bay, the arch rests on small columns placed away from the larger pilasters with a rectangular gap in between - now known as the ‘Palladian motif’. Palladio had an exceptional grasp of the use of proportion in classical architecture and believed beautiful architecture improved p... ...d in 1580, the project had only just begun. The theatre was completed by Vincenzo Scamozzi assisted by Palladio’s son, Silla, and would serve as a model for theatres across Europe for centuries. Palladio reinvented the Veneto’s architecture – and his influence eventually extended a long way past the region’s borders. His impact was very much helped by the publication of his I Quattro Libri dell’ Architectura (The Four Books of Architecture) in 1570. Covering classical design and including translations from Vitruvius, illustrative woodcut plates of classical design and of his own Renaissance work, the text was known throughout Europe – particularly in England, notably by Inigo Jones, the 17th Century English architect – and ultimately in America where buildings such as Thomas Jefferson’s Monticello in Virginia (1770) are clearly founded on Palladian principles.

Wednesday, September 18, 2019

Free Oedipus the King Essays: Hamartia in Oedipus Rex :: Oedipus the King Oedipus Rex

Hamartia in Oedipus the King According to the Aristotelian characteristics of good tragedy, the tragic character should not fall due to either excessive virtue or excessive wickedness, but due to what Aristotle called hamartia. Hamartia may be interpreted as either a flaw in character or an error in judgement. Oedipus, the tragic character in Sophocles’ Oedipus the King, certainly makes several such mistakes; however, the pervasive pattern of his judgemental errors seems to indicate a basic character flaw that precipitates them. Oedipus’ character flaw is ego. This is made evident in the opening lines of the prologue when he states "Here I am myself--you all know me, the world knows my fame: I am Oedipus." (ll. 7-9) His conceit is the root cause of a number of related problems. Among these are recklessness, disrespect, and stubbornness. Oedipus displays an attitude of recklessness and disrespect throughout the play. When he makes his proclamation and no one confesses to the murder of Laius, Oedipus loses patience immediately and rushes into his curse. Later, he displays a short temper to Tiresias: "You, you scum of the earth . . . out with it, once and for all!," (ll. 381, 383) and "Enough! Such filth from him? Insufferable--what, still alive? Get out--faster, back where you came from--vanish!" (ll. 490-492) If an unwillingness to listen may be considered stubbornness, certainly Oedipus would take advice from no one who would tell him to drop the matter of his identity, among them Tiresias, the shepherd, and even Jocasta. Even after Oedipus thinks he has received a reprieve from the fate he fears when he hears that Polybus is dead, he does not have the sense to keep still. "So! Jocasta, why, why look to the Prophet’s hearth . . . all those prophesies I feared . . . they’re nothing, worthless," he says. (ll.1053-1054, 1062, 1064) To the shepherd, Oedipus certainly has no respect for the man’s age when he tortures him. Oedipus’ cruelty indeed literally squeezes his own demise out of the shepherd: "You’re a dead man if I have to ask again . . . I’m at the edge of hearing horrors, yes, but I must hear!" (ll. 1281, 1285) After his recognition and reversal, Oedipus exclaims "The hand that struck my eyes was mine, . . . I did it all myself!" (ll. 1469, 1471) He is not only referring to his self-inflicted mayhem, but also the chain of events that led to his demise.

Tuesday, September 17, 2019

A Clinical Assessment and Management of a Patient

A CLINICAL ASSESSMENT AND MANAGEMENT OF A PATIENT WITH FACULTATIVE HYPEROPIA Prepared By: Santos, Clarence O. Abstract Ametropia is an anomaly of the refractive state of the eye in which, with relaxed accommodation, the image of objects at infinity is not formed on the retina. Thus vision may be blurred. The ametropias are: astigmatism, hyperopia (hypermetropia) and myopia. The absence of ametropia is called emmetropia. The word â€Å"ametropia† can be used interchangeably with â€Å"refractive error† or â€Å"image formation defects. Types of ametropia include myopia, hyperopia and astigmatism. They are frequently categorized as spherical errors and cylindrical errors. Those who possess mild amounts of refractive error may elect to leave the condition uncorrected, particularly if the patient is asymptomatic. For those who are symptomatic, glasses, contact lenses, refractive surgery, or a combination of the three are typically used. Keywords Hyperopia, Ametropia, Facul tative Hyperopia IntroductionHyperopia, also known as farsightedness, longsightedness or hypermetropia, is a defect of vision caused by an imperfection in the eye (often when the eyeball is too short or the lens cannot become round enough), causing difficulty focusing on near objects, and in extreme cases causing a sufferer to be unable to focus on objects at any distance. As an object moves toward the eye, the eye must increase its optical power to keep the image in focus on the retina. If the power of the cornea and lens is insufficient, as in hyperopia, the image will appear blurred.The causes of hyperopia are typically genetic and involve an eye that is too short or a cornea that is too flat, so that images focus at a point behind the retina. In severe cases of hyperopia from birth, the brain has difficulty merging the images that each individual eye sees. This is because the images the brain receives from each eye are always blurred. A child with severe hyperopia has never seen objects in detail and might present with amblyopia or strabismus. If the brain never learns to see objects in detail, then there is a high chance that one eye will become dominant.The result is that the brain will block the impulses of the nondominant eye with resulting amblyopia or strabismus. Case Report Michelle Tizon, a 19 year old female had a routine eye checkup last July 23, 2012. She does not wear any corrective lenses. The patient does not report any symptoms of visual deficiencies and declares that she has clear vision at any distance. The patient claims that both of her parents are hypertensive, and likewise she is too. Clinical Findings The patient’s vision is 20/20 monocular and binocularly for both distance and near, with an interpupillary distance of 60/58mm and a pupil diameter of 4mm.All the patient’s ocular adnexae are within normal limits. Static retinoscopy reveals a gross finding of +2. 50 sph for both eyes and a net finding of +0. 50 sph. The fin dings enable her to achieve 20/20 vision. Upon refinement during subjective refraction, her final prescription is of +0. 50 sph for the right eye and +0. 25 sph for the left eye. The patient’s near point of convergence was measured at 8/13 which is within normal limits and with push-up amplitude finding of 12 cm or 8. 33 D. Corneal reflex testing showed a reflex located slightly nasally for the left eye and centered on the right eye.Upon further verification through alternate cover tests a slight amount of exophoria was revealed for both distance and near. Motility testing shows jerking in the patient’s smooth pursuit in all directions but smooth, accurate, full and extensive on saccades. Fundoscopic examination revealed that the internal eye for both eyes of the patient are well within normal limits and absent of any pathology. Phorometric testing reveals a habitual phoria for the patient measured at 2 xop for distance and 1 xop for near, with the same values for the induced phoria.The amplitude of accommodation of the patient was at 7. 75D which is a determinant that the patient does not need any correction for near vision Diagnosis: The patient has Facultative Hyperopia. Discussion: Various eye care professionals, including ophthalmologists, optometrists and opticians, are involved in the treatment and management of hyperopia. At the conclusion of an eye examination, an eye doctor may provide the patient with an eyeglass prescription for corrective lenses. Minor amounts of hyperopia are sometimes left uncorrected.However, larger amounts may be corrected with convex lenses in eyeglasses or contact lenses. Convex lenses have a positive dioptric value, which causes the light to focus closer than its normal range. Management: Full prescription should be given to the patient to aide her refractive error. References: American Optometric Association. Optometric Clinical Practice Guideline: Care of the patient with hyperopia. 1997. â€Å"Eye Health: Presbyopia and Your Eyes. † WebMD. com. October, 2005. Accessed September 21, 2006. Chou B. Refractive Error and Presbyopia. † Refractive Source. com Accessed September 20, 2006. American Optometric Association. Optometric Clinical Practice Guideline: Care of the patient with presbyopia. 1998. Kazuo Tsubota, Brian S. Boxer Wacher, Dimitri T. Azar, and Douglas D. Koch, editors, , Hyperopia and Presbyopia, New York: Marcel Decker, 2003 Roque, B. Refractive errors in children. November 2, 2005. â€Å"Frequently Asked Questions: How do you measure refractive errors? â€Å". The New York Eye And Ear Infirmary. Retrieved 2006-09-13.

Monday, September 16, 2019

Breaking DES (Data Encryption Systems)

Data Encryption Standard (DES) is an algorithm for decrypting and encrypting unstipulated information in the United States administration standard. DES is derived from IBM’s Lucifer code and is depicted by the Federal Information Processing Standards (FIPS) 46, with its current modification being FIDS 46-3 (Conrad, 2007). DES is a mass code that takes a plaintext sequence as a key in and generates a code transcript wording of the same measurement lengthwise.The mass of the DES obstruct is 64 bits which is also the same for the input dimension even though the 8 bits of the key are for the recognition of faults making the efficient DES input amount 56 bits. Because of the progressions in the authority of dispensation in workstations there are weaknesses in the 56-bit key extent presently (Conrad, 2007). In the company of proper hardware, there is a best chance assault on methodical efforts to all the 72 quadrillion hence, there is a possibility of dissimilar inputs.Advanced Encr yption Standard (AES) developed into an innovative FIPS-standard encryption average in 2001, 26th November to replace DES. Statistics Encryption Algorithm explains the definite algorithm as contested to the average. In such circumstances, TDEA is a short form for Triple DES. At the same time, there is a description of Triple Data Encryption Algorithm Modes of Operation ANSI X9. 52-1998 (Clayton & Bond, 2002). History of DES DES was proposed in 1975 and approved in 1977 as a federal information processing standard. It was criticized by the people who felt that it’s 56 key lengths to be insecure.In spite of this, DES remained a strong encryption algorithm until mid 1990. In the year 1998 summer, the insecurity of DES was demonstrated when a $ 250,000 computer which was built by the electronic frontier foundation decrypted a DES-encoded message in 56 hours. This was improved in the 1999 to 2002 hours through a combination of 100,000 networked personal computers and the EFF machi ne. DES remains a de facto standard unless a substitute is found (Landau, 2000, p. 341). A certified DES is obtained from the National Institute of Standards and Technology (NIST).This Advanced Encryption Standard (AES) works in three key lengths: 128, 192, and 256 bits. The publication of DES indicated a new era in cryptography. The development in the community of public cryptographers was enhanced by having an algorithm availability of study that the national security agent certified to be secure (Landau, 2000, p. 341). The (DES) Data Encryption Standard A system that encrypts quickly but is essentially what is impossible to break is all what cryptographers have always wanted. Public key systems have captured the imagination of mathematicians because of their reliance on elementary number theory.Public key algorithms are used for establishing a key because they are too slow to be used for most data transmissions. Private key system does the encryption because they are typically fa ster than public key ones (Landau, 2000, p. 341). The data Encryption Standard (DES) workhorse uses private key algorithm besides relying on cryptographic design principles that predate public key. The RC4 in web browsers and the relatively insecure cable TV signal encryption are an exception to DES. DES is the most widely used public cryptosystem in the world. It is the cryptographic algorithm which is used by banks for electronic funds transfer.It is also used for the protection of civilian satellite communications. Still, a variant of DES is used for UNIX password protection. There are three operation of the DES which involves XOR, substitution and permutation. The DES is an interrelated block cipher and a cryptosystem on a block of symbols that sequentially repeats an internal function which is called a round. It encrypts data by the use of a primitive that operates on a block of symptoms of moderate size. Self invert ability is also essential to enable one of the objects to enc rypt and decrypt. When encrypting ordinary text, DES begins by grouping the text into 64 bit block.A number of operations are performed by the DES on each block (Landau, 2000, p. 343). The transformation of how the block is to be carried out is determined by a single key of 56 bits. DES iterates sixteen identical rounds of mixing; each round of DES uses a 48-bit sub key. The DES begins with an initial permutation P and ends with its inverse. The permutations are of minor cryptographic implications but forms part of the official algorithm. The selection of sub keys starts by splitting the 56-bit key into two 28-bit halves and rotating each half one or two bits; either one bit in rounds 1, 2, 9, and 16 or two bits otherwise.The two halves are put back together and then 48 particular bits are chosen and put in order (Landau, 2000, p. 343). Attacks of DES The selection of DES was followed by protests in which case some of the researchers appeared to object to the algorithm small key spa ce. Investors in the key public cryptography claimed that a DES encoded message could be broken in about a day by a $ 20 million machine made up of a million specially designed VLSI capable of searching one key per microsecond while working in parallel.The use of a meet in the middle attack to break a four round version of DES did not extend past seven rounds (Landau, 2000, p. 345). This is evidence that, for all these attacks none of them posed a serious threat to the DES. Other attacks on the DES were performed to poke harder to the innards of DES. This brought anomalies which led to the first attacks that were seen to be more theoretically better than exhaustive search. The attacks were against the block structure system and the need of all block-structured cryptosystems needed to be designed to be secure against differential and linear cryptanalysis.There is a strong attack to DES which is differential cryptanalysis. This is apparently known to the algorithms designers. In order to design a secure cryptosystems, there is a need for a mixture of well known principles, some theorems and the presence of some magic. Attacks on a cryptosystem fall into two categories which are passive attacks and active attacks. The passive attacks are the ones which adversely monitors the communication channel. They are usually easier to mount although they yield less. The active attacks have the adversary transmitting messages to obtain information (Landau, 2000, p.342). The aim of the attackers is to determine the plaintext from the cipher text which they capture. A more successful attack will determine the key and thus compromise a whole set of messages. By designing their algorithms, cryptographer’s help to resist attacks such as cipher text only attack whose adversary has access to the encrypted communications. The known plain text attack which has its adversary has some plain text and its corresponding cipher text. The third attack which can be avoided is the chos en text attack and its adversary chooses the plain text for encryption or decryption.The plain text chosen by the adversary depends on the cipher text received from the previous requests (Landau, 2000, p. 342). Observations about DES The simplicity found in the DES amounts to some fully desirable properties. To start with it is the complementation. To illustrate, allow X to denote the bitwise complement of X. If C is the DES encryption of the plaintext P with key K, then P is the DES encryption of P with key K. In some cases the complementation can simplify DES cryptanalysis by basically cutting the investigating space in half.These properties do not cause serious weakness in the algorithm. The set generated by the DES permutations do not form a group. The group may have at least 102499 elements. There is strength in the DES when it lacks a group structure. It appears to be double encryption where this is twice by two different keys, EK2 (EK1 (P) and is not stronger than single encr yption. The reason is that when meeting in the middle attacks for a given plaintext cipher text pair, an adversary will compute all 256 possible enciphering of the plaintext i. e.EKi (P), and indexes the same. The adversary will then compute all possible deciphering of the cipher text (Landau, 2000, p. 345). Models of DES There are four forms of DES, which are accepted by FIPS 81. They include (ECB) Electronic Codebook form, code mass sequence form (CFB), productivity reaction form (OFB) and system response (CFB). The forms are used to with both DES and Triple DES. Within each form, there are main dissimilarities which are based on the fault proliferation and obstruct vs. tributary codes (Conrad, 2007). Electronic Codebook (ECB) ModeIn this form of encryption, there is sovereign encryption into respective blocks of codes text. It is done by means of Feistel code which generates 16 sub-inputs derived from the symmetric input and also encrypts the plaintext using 16 surroundings of co nversion. Similarly, the development is used in the conversion of code text reverse into simple text with the dissimilarity that, 16 sub inputs are contributed in overturn arrangement. The result of repeated blocks of identical plaintext is the repeated blocks of cipher text which is capable of assisting in the vault investigation of the code wording.In Appendix 1 there is an illustration of the result (Conrad, 2007). The first picture of SANS symbol is the bitmap layout. The second picture is the encrypted logo of SANS bitmap via DES ECB form. The visibility of the model is due to the recurring of masses of the simple wording pixels in the bitmap which are encrypted into masses which are repeated and are of particular code pixels. In this form, faults do not proliferate due to the autonomous encryption of each obstruct. Cipher Block Chaining (CBC) ModeThe CBC form is an obstruct code which XORs every original obstruct of simple wording with the previous block of code wording. This indicates that repeated obstructs of simple wording do not give rise to repeated obstructs of code wording. CBC uses a vector of initialization which is an arbitrary original obstructs used to make sure that two simple wordings result in different code wordings. In figure 2 of the Appendix there is a clear illustration of the same SANS symbol bitmap data, encrypted with DES CBC form. There is no visibility of any prototype which is true for all DES forms apart from ECB.Therefore, in this mode, there is proliferation of faults as each prior step’s encrypted output is XORed with the original obstructing of simple wording (Conrad, 2007). Cipher Feedback (CFB) Mode The Cipher Feedback Mode is a tributary code that encrypts simple wording by breaking into X (1-64) bits. This permits encryption of the level of byte or bits. This mode uses an arbitrary vector of initialization. The preceding elements of code wording are XORed with consequent components of code wording. Therefore, in this mode of CBC there is proliferation of faults (Conrad, 2007).Output Feedback (OFB) Mode Similar to CFB form, the productivity reaction form makes use of the vector of random initialization and also encrypts simple wording by shattering downward into a tributary by encrypting components of X (1-64) bits of simple wording. This form fluctuates from CFB form by generating a simulated-arbitrary tributary of productivity which is XORed with the plaintext during every step. Therefore, the productivity is fed back to the simple wording and because the output is XORed to the simple wording, faults there is no proliferation of mistakes (Conrad, 2007).Counter (CTR) Mode The oppose form is a tributary code similar to OFB form. The main disparity is the accumulation of contradict obstructs. The offset can be supplementary to an arbitrary importance that is used only once and then increased for each component of simple wording that is encrypted. The initial counter obstructs acts as a vecto r of initialization. Therefore, in each surrounding there is XORing of the offset obstructs with simple wording. Accumulation of offset obstructs permits disintegration of encryption into equivalent phases, improving presentation on a suitable hardware.There is no proliferation of mistakes (Clayton & Bond, 2002). (Table 1 in the Appendix summarizes the Data Encryption Standard). Triple DES (T DES) In anticipation of 2030, TDES can be used as FIPS encryption algorithm which is permitted in order to allow conversion to AES. There are three surroundings of DES which are used by TDES which have an input extent of 168 bits (56 * 3). There is a possibility of reduced effective key length of TDES to roughly 12 bits though beast might assaults against TDES re not realistic at present (Conrad, 2007).Architecture for Cryptanalysis All modern day practical ciphers both symmetrical and asymmetrical make use of security apparatus depending on their key length. In so doing, they provide a margin of security to cover from computational attacks with present computers. Depending on the level of security which is chosen for any software application, many ciphers are prone to attacks which unique machines having for instance a cost-performance ratio (Guneysu, 2006).Reconfigurable computing has been recognized as way of reducing costs while also acting as an alternative to a variety of applications which need the power of a custom hardware and the flexibility of software based design such as the case of rapid prototyping (Diffie & Hellman, 1977, pp. 74-84). What this means is that cryptanalysis of today’s cryptographic algorithms need a lot of computation efforts. Such applications map by nature to hardware based design, which require repetitive mapping of the main block, and is easy to extend by putting in place additional chips as is needed.However, it should be noted that the mere presence of resources for computation is not the main problem. The main problem is availab ility of affordable massive computational resources. The non-recurring engineering costs have enabled hardware meant for special purpose cryptanalysis in virtually all practicable situations unreachable. This has been unreachable to either commercial or research institutions, which has only been taken by government agencies as feasible (Diffie & Hellman, 1977, pp. 74-84).The other alternative to distributed computing with loosely coupled processors finds its base on the idle circles of the large number of computers connected through the internet. This method has considerably been successful for some applications. However, the verified detection of extraterrestrial life is considerably still a problem more so for unviable problems with power of computing in a particular organization (Guneysu, 2006). In cryptanalysis some algorithms are very suitable for special-purpose hardware.One main example for this is the search for the data encryption standard (DES) (FIPS, 1977). What this mean s is that a brute- force attack is more than twice the magnitude faster when put in place on FPGA’s as opposed to in software on computers meant for general purposes at relatively the same costs (FIPS, 1977). That notwithstanding, for many crypto algorithms the advantages due to cost-performance of hardware meant for special purposes over those meant for ordinary purposes is not really as dramatic as is usually the case of DES, more so for public-key algorithms (Guneysu, 2006).Arising from the advent of low-cost FPGA families with much logic approaches recently, field programmable gate arrays offer a very interesting way for the thorough computational effort which cryptanalysis needs (Lesnsta & Verheul, 2001, pp. 255-293). Many algorithms dealing with the most important problems in cryptanalysis is capable of being put in place on FPGAs. Code breaking though, requires more additional efforts as opposed to just programming a single FPGA with a certain algorithm (Electronic Fro ntier Foundation, 1998).Owing to the enormous perspectives of cryptanalysis problems, many more resources as opposed to FPGA are needed. This implies that the main need is massively powerful parallel machinery suited to the requirements of targeted algorithms. Many problems are capable of being put in parallel and are perfectly suited for an architecture distributed. Conventional parallel architectures for computing can theoretically be used for applications of cryptanalysis (Guneysu, 2006). An optical Architecture to Break Ciphers The targeted DES brute force attack has several characteristics.To begin with, expensive computational operations which are put in parallel. Next, there is no need of communication between single parallel instances. The next characteristic is the fact that the general expense for communication is not high owing to the fact that the stage of computation strongly outweighs the data input and output stages. According to Blaze et al, (1996), communication is almost entirely used for results reporting as well as initialization. A central control instance with regards to communication is capable of being accomplished by a conventional low cost personal computer, connected simply by an interface.This would imply that there is no need for a high-speed communication interface. The fourth characteristic is the fact that a DES brute-force attack and its following implementation require little memory. The final consequence of the above is the fact that the available memory on present day low cost FPGAs is sufficient (Guneysu, 2006). What this implies is that by making use of low-cost FPGAs, it is possible to develop a cost effective dynamic architecture which is capable of being reprogrammed which would be able to accommodate all the targeted architectures (Blaze et al, 1996).Realization of COPACOBANA Drawing back, the Cost-Optimized Parallel Code Breaker (COPACOBANA) meeting the needs available comprise of several independent-low prized FPGAs, connected to a hosting PC by way of a standard interface such as a USB. Moreover, such a standard interface permits to extend a host-PC with more than one device of COPACOBANA. The initialization of FPGAs, the control as well as the process of results accumulation is carried out by the host. Critical computations are carried out by the FPGAs, which meet the actual cryptanalytical architecture (Schleiffer, 2006).Developing a system of the above speculations with FPGA boards which are commercially available is certainly possible but at a cost. Therefore it is important to put into considerations the design and layout among others in coming up with the above kind of system (Schleiffer, 2006). This would therefore mean that our cost-performance design meant for cost optimization is only capable of being achieved if all functionalities are restricted to those required for code breaking. Arty the same time, many designs choices should be based on components and interfaces which are readi ly available (Guneysu, 2006).Conclusion In conclusion, cryptanalysis of symmetric and asymmetric ciphers is extremely demanding in terms of computations. It would be fair to hold the belief that breaking codes with conventional PCs as well as super-computers is very much costly. Bit-sizes of keys should be chosen in a way that traditional methods of code breaking do not succeed (Rouvroy et al 2003, pp. 181-193). This would mean that the only way to go through ciphers is to develop special-purpose hardware purposely meant for suitable algorithms.In the final analysis, traditional parallel architecture in the end equally appears to be too complicated and therefore not cost saving in finding solutions to cryptanalytical problems. As earlier observed, many of these problems can easily be put in parallel implying that the algorithms which correspond to them are equally capable of being parameterized to lower communication costs (Guneysu, 2006). A hardware architecture which is cost effec tive (COPACOBANA) is the end product of the algorithmic requirements of the intended problems of cryptanalysis.This work represents not only the design but also the first prototype of an effective design which meets the demands of the request. In the final analysis, COPACOBANA would be able to accommodate as many as 120 FPGAs which are less costly. At the same time, it is possible to break data encryption standard (DES) within a period of nine days. This would require a hardware design comprising of reprogrammable logic which could be adopted to accommodate any task, even those not necessarily in line with code breaking (Rouvroy et al 2003, pp. 181-193). References Blaze, M.. , Diffie, W. , Rivest, R. L., Scheiner, B. , Shimomura, E. , and Weiner, M (1996). Minimal Key Lengths for Symmetry Ciphers to Provide Adequate Commercial Security. Ad Hoc Group of Cryptographers and Computer Scientists. Retrieved from December, 13, 2008 from http://www. counterpane. com/keylength. html. Clayto n, R. and Bond, M. (2002). Experience Using a Low-Cost FPGA Design to Crack DES Keys. In B. S. Kaliski, C. K. Koc Cetin, and C. Paar, editors, Cryptographic Hardware and Embedded Systems – CHES 2002, 4th International Workshop, Redwood Shores, CA, USA,volume 2523 of series, pages 579 – 592. Springer-Verlag. Conrad, E. (2007).Data Encryption Standard, The SANS Institute Diffie, W & Hellman, M. E. (1977). Exhaustive cryptanalysis of the NBS Data Encryption Standard. Computer, 10(6): 74-84 Electronic Frontier Foundation. (1998). Cracking DES: Secrets of Encryption Research, Wiretap Poolitics & Chip Design. O’Reilly & Associates Inc. Federal Information Processing Standard. (1977). Data Encryption Standard, U. S Department of Commerce. Guneysu, T. E. (2006). Efficient Hardware Architecture for Solving the Discrete Logarithm Problem on Elliptic Curves. AAmasters thesis, Horst Gortz Institute, Ruhr University of Bochum. Landau, S.(2000). Standing the Test of Time: The Data Encryption Standard vol. 47, 3, pp. 341-349. Lenstra, A and Verheul, E. (2001). Selecting Cryptographic Key Sizes. Journal of Cryptology, 14(4):255–293. Rouvroy, G. , Standaert, F. X. , Quisquater, J. , and Legat, D. (2003). Design Strategies and Modified Descriptions to Optimize Cipher FPGA Implementations: Fast and Compact Results for DES and Triple-DES. In Field-Programmable Logic and Applications- FPL, pp. 181-193 Schleiffer, C. (2006). Design of Host Interface for COPACOBANA. Technical report, Studienarbeit, Host Gortz Institute, Ruhr University Bochum