Saturday, August 31, 2019

Bluetooth Simulation

VIDYAVARDHINI’S COLLEGE OF ENGINEERING AND TECHNOLOGY ELECTRONICS AND TELECOMMUNICATION FINAL YEAR [2004-2005] A REPORT ON BLUETOOTH TECHNOLOGY PREPARED BY JANHAVI KHANOLKAR NAVEEN BITRA YASHESH MANKAD TABLE OF CONTENTS 1. INTRODUCTION 2. HISTORY 3. WHAT IS BLUETOOTH? 4. BLUETOOTH SPECIFICATIONS 5. BLUETOOTH NETWORKS 6. HOW DOES BLUETOOTH WORK? 7. BLUETOOTH PROTOCOL STACK 8. BLUETOOTH SECURITY 9. APPLICATIONS 10. MERITS AND DEMERITS INTRODUCTION: Bluetooth was originally conceived to replace the rat’s nest of cables typical in any PC setup today and this remains a compelling home application.However, as the Bluetooth evolved it became clear that it would also enable a totally new networking paradigm, Personal Area Networks (PANs)! With PAN technology a user will be able to organize a collection of personal electronic products (their PDA, cell phone, laptop, desktop, MP3 player, etc. ) to automatically work together. For instance the contact manager and calendar in the P DA, laptop, and desktop could all automatically synchronize whenever they are within range of each other). Over time PANs will revolutionize the user experience of consumer electronics.Finally, Bluetooth’s dynamic nature will also revolutionize connectivity to the rest of the world. Bluetooth will automatically discover devices and services nearby so available servers, internet access, printers etc. will automatically become visible to a Bluetooth device wherever it is. HISTORY: Bluetooth is an open specification for short range wireless voice and data communications that was originally developed for cable replacement in personal area networking to operate all over the world.By enabling standardized wireless communication between any electrical devices, Bluetooth has created the notion of a personal Area Network (PAN), a kind of close range wireless network that looks set to revolutionize the way people interact with the information technology landscape around them. In 1994 t he initial study for development of this technology started at Ericsson, Sweden. In 1998, Ericsson, Nokia, IBM, Toshiba, and Intel formed a Special Interest Group (SIG) to expand the concept and develop a standard under IEEE 802. 15 WPAN (Wireless Personal Area Network ).In 1999, the first specification was released and accepted as the IEEE 802. 15 WPAN standard for 1Mbps networks. The Bluetooth SIG considers three basic scenarios: †¢ The first basic scenario is the Cable Replacement ie. the wire replacement to connect a PC or laptop to its keyboard, mouse, microphone, and notepad. It avoids the multiple short range wiring surroundings of today’s personal computing devices. †¢ The second scenario is ad hoc networking of several different users at very short range in an area such as a conference room. The third scenario is to use Bluetooth as an AP to the wide area voice and data services provided by the cellular networks, wired connections or satellite links. Why th e name Bluetooth? The story of origin of name Bluetooth is interesting. †Bnluetooth† was the nickname of Harald Blaatand, 10th century Viking who united Denmark and Norway. When Bluetooth specification was introduced to public, a stone carving, erected from Harald Blaatand’s capital city Jelling was also presented. This strange carving was interpreted as Bluetooth connecting a cellular phone and a wireless notepad in his hands.The picture was used to symbolize the vision in using Bluetooth to connect personal computing and communication devices. What is BLUETOOTH? [pic] Figure1: Bluetooth system blocks The Bluetooth system consists of a radio unit, a link control unit, and a support unit for link management and host terminal interface functions (see Figure 1). The Host Controller Interface (HCI) provides the means for a host device to access Bluetooth hardware capabilities. For example, a laptop computer could be the host device and a PC card inserted in the PC is the Bluetooth device.All commands from the host to the Bluetooth module and events from the module to the host go through the HCI interface. The protocol stack is above the radio and baseband hardware, partly residing in the Bluetooth unit and partly in the host device. A Bluetooth solution can also be implemented as a one-processor architecture (embedded solution) where the application resides together with the Bluetooth protocols in the same hardware. In that case, the HCI is not needed. This is a feasible implementation for simple devices such as accessories or micro servers.Requirements of Bluetooth technology: †¢ If Bluetooth technology is to replace cables, it can not be much more expensive than a cable or nobody will buy it. †¢ Because Bluetooth technology is designed for mobile devices it must be able to run on batteries. So it must be very low power and should run on low voltages. †¢ It must also be lightweight and small enough not to intrude on the design o f compact mobile devices such as cellular phones, handsets etc. †¢ It must be as reliable as the cable it replaces and also it must be resilient. †¢ Bluetooth devices operate at 2. GHz in globally available, license free ISM band, which obey a basic set of power and spectral emission and interference specifications. THUS Bluetooth has to be very robust, as there are many existing users and polluters of this shared spectrum. Thus Bluetooth aims to be widely available, inexpensive, convenient, easy to use, reliable, small and low power. Specifications related with Bluetooth: |PARAMETER |VALUES | |Frequency Range |2. – 2. 4835 GHz | |Bandwidth of each channel |1MHz | |Data rate |1 Mbps | |Frequency hopping rate |1600 hops per seconds | |Range of operation |10-100 meters | Bluetooth system operates in 2. GHz Industrial Scientific Medicine (ISM) band. The operating band is divided into 1MHz spaced channels each signaling data at 1 Mbps so as to obtain maximum available channel bandwidth with chosen modulation scheme of GFSK (Gaussian Frequency Shift Keying). Using GFSK, a binary 1 give rise to a positive frequency deviation from the nominal carrier frequency while binary 0 gives rise to a negative frequency deviation. After each packet both devices retune their radio to a different frequency, effectively hopping from radio channel from radio channel.In this way Bluetooth devices use the whole of available ISM band and if transmission is compromised by interference on one channel, the retransmission will always be on a different channel. Each Bluetooth time slot lasts 625 microseconds giving rise to frequency hopping rate of 1600 hops per seconds. Generally devices hop once per packet. .For long data transmission, particular users may occupy multiple time slots using the same transmission frequency thus slowing instantaneous hopping rate to below 1600 hops/ sec. BLUETOOTH NETWORKS: PICCONETS AND SCATTERNET:The Bluetooth network is called a piconet . In the simplest case it means that two devices are connected (see Figure 2a). The device that initiates the connection is called a master and the other devices are called slaves. The majority of Bluetooth applications will be point-to-point applications. Bluetooth connections are typically ad hoc connections, which means that the network will be established just for the current task and then dismantled after the data transfer has been completed. A master can have simultaneous connections (point-to-multipoint) to up to seven slaves (see Figure2b).Then, however, the data rate is limited. One device can also be connected in two or more piconets. The set-up is called scatternet (see Figure 2c). A device can, however, only be a master to one piconet at a time. Support for hold, park, or sniff mode is needed for a device to be part of the scatternet. In these modes a device does not actively participate in a piconet, leaving time for other activities such as participating in another pic onet, for example. The master/slave roles are not necessarily fixed and can also be changed during the connection if, for example, the master does not have enough esources to manage the piconet. Master/slave switch is also needed in the scatternet. Master/slave switch support is not mandatory. Most of current Bluetooth implementations support piconets only. Point-to-multipoint support depends on the implementation Figure 2. Bluetooth piconet and scatternet scenarios: a) Point-to-point connection between two devices b) Point-to-multipoint connection between a master and three slaves c) Scatternet that consists of three piconets Modes of operation: In connection state, the Bluetooth unit can be in several modes of operation.Sniff, hold, and park modes are used to save power or to free the capacity of a piconet: Active mode: In the active mode, the Bluetooth unit actively participates on the channel. Sniff mode: In the sniff mode, the duty cycle of the slave’s listen activity ca n be reduced. This means that the master can only start transmission in specified time slots. Hold mode: While in connection state, the ACL link to a slave can be put in a hold (possible SCO links are still supported). In hold mode, the slave can do other things, such as scanning, paging, inquiring, or attending another piconet.Park mode: If a slave does not need to participate in the piconet but still wants to remain synchronized to the channel (to participate in the piconet again later), it can enter the park mode. It gives up its active member address. Park mode is useful if there are more than seven devices that occasionally need to participate in the same piconet. The parked slave wakes up regularly to listen to the channel in order to re-synchronize and to check for broadcast messages sent by the master.. FREQUENCY HOPPING :Bluetooth technology uses a frequency hopping technique, which means that every packet is transmitted on a different frequency. In most countries, 79 chann els can be used. With a fast hop rate (1600 hops per second), good interference protection is achieved. Another benefit is a short packet length. If some other device is jamming the transmission of a packet, the packet is resent in another frequency determined by the frequency scheme of the master. This scenario is depicted in Figure 3 where packets of device 1 (colored packets) and device 2 (banded packets) are trying to use the same frequency.Note that this case only refers to situations where there are two or more simultaneous active piconets or a non-Bluetooth device using the same frequency in range. The error correction algorithms are used to correct the fault caused by jammed transmissions Figure 4. Three-slot and five-slot long packets reduce overhead compared to one-slot packets. 220  µs switching time after the packet is needed for changing the frequency. Subsequent time slots are used for transmitting and receiving. The nominal slot length is 625 (s.A packet nominally c overs a single slot, but can be extended to cover three or five slots, as depicted in Figure 4. In multi-slot packets the frequency remains the same until the entire packet is sent. When using a multi-slot packet, the data rate is higher because the header and a 220 (s long switching time after the packet are needed only once in each packet. On the other hand, the robustness is reduced: in a crowded environment the long packets will more probably be lost HOW DOES BLUETOOTH WORKS? Bluetooth devices have 4 basic States.They can be a Master (in control of a Piconet — represented by a large blue circle above), an Active Slave (connected and actively monitoring/participating on a Piconet — medium orange circles), a Passive Slave (still logically part of a Piconet but in a low power, occasionally monitoring but still synchronized, inactive, state — medium gray circles), and Standby (not connected to a Piconet, occasionally monitoring for inquiries from other devices, but not synchronized with any other devices — small white circles). IN IDEAL STATE Bluetooth devices initially know only about themselves and in this state they will be in Standby mode.Standby is a passive mode where a Bluetooth device listens on an occasional basis performing what are called Inquiry and/or Page Scans for 10 milliseconds out of every 1. 28 seconds to see if any other Bluetooth devices are looking to communicate. Passive behavior is inherent to half of Bluetooth’s states and is a key mechanism to achieving very low power. In Standby mode the Bluetooth device’s occasional attention reduces power consumption by over 98%. While all of the Bluetooth devices in the same mode it is important to note that they are NOT synchronized or coordinated in any way.Thus they are all listening at different times and on different frequencies. [pic] Enquiry and page procedures lead to connections ENQUIRY: Inquiry is how a Bluetooth device learns about other devices that are within its range. In the illustration above Node A executes a Page Function on the BT Inquiry ID and receives replies from other devices. Through these replies device A learns the explicit identity of these other devices (i. e. their unique Bluetooth device ID). During the Inquiry process device A continuously broadcasts the Page command using the reserved Inquiry ID which identifies it as as a Page Inquiry.These broadcasts are spread across a standard pattern of 32 Standby radio frequencies which all devices in Standby mode monitor on an occasional basis. Over a duration of some seconds it is certain that every Standby device within range will have received the Inquiry Page even though they are not synchronized in any way. By convention these nodes will respond with a standard FHS packet that provides their unique BT ID and their clock offset. With these parameters the Inquiring node can effect low latency synchronized connections.Node H (the dotted circle above) illustra tes how a Bluetooth device can be programmed to remain anonymous (Undiscoverable in BT jargon). This is a user controlled feature that suspends Inquiry Scanning, and thus device A’s Inquiry Procedure cannot discover Device B It is important to note that device H will continue to support Page Scanning however, and thus a user’s other personal devices (i. e. PAN) can penetrate this barrier by Paging directly to its unique Bluetooth ID. This is information that PAN devices can be configured to know and remember thus enabling private collaboration even when devices are undiscoverable.PAGING: In its general form the Page command establishes a formal device to device link between a Master (the originator) and a Slave. Master/Slave connections in Bluetooth are referred to as a Piconet. To create the piconet device A broadcasts the Page command with the explicit device ID of the target Slave (B in the illustration above) which was learned earlier through an Inquiry Procedure. Further, this connection can be very low latency if the Inquiry data is recent (and thus synchronization can be accurate), but the process will simply take longer if this is not the case.All Bluetooth devices except B will ignore this command as it is not addressed to them. When the device B replies, device A will send it an FHS packet back and assign it an Active Member Address in the Piconet. As an Active Slave device B will begin continuously monitoring for further commands from device A in synchronization with device A’s hopping pattern and clock offset. Further, standard Piconet activity continuously updates the clock offset data keeping the synchronization extremely accurate. Thus the Master and Slave states are not low power but exhibit very low transaction latencies. EXPANDING A PICCONET:Through successive Page commands a Bluetooth Master can attach up to 7 Active Slaves. 7 is a hard limit as only 3 bits are allocated in Bluetooth for the Active Member Address (AMA) w ith 000 reserved for the Master and the remaining addresses allocated to Slaves. Practically, 7 is more than sufficient given Bluetooth’s modest performance and dynamic configurability. Again, all Active Slaves to A continuously monitor for further commands addressed to them in synchronization with device A’s hopping pattern. PARKING: Parking is a mechanism that allows a Bluetooth Master to connect to an additional 256 devices. 56 is a hard limit as 8 bits are allocated in Bluetooth for the Parked Member Address (PMA). To Park a device the Bluetooth Master issues a Park command to an Active Slave and assigns it a PMA. This Slave then enters the Parked mode and surrenders its AMA. As a Parked Slave the device will revert to a passive mode and only monitor for commands on an occasional basis. The difference between Standby and Parked however is that the Slave will remain synchronized to the Master’s hopping pattern and regularly update its clock offset. Thus this device can be reconnected at any time with a minimum latency.BLUETOOTH PROTOCOLS: Protocols are needed to implement different profiles and usage models. Every profile uses at least part of the protocol stack. In order to achieve interoperability between two Bluetooth devices, they both must have the same vertical profile of the protocol stack. Bluetooth Core Protocols Baseband and Link Control together enable a physical RF link between Bluetooth units forming a piconet. This layer is responsible for synchronizing the transmission-hopping frequency and clocks ofdifferent Bluetooth devices [Whitepaper1, p. ]. Audio is routed directly to and from Baseband. Any two Bluetooth devices supporting audio can send and receive audio data between each other just by opening an audio link . Link Manager Protocol (LMP) is responsible for link set-up (authentication and encryption, control, and negotiation of baseband packets) between Bluetooth devices and for power modes and connection states of a Bluetooth unit. Logical Link Control and Adaptation Protocol (L2CAP) takes care of multiplexing, reassembly, and segmentation of packets.Service Discovery Protocol (SDP) is needed when requesting device information, services, and the characteristics of other devices. Devices have to support the same service in order to establish a connection with each other. Cable Replacement Protocol RFCOMM emulates RS-232 signals and can thus be used in applications that were formerly implemented with a serial cable (e. g. , a connection between a laptop computer and a mobile phone). Telephony Protocol Binary (TCS-BIN) defines the call control signaling for the establishment of speech and data call between Bluetooth devices.AT commands provide means for controlling a mobile phone or a modem. Adopted Protocols OBEX (Object Exchange) is adopted from IrDA. It is a session protocol that provides means for simple and spontaneous object and data transfer. It is independent of the transport mechanism an d transport Application Programming Interface (API). TCP/UDP/IP is defined to operate in Bluetooth units allowing them to communicate with other units connected, for instance, to the Internet. The TCP/IP/PPP protocol configuration is used for all Internet Bridge usage scenarios in Bluetooth 1. and for OBEX in future versions. The UDP/IP/PPP configuration is available as transport for WAP. PPP in the Bluetooth technology is designed to run over RFCOMM to accomplish point-to-point connections. PPP is a packet-oriented protocol and must therefore use its serial mechanisms to convert the packet data stream into a serial data stream. The Wireless Application Protocol (WAP) stack can reside on top of RFCOMM (based on LAN Access Profile) or on top of L2CAP (based on PAN Profile). The latter reduces overhead and is likely to become the preferred solution for WAP over Bluetooth.Wireless Application Environment (WAE) hosts the WAP browser environment. Dial up networking (DUN) profile protocol stack: DUN profile is inside the Serial Port Profile and therefore partly reuses the capabilities of the Serial Port Profile. For the DUN Profile, there are two device configurations (roles): †¢ Gateway (GW) is the device that provides access to the public network (typically mobile phones and modems) †¢ Data terminal (DT) is the device that uses the dial-up services of the gateway (typically PCs) The DUN Profile needs a two-piece protocol stack and an SDP branch.PPP over RFCOMM is needed for transferring payload data. AT commands are delivered over RFCOMM to control the modem (mobile phone). The application on top of the stack is either a driver application on a PC (data terminal) or the modem emulation on a phone (gateway). Bluetooth security: secret key All Bluetooth devices (master and slave) share a secret key in a particular system. This key is used during the authentication and encryption process. This key is not transmitted over the channel but is rather in-built b y the manufacturer. AUTHENTICATIONAuthentication ensures the identity of Bluetooth devices. Authorization is a process of deciding if a device is allowed to have access to a specific service. User interaction may be required unless the remote device has been marked as â€Å"trusted. † Usually the user an set authorization on/off to every remote device separately. Authorization always requires authentication. Authentication in Bluetooth is performed by an encryption engine which uses the SAFER+ algo. This algorithm requires the following: †¢ Number to be encrypted or decrypted †¢ master address †¢ Master clock secret key shared by master and slave. A random number is generated by the encryption engine using various keys. This random number is encrypted by the master using the secret key. This number is also sent to the slave. The encrypted reply of the slave is compared with the master encrypted data. If it is a match then the slave is authentic. BONDING AND PAI RING Pairing is a procedure that authenticates two devices based on a common passkey, thereby creating a trusted relationship between those devices. An arbitrary but identical passkey must be entered on both devices.As long as both devices are paired, the pairing procedure is not required when connecting those devices again (the existing link key is used for authentication). Devices without any input method, like headsets, have fixed passkeys. When two devices are linked with a common link the connection is called as bonding. There are two types of bonding: †¢ Dedicated bonding: Used to create and exchange a link key between two devices. †¢ General bonding: Data over the link is available for higher layers. ENCRYPTION Encryption protects communication against eavesdropping.For example, it ensures that nobody can listen to what a laptop transmits to a phone. Encryption demands the following: †¢ Negotiating encryption mode †¢ Negotiating key sizes-The key size coul d vary from 8 to 128 bits †¢ Starting encryption †¢ Stopping encryption SECURITY LEVELS A trusted device has been previously authenticated, a link key is stored, and the device is marked as â€Å"trusted† in the security database of a device. The device can access Bluetooth services without user acceptance. An untrusted device has been previously authenticated, a link key is stored, but the device is not marked as â€Å"trusted. Access to services requires acceptance of the user. An unknown device means that there is no security information on this device. This is also an untrusted device. Security Level of Services Authorization required: Access is only granted automatically to trusted devices or untrusted devices after an authorization procedure (‘Do you accept connection from remote device? ’). Authentication is always required. Authentication required: The remote device must be authenticated before connecting to the application. Encryption required : The link must be changed to encrypted before accessing the service.It is also possible that a service does not require any of these mechanisms. On the other hand, the application (service) might have its own user authentication mechanisms (a PIN code, for example). APPLICATIONS: 1. Bluetooth in the home will ultimately eliminate most every cable related to consumer electronics (except power). Your PC, scanner, and printer will simply need to be within 10 meters of each other in order to work. Your PDA, digital camera, and MP3 player will no longer need a docking station to transfer files or get the latest tunes (the exception will be to recharge, that power thing again).And, your home stereo and other equipment will join the party too. On the telephone front your cell phone will synchronize its address book with your PC and function as a handset to your cordless phone in the house (answering incoming calls to your home number and calling out on the cheaper land line too). Finally, even though its only 720Kbps, Bluetooth is still pretty fine for broadband internet access since DSL and cable modems are typically throttled to about 384K anyway. Bluetooth access points could well be as ubiquitous as 56K modems in 2 or 3 years. . On the road much of your Bluetooth PAN goes with you. Even when your laptop is in your briefcase and your cell phone is in your pocket they will be able to collaborate to access e-mail. And, next generation cell phones featuring Bluetooth and General Packet Radio (GPR) technology will function as a wireless modems with internet access at 100Kbps+. With such performance it is likely web based e-business will flourish and these devices will become the most prevalent Bluetooth access points.This may well be the Killer App that ensures Bluetooth’s widespread adoption and success. When you are literally on the road your car will join your PAN too. Here your cell phone may operate in a hands free mode using the car audio system and an i n-dash microphone even while comfortably in your pocket. Or you may use a wireless Bluetooth headset instead. And, your MP3 player will likely play music in 8 speaker surround sound, rip music right off of an FM broadcast, or record your phone calls for later review. And all without wires!!!Fixed land line access points (supporting up to 720Kbps) such as a pay phone in the airport terminal or lounge, or the desk phone in your hotel, will provide true broadband access in these strategic locations. Also look for the pay phone to evolve to compete for your cell phone calls too with its low cost land lines. In the world of deregulation and open competition future smart phones may even put your calls out for bid and channel the traffic over the carrier offering the lowest cost! 3. Telephone applications †¢ Hands free use †¢ File synchronization †¢ Calendars †¢ Contact management Land line I/F for voice and data 4. Consumer applications †¢ File transfer †¢ MP 3 †¢ Digital pictures †¢ Peripheral connectivity †¢ Keyboard/mouse/remote †¢ Printer ADVANTAGES: 1. Point to point and point to multiple links 2. Voice and data links 3. Compact form factor 4. Low power 5. Low cost 6. Robust frequency hopping and error correction 7. Profiles ensure application level 8. High level of security through frequency hopping, encryption and authentication 9. Non directional 10. Unlicensed ISM band LIMITATIONS: 1. 8 Devices per piconet with limited extension via scatternet 2.Short range 3. No handover facility 4. Maximum data rate of 723. 2 Kb/s 5. occupies the crowded ISM band 6. Slow connection setup References: †¢ Bluetooth 1. 1 —Jenifer Bray †¢ Wireless Communication -Krishnamurthy †¢ Bluetooth Specifications, Bluetooth SIG at http://www. bluetooth. com †¢ Bluetooth Protocol Architecture v1. 0, Riku Mettala, Bluetooth SIG, August 1999 http://www. bluetooth. org/foundry/sitecontent/document/whitepapers_presen tations †¢ Bluetooth Security Architecture, Thomas Muller, Bluetooth SIG, July 1999 http://www. bluetooth. rg/foundry/sitecontent/document/whitepapers_presentations †¢ Comprehensive Description of the Bluetooth System v0. 9p, Dan Sonnerstam, Bluetooth SIG, May 1998 http://info. nsu. ac. kr/cwb-data/data/ycra2/comprehensive_description_of_the_BT_system. pdf †¢ Bluetooth Technology Overview, version 1. 0, April 2003 http://forum. nokia. com ———————– [pic] Digital Camera Computer Scanner Home Audio System MP3 Player PDA Cell Phone Operational States Master Active Slave Parked Slave* Standby* ON THE ROAD Laptop PDA Cell Phone MP3 Player Headset Hotel Phone & Access Point

Friday, August 30, 2019

Compare and Contrast a Doll House and a Streetcar Named Desire

Compare and contrast A Doll House by Henrik Ibsen and A Streetcar Named Desire by Tennessee Williams. Write a brief essay (of approximately 1000 words) to comment on the two female protagonists’ (Nora Helmer and Blanche Duboi’s) relationship with men. A Doll House by Henrik Ibsen and A Streetcar Named Desire by Tennessee Williams are two well-known plays that give rise to discussions over male-female relationships in old society. The female protagonists in the plays are women who are dependent on males.However, the female protagonist in A Doll House is able to transcend her status by try to be dependent on herself at the end of the play, whereas the one in A Streetcar Named Desire still continues to depend on men. In this essay, I am going to discuss the relationships with men of the two female protagonists, Nora Helmer and Blanche Dubois. In A Doll House by Henrik Ibsen, Nora Helmer is the female protagonist of the play. She is a housewife in the Helmer’s family . She has undergone a transformation throughout the play that she reacts differently to her husband.Nora’s relationship with her husband, Torvald, is important in the development of the plot. In the first scene, Nora appears to be happy and have an affectionate family. Although she tries to defy her husband in some unimportant ways, for example, she lies to her husband about eating macaroons, she still maintains a good relationship with her husband. However, minor incident actually foreshadows the confrontation between her husband and her later when the play continues. As the plot develops, Nora is actually not as simple as other wives that she does not totally obey her husband.The contradiction between Nora’s independent nature and the tyrannical authority of Torvald arouses a climax in the play when Torvald discovered a lie of Nora. The lie shows a big contrast of their relationship before and after the disclosure. Before Torvald discovers the truth behind the decept ion, the relationship between his wife and him seems to be perfect and loving. At the beginning of the play, Nora does not seem to notice her life being manipulated by her husband; she does everything according to her husband’s taste and preference.Meanwhile, she manages to save her husband from poor health condition by breaking the law to borrow debt from Krogstad and repaying it with pocket money from her husband. It is apparent that Nora is very smart and clever to handle difficulties not only for herself but also her husband. But instead of being a capable woman, she chooses to live up to the expectation of her husband, seeming to be isolated from the outside world but to live in the world that her husband and father has set up for her. When it comes to other relationships with men, Nora respects her husband.She refuses to accept Dr Rank’s admiration of her, and she also defends and supports her husband in front of Krogstad. Besides, She practices the dance for him so as to defense her husband’s pride in front of people and not to embarrass him. These are the evidence proving that Nora is like a doll being controlled. She follows what men in her life, her father and Torvald, expect her to do, and this is the way she does to maintain good relationship with them. However, the relationship goes upside down after Torvald’s unveiling of the secret that Nora has been hiding from Torvald whom she borrows money from.At the end of the play, the climatic confrontation between Nora and Torvald shows that Nora realizes the need to live for herself rather than men. She wants to put the marriage to a halt just because she does not want to rely on men anymore by pretending to be someone she is not in order to please her husband. As she determines to be independent, she left her husband and family at the end of the play to show that she will never be related to anyone but herself. This action represents the idea of feminism and arouses the awar eness of woman’s rights. Blanche Dubois in A Streetcar Named Desire, on the other hand, is contrasted with Nora Helmer.When the play begins, she is portrayed to be educated and well-mannered woman. Blanche does not agree with the beastly lifestyle of her sister’s husband, Stanley. She thinks that he is so common and ape-like. This shows that they cannot get along well with each other during Blanche’s staying at their home. When the play develops, Stanley quickly seeks out that Blanche is actually a fallen woman. She lost her husband and her family fortune. She has sexual affairs with some men and addition to alcohol. Therefore, she needs much male admiration to maintain her remaining self-esteem.Besides, she wants to marry a man as a shelter so that she can escape poverty as well as her bad reputation in society. Mitch, therefore, is a chance for Blanche because he likes her very much. However, before they decide to be together, Stanley tells Mitch about Blanche ’s indiscrete sexual behavior in the past. This destroys Blanche’s pursuit of Mitch. After this incident, Blanche even makes up a story about going on vacation with a billionaire. It is obvious to see that Blanche always rely on men in her life, looking for admiration and a shelter for her from the tough reality.So, she always pretends to be someone men like in order to please them rather than being a true self. She even acts in front of men in the way that she does not really feel like that. Unlike Nora, Blanche is pathetic when it comes to relationship with men. While Nora undergoes a transformation from a controlled doll to a strong woman who determines to restart her life again for the better, Blanche continues to rely on men heavily. In the last scene, Blanche is still so willing to be led away by a kind male doctor to asylum just because the doctor is a gentleman.This tells us Blanche’s desperate and total dependence on men. When we compare Nora Helmer and Blanche Dubois, we can see that they are two females of the opposites. Although both of them shows a confrontation between men and themselves, and both of them seem to be manipulated by men, Nora demonstrates a more positive way to challenge with men’s dominance while Blanche shows a pathetic way which can be said a lack of feminism. The comparison of these two female characters stirs up a debate of women’s rights. It also brings us to a higher level of discussion on the tension of the gender roles in society.

Thursday, August 29, 2019

Using the internet research the topic effective study strategies Essay

Using the internet research the topic effective study strategies - Essay Example Ineffective study strategies have led to failure among students (Langan, 2007). To make sure that I do not fall victim, I choose to adopt measures to improve my skills in reading, writing and test taking. Of paramount importance would be to make sure that all assignments involving reading are read before and soon after the class. I will not just be highlighting examinable headlines but will also read the contents actively. In as much as I could be in a hurry to finish reading, speed and intensity would be adjusted where the material is difficult to comprehend. I will use the available material from the library to read beyond the case text for clarity. It could be helpful if I also write as I read as suggested by Durukan (2011). Tutors and professors will be sought for their opinion on what I have written as drafts or initial thesis while seeking to express my ideas as opposed to impressing with vocabulary. When taking tests, the proposition of Mach et al. would be helpful as I will r ead the questions, understand what it seeks to answer and leaving none unanswered (2008). I will avoid mistaking it with skimming, which would still remain an important aspect. In my study timetable, I will re-arrange all reading schedules to come after and before their respective classes and include a 30-minute consultation time with my tutor every week. I will also introduce 3-hour weekly test practice on my

Wednesday, August 28, 2019

Reauthorization of the Endangered Species Act Assignment

Reauthorization of the Endangered Species Act - Assignment Example The loss of habitats for most wildlife is the main cause of listing of species. On listing of a certain species, legal and powerful means are availed to protect its habitats. In the same way, when resources are associated with the listed species, for example water in dry regions or free-flowing rivers, ESA is seen as a hindrance to greater human utilisation. ESA may also be controversial since the diminishing species usually are harbingers of broader ecosystem conflicts. This makes ESA a major driver of large-scale ecosystem restoration issues (Miller & Spoolman 315).Previous congresses have held oversight hearings on the implementation of certain federal laws and programs addressing endangered and threatened species (Snape and Weiner 61). Some of the hearings involved topics such as delisting and listing decisions under ESA to validate endowment levels for international programs of conservation. The 113th congress that will be held will include discussion of issues like how to allocate programs and activities that seek to assist the adaptation of certain species to changes in climate. Another issue that will be discussed concerning ESA will be concerned with the role of Science in making decisions on essential habitat designation, suitable fortification of listed species, incentives for property owners among other decisions (Miller & Spoolman 315). ESA is one of the most contentious environmental regulations due to its substantive requirements that influence the use of both non-federal and federal resources and lands. Under the law, species are to be listed as in danger of extinction based solely on the most significant scientific information without regarding economic factors (The University of Michigan 6). Congress is faces the matter of how to weigh the safeguarding of endangered species with economic interests (Heather & Snape 62). Strong opposition has been the major cause of failure to reauthorize ESA. The last reauthorization

Tuesday, August 27, 2019

Popular Music Since The 1950s As The Exploitation Of Black Music By Essay

Popular Music Since The 1950s As The Exploitation Of Black Music By White Artists And Corporations - Essay Example A number of scholars propose the idea that African-American culture and music were effective expression forms and social inclusion means. Although they originate from the folk music of the African-American slaves, â€Å"the root cause of transnational black identity† (Gilroy The Black Atlantic 1992, p.60), it served as an effective instrument for cultural and social inclusion throughout the 20th century. The introduction of blues, jazz and other black music genres provided blacks a strong impact over American culture and a distinguishing place in a society that was fundamentally closed to black people well into the 20th century (Chiriguayo 2002), (Dwight 1995). In the study The Spirituals and the Blues the African-American scholar James H. Cone (1991, p. 130) argued that â€Å"whatever form black music takes, it is always an expression of black life in America and what the people must do to survive with a measure of dignity in a society which seems bent on destroying their ri ght to be human beings†. The book Blues People is the first real try to place major black music genres as blues and jazz within the setting of Afro-American social history, it illuminates the impact of blacks on American history and culture. Terry Jones (2005) asserts that the blues is a musical opera about life and times of Black America. The blues is the story of Black America in worldly musical form. However, Harrison (1997, p. 18) insisted that â€Å"blues was always a multi-racial music.... The Wikipedia encyclopedia, defines that the term exploitation may carry two distinct meanings: (1) the act of utilizing something for any purpose. In this case, exploit is a synonym for use; (2) the act of utilizing something in an unjust or cruel manner for one's own advantage. Most often, the word exploitation is used to refer to economic exploitation - the act of using another person's labor without offering them an adequate compensation. The Marxist theory is primarily concerned with the exploitation of a whole segment or class of society by another. From this point of view the black music is exploited by whites. Article of Phil Rubio 'Crossover Dreams' (1993) provides a curious vision of the confrontation between black art forms and white performers. In many cases white musicians are motivated by envy or admiration for the emulated black performers. And we see the utilization of African-American culture by whites to find the spirit and humanity, they feel they've lost. It is known that the end of a constant source of interchange and friction should not be seen as the start as 'whites have been playing black music for decades' (Davis 1995, p.84). We are not to locate the first white blues performer. The phenomenon of numerous white musicians taking up the black music is a fairly modern spectacle, beginning in the late 1950s and the early 1960s. One of the first objections to this phenomenon was made by Charles Radcliffe in the UK publication Anarchy (1965). Of course, many people did not consider singing in a black vocal style to be part of blues performance, moreover many feel that whites who have uneasy destiny, for example Hank Williams, sing in their own suffering manner, a distinctively non-black style. We can agree that

Monday, August 26, 2019

The main reason couples divorce Essay Example | Topics and Well Written Essays - 1500 words

The main reason couples divorce - Essay Example Gender and Society construction play a major role in the occurrence of divorce leading to many reasons why couples end up divorcing. The most considered reasons are a lack of commitment, unrealistic expectations, lack of equality in the relationship, abuse, and infidelity, lack of communication and financial problems. These problems can be prevented or fixed if they happen (Lyngstad, 52). Commitment in a relationship is very essential as it brings a long-term view in the relationship that helps couples not get overwhelmed by challenges and problems they face in their day-to-day life. High commitment in a relationship is very essential as the couple will feel safe and will be willing to give all what it takes the relationship to become a success. Gender and Society construction in regards to the nature and roles the male and female gender plays a key  role in the occurrence of divorce. However, at times divorce is necessary as it helps in preserving the moral boundaries of marriage. According to a study conducted by Amato, the most common reasons, why couples get divorced, is lack of commitment. From the study results, 73 percent of the research participants identified a lack of couple’s commitment as a major reason for divorce. Other reasons given in the study included infidelity 56 percent, too much arguing in the relationship 55 percent, unrealistic and conflicting expectations in the marriage 46 percent, early marriages 45 percent, financial issues 41 percent, male masculinity and lack of equality 44 percent and relationship abuse 29 percent. From the list, it is possible to fix many of the issues raised above and prevent divorce occurrence. It is essential for couples to learn how to avoid their destructive arguments and solve their issues to create greater expectations in their marriage. Even damaging issues such as infidelity affairs in a relationship can be

Sunday, August 25, 2019

Avon Calls on Foreign Markets Article Example | Topics and Well Written Essays - 1250 words

Avon Calls on Foreign Markets - Article Example This sometimes leads to marketing failures in many countries. In this orientation, basically, the products remain the same as in the head production unit, only, the locale that they are sold in changes. Avon has many such core products that it sells globally. Customer orientation, however, asks questions as to how the product and marketing methods can be changed, in a country, in order to be able to stay and do business there. This is especially important to an organization when they move into a country where the size of the population, or the potential of growth is attractive. Oftentimes a company may develop products exclusively for the country in question in keeping with the demand there. In China, when Avon went into their market, direct marketing was not allowed. However, the sheer size of the population made it a very attractive location for Avon, hence, the company changed its marketing strategy here and allowed beauty botiques, beauty counters, and independent stores to operate; thereby, making its products available virtually all over the country. Strategic Marketing orientation is actually a mixed strategy combining all 3 orientations of sales, customer and production orientation. Pricing and quality are also important criterion. Avon uses this strategy wherever necessary, in order to keep the business alive and flourishing in a country. Why is Avon so much more dependent on its foreign operations than on its home (U.S.) operations? Founded in 1886, Avon;s headquarters are in the US. It is one of the largest and oldest marketers and manfucatures of beauty related products. However  ¾ of it marketing and sales operations are in 66 countries and territories over the world. Another 44 countries are also on its distribution list. The reason that Avon went interntional was due to the slow growth in the U.S. market, and hardly any, or very limited potential for expansion. There already was a glut of

Saturday, August 24, 2019

Merging in the UK Package Holiday Market Essay Example | Topics and Well Written Essays - 2000 words - 11

Merging in the UK Package Holiday Market - Essay Example Both Cook and MyTravel enjoy an oligopolistic stature in the UK travel market as there are very few big players competing with one another over branded tourism products and services (HighBeam Research 1998). By the time Thomas Cook and MyTravel merged with each other to form the Thomas Cook Group, the trend in the UK travel sector was beginning to change. The concept of franchising was getting popular among giant business houses. As a consolidating approach to this changing scenario, another acquisition was soon on the cards. TUI Travel tied up with First Choice in September 2007, marking a milestone event in the UK travel industry. Following these two mergers, the entire travel sector assumed new looks in terms of operational mobility and packaged marketing initiatives. As the two major players in the global travel hunt, both operators took great care of their respective areas of interest, including hotels, cruises and charter airliners. Moreover, a seamless retail network involving major travel agencies was established to provide a convenient one-stop travel experience for vacationers. This paper is going to analyze in detail these two case studies and probe into a number of strategic issues that set off the mergers. Additionally, the paper will also look into the post-merger economic challenges and how they are going to affect the future of the travel market over the next few years. To address these issues systematically, the paper will answer three questions. 1. Why did Thomas Cook and MyTravel, and TUI and First Choice merge? What benefits have been gained from the mergers? What problems have had to be overcome, and what challenges do they face in the light of the current global economic downturn? The Mediterranean coast has always been the most sought after tourist destination in Europe. Whether it is leisure travel for rejuvenating the mind and the body or high-priority business trips, the Mediterranean destinations provide value for money for the travelers throughout the year.

Womens Political Participation in Iraq Research Proposal

Womens Political Participation in Iraq - Research Proposal Example In this vein my dissertation explores whether these expectations have been achieved five years down the lane since the Iraq war. My initial research in the field of investigation of 'women and political participation' as I sifted through academic and political commentaries pertaining to the issue of women and empowerment reveals that there is a recurring trend of the problems that women face throughout the globe. It is also possible to see that the women's participation in the democratic process in Iraq can be divided into historical phases. Whereas the decade of the sixties witnessed a growth in the number of more politically aware women in the country's economic, political and civil spheres of the society particularly through the public/government sector. The advent of the Bathist party in the early seventies also saw the "Education for all" initiative which made women's liberation a supreme tenet of its agenda based upon the prevalent socialist ideology .This is did little for the private sphere as the Muslim Shariah laws were discriminatory against women. Things did not look good for the development of the "Women's liberation" in the mid eighties which witnessed an Iraq tumultuously struggling in the Iraq-Iran conflict and the birth of an increasingly secularist state which targeting the clerical fundamentalist minority of the country's political arena. The subsequent suppression of this fundamentalist element caused social conservatism so where as the women were active economically but politically their position weakened and this caused the decade to witness an increased breach of women's rights and liberties. The nineties saw a wave of religious fundamentalism backed by the public sector and there was an increase in Burqa and Hij ab clad women and there were less women in the work force and colleges. The decaying economy and the decreased salaries were equally pivotal in discouraging women's work and education. It is often said that the condition of women's liberation and empowerment was worse under Saddam's regime than compared to Afghan women under the Taliban and it is often argued that the political and economic status of women was greatly brutalized under Saddam.At the end of the war it is estimated that only 25% of Iraqi women are literate and nearly 20% of the women are employed. (UNESCO estimates). Literature Review Proposed Division of Chapters in the literature review It is intended that this literature review will consist of 4 chapters Chapter 1, Women Political Participation Global facts and figures; this will include the number of seats that

Friday, August 23, 2019

Effects of Classical and Post-Classical Religions Research Paper

Effects of Classical and Post-Classical Religions - Research Paper Example With the fall of the empires and their economies, the people had to find means to live and believe in order to proceed with their normal lives. People then got the chance to migrate to different areas and meet new people, develop new ideas and learn new and diverse ways of life. Religion would not have come at a better time for them since it enabled them have a venue to express their beliefs and needs. Christianity being one of the religions was embraced by people and they henceforth developed allegiances in accordance with the different religions that they embraced. Eastern mediteranian, for example, enjoyed the aftermath of the Roman empire’s collapse as it opened trade and opportunities for them . Politically, the rise of Christianity saw changes in leadership styles and allegiances. The previous empires like the Roman empire always dictated and demanded that people worked with allegiances sworn to the leardership. This changed with the belief that were embraced by the chri stian teachings. The teachings enabled and required people to work together with others to collectively help improve their lives and in unity to build a strong kingdom of God . The supreme being was nolonger the emperor, but God. These religious people happened to be in regions that identified with the religion that was more dominant. Christianity did institute within its gorvenance structure and formation tactics borrowed from the Roman empire. Cultural and artistic ways and lives of people also changed.... The teachings enabled and required people to work together with others to collectively help improve their lives and in unity to build a strong kingdom of God 3. The supreme being was nolonger the emperor, but God. These religious people happened to be in regions that identified with the religion that was more dominant. Christianity did institute within its gorvenance structure and formation tactics borrowed from the Roman empire. Cultural and artistic ways and lives of people also changed with the transition of the society into the religions of salvation. The Roman empire, for instance, had their gods that they would offer sacrifices to in times of their needs. They belived that the gods were many and that every god had a purpose, authority and power to reward and punish those who did not heed to or obey them. Christianity, on the other hand, came up with the teaching that the last sacrifice was that of the death of Jesus Christ and that there was only one GOD 4. This brought about c onflict of interest and cultural discomforts, as well as disagreements between the emperors and the christians resulting in christians being prosecuted. Christianity introduced a way of life in which people lived together in harmony and peace. It brought forward a community that preached against violence and discrimination. On the other hand, the previous empires used coercion, divide and rule kind of leadership that only benefited those in power. Social lives of the people received a great change and boost, one that the people found easy to embrace as it cared for the well being. However, the leadership was immensely affected since their ways of gaining more power and strength was being overshadowed by the strong beliefs that the people developed.

Thursday, August 22, 2019

The Stranger Literary Responce Essay Example for Free

The Stranger Literary Responce Essay In a modern society people are often quick to judge others for being indifferent and making bad choices that they overlook the similarities between themselves and the person(s) being accused. A quote states, â€Å"The society Meursault lives in is as indifferent, as insensitive, and as moral as Meursault himself.† I agree with this quote because in the novel â€Å"The Stranger† by Albert Camus, Meursault plays a role in indirectly showing the reader through his natural actions of stoicism in his personality how society is not much different, indifferent. Meursalt acts as a mirror to society revealing in for how it truly is un-thoughtful and insensitive. The major points that have been often reoccurring throughout the novel are how indifferent and amoral Meursault is when it is shown that the society is in no form any better or more just. Throughout the novel Meursault is constantly displayed as a stoic individual who can endure pain or hardship without showing their feelings or complaining. Meursault’s character is often brought into question by those who contact and observe him. It is introduced to the reader at the very beginning of the novel that his mother, â€Å"Maman† had died and that his demeanor was unmoved. Meursault mentions how he can only register physical necessities of life meaning that he is emotionally detached which leads to his own demise. However, society views Meursalt as a terrible person because it is generally unnatural for a man, more less a human being to feel or express little to no remorse for their mother dying. Arguably Meursault is a cold hearted killer who would easily murder someone without any hesitation and no sense of remorse, using the fact that he killed an Arab to back this claim. However, he is not as cruel as society is. First off, the society does not treat Meursault with an equal respect or a caring attitude. Though Meursault has committed murder and was charged for insensitivity the society in The Stranger overlooks everything else basically including Meursault himself as other offenses are belittled will Meurault is almost automatically sentenced to death.

Wednesday, August 21, 2019

The advantages and disadvantages of outsourcing

The advantages and disadvantages of outsourcing Nowadays most companies tend to let third party companies to handle the operation of their services. This initiative is considered to be a risky action, because it is primary made for deducting the costs as well as the particularization these companies has to offer. Besides of the advantages that many companies have faced during outsourcing there are some disadvantages also. Below I will describe further advantages and disadvantages of outsourcing in organizations such as Tesco. Advantages of outsourcing Reducing Costs As I mentioned before reducing the costs is the main aspect that companies choose to use outsourcing. These costs are usually referring to employee fees, office space expenses as well as some other costs such as outsourced workforce as it is proved to be way cheaper than workforce coming from developed countries. Time Utilization A widely known benefit that outsourcing has to offer, is the high speeding time that outsourced work is done. A great example of time utilization in a company would be the employee hiring procedure for the creation of a new team. Using outsourcing this time can be reduced to a maximal level. Skills Acquisition Another capability that outsourcing has to offer in a company is the adeptness that employees does not have. A characteristic example in a company such as Tesco is when the personnel needs have to deal with a new technology in order to perform best in their divisions. This way type of outsourcing helps the company to accomplish the pre mentioned benefits which are reducing both time and cost. Operational Efficiency Due to the fact that workforce is handled by outsourcing, individuals inside a company can have the opportunity concentrate more on their initial charges and perform better in their departments. This is an important reason for a company to use outsourcing as it allows the employees to emphasize on their proficiency but mostly on core business. Customers Satisfaction It has significant use when a company has a contract with a seller and so it is bound to offer a high service level as well as quality. That is why, when a company has an outsourced IT function and one of the employees calls in sick, they are obligated to find a surrogate that can accomplish the job and satisfy the customer. Disadvantages of outsourcing Quality Risk Using outsourcing has drawbacks sometimes which can compromise the name and the reputation of a company. For example if a customer has a purchase and later on discovers that part of the product he paid for is damaged, then the company has the obligation to substitute that part by contacting their outsource supplier but the company will always carry the burden of a damaged product. Constant Management It is widely known that most companies nowadays, fail to outsource their projects due to the fact that they dont have a proper management system. To elaborate, every company needs to possess a high intelligence manager, which will exclusively deal with the management of the outsourced projects. In such a big company as Tesco is, this person should fully qualified to determine the outsourced workforce demands, and ensure that all the providers are constantly updated to meet these demands. Frustrating Conditions These conditions are usually referring to employees knowledge. When we are dealing with big companies such as Tesco sometimes problems like language barriers occur. For example when a customer call center is outsourced to a different language company, there may be some annoyed customers that will deal with unhandy communication condition. Another strong frustration is the lack of organization knowledge, where outsourced employees are not surrounded by the same passion or obligation for an organization, making them usually look fool and unknowledgeable in the eyes of a customer. On the other hand, there are some frustrations detected from the companys own personnel to the outsourced providers. This happens when the knowledge of the personnel is not in high levels, leading them to accuse for the bad service the outsourced supplier. Security It important for a customer to know that is respected and those they can trust the company by giving them personal information. That is why the management of the customers confidential information should be always processed by companys employees and not the outsourced one. Layoffs Fears Outsourcing often fears the employees because their job may be in risk due other outsourced employees. This condition reflects negatively on the employees psychology, as well as their own job. To avoid this uncomfortable situation companies such as Tesco must protect their personnel from losing their temper by informing every single employee that they shouldnt or in some cases should worry about losing their job. Question 2 Hyperlinks http://www.outsourcing.com/ http://en.wikipedia.org/wiki/Outsourcing http://e-articles.info/e/a/title/Outsourcing-Help:-Pros-and-Cons-of-Outsourcing/ http://thethrivingsmallbusiness.com/articles/advantages-and-disadvantages-of-outsourcing/

Tuesday, August 20, 2019

A Tree, A Rock, A Cloud by Carson McCuller

A Tree, A Rock, A Cloud by Carson McCuller Philosophy of the modernism and postmodernism period takes twists and turns at every chance it can. As the world begins to change at a speed previously unseen, people all over the world are confused and scared of what might come next. Though today writers have taken to the internet to show the world their ideas, writers during these periods expressed the emotions human beings felt through many different genres of literature. First a man must help those around him but then the philosophy shifts to a man must help himself to gain meaning in this life. As each man struggles to find a place for himself in the world, each man is also subject to the actions of others. So each man is a master of his own destiny but yet he is also a slave to the whims of others. This knowledge scares men, women and children all over the world. Yet human beings continue to find themselves among the fear. We all find meaning for ourselves yet sometimes questions arise after we find the meaning which defines ou r life. Some questions being: Is this the meaning I wasted my time on? Is this worth all the time I spent alone? In A Tree, A Rock, A Cloud by Carson McCullers these questions pop out to me after reading the tramps so called science of love. The tramp in the story had his heart broken by a woman so severely he believed he could never love again. While the philosophy of love today would suggest otherwise, the tramp wandered the country in isolation, searching for his lost love and searching for love itself. He believes he has discovered the science of love, his own personal philosophy he uses to define his life in the world. He never finds the woman he held to be so dear nor does he find another woman he loves as much as her even after he develops his science of love. The disillusionment the tramp faces after losing his first love tears down the natural beauty of what love really is. Natural not scientific I should say. Science can tell many things and uncover many truths but one thing science has no power over is the ability we have to love freely. This I believe the tramp fails to understand. The tramp tried to fragment love. Thats like trying to tear Mount Everest apart with a rubber mallet. It cant be done. Nor can you apply logic to love. You cannot apply logic to something that contradicts itself as much as love does. Yet the tramp did not realize this as he tried to break down love. The tramp tells the boy he speaks to I meditated on love and reasoned it out. All he reasoned out was how to believe he loved something or someone. He believed love was only one love. According to his science you could love a rock as easily and as deeply as you loved a woman or your child. This is not the case as most would agree. I myself have never loved my iPod or my car as much as I have loved my girlfriends or my family. The tramp failed to realize many things but chief among them was that love comes not from what others can give you to make you happy but rather love exists when your desire to make another happy matchs your own desire to make yourself happy. An inanimate object could never return the love that men chase, so this science of love is base on false beliefs. Another question that comes to mind after reading the story is how can you love an inanimate object as deeply as you could a person and then loss said object? Do you react the same way you would if your parents died? If my iPod breaks (again) you wont see me crying and mourning something that cannot be replaced with a few hundred dollars. While I wont exactly be thrilled to hand out that money, its easier than losing a loved one. Once again the science of love is incorrect. The tramp was isolated from the human world as he traveled the country developing his science. He tried to replace the love he held for this woman with a love for other things. As Thoreau once said There is no remedy for love but to love more. Perhaps this is what the tramp thought as he traveled the country. He could not love the woman who left him anymore so he began to love everything he could in hopes of finding a love just as strong as his first love. Although I could not find his last name a man named Jeffery once said Love never dies, even if you have found a new love, the sweet memory of the past will continue to hunt you for the rest of your life. So no matter what the tramp did the memory of his past love would stay with him forever. He might think about her less and less but she will never truly be gone from his heart. This is true to me because even though I rarely think of her, I can still remember the feeling I got when I held the first girl I ever loved in my arms. Suc h depth of love does not disappear we just become accustomed to the lost. Once again the science of love could not explain the true depth of love. The tramp should have labeled this theory on love as the philosophy of love because thats all it really is. To use the world science is to imply that there are hard facts behind the theory. This work of literature aimed to create a fragmentation and disillusionment of love. The disillusionment came from the shattering of the naivety of what love is. The fragmentation came from the attempt to apply reasoning to something as complex as love. While in the present day most would agree that this science is untrue and full of false perceptions, how it was received in the post modernism period reflects how the world society felt about love. With the rising of all the new sciences and the conflict of World War II, many people around the world were lost and searching for answers. At the rapid rate the world seemed to become engulfed in the war, people everywhere must have questioned when they were going to be swallowed by the war. So at a time of war love was a very precious thing. Yet what was love? For people all across time have had questions about love, and this story attempts to explain what McCullers had to think of love. In conclusion, while this story has a spotty philosophy on love at best, it does open the mind to think a bit about love. Love itself is an experience to have in any life we might imagine for ourselves. We all must understand however that love will strike us however and whenever it so chooses. Love is an emotion and all emotions rise when we least expect them. Logic cannot be applied to emotion. McCullers tried to apply logic to love through this story but like William Shakespeare once said To say the truth, reason and love keep little company together now-a-days.

Monday, August 19, 2019

The Re-Creation of a Young Roman Girl Essay examples -- Rome Culture T

The Re-Creation of a Young Roman Girl At seven years old this young, upper-class1 Roman girl, daughter of a prominent political figure, is posing for a portrait of her face. Her father is demanding her whole family have one done so that everyone can see their family displayed for years to come. As predicted by her father, Roman art historians are very interested in these portraits and the past they represent. In 1998 this bust is a rare and exceptional find among art collectors. This portrait is now one of twenty-one sculptures found in the Riley Collection of Roman Portrait Sculpture at the Cedar Rapids Museum of Art. This portrait is rare, first because it is a portrait of a child, and second because it is portrait of a young girl. Children were often exposed in ancient Rome, especially young girls. The reasons for exposure are probably monetary. Poor families could not afford many children, and wealthy families did not want to have to divide their inheritance any more than necessary. Boys were most often kept because they would be the heir to the family and preserve the family wealth, while daughters would require a dowry to be given to her husband.2 When the portrait is finished, this young girl and her two older brothers, would be immortalized in stone. This portrait may have been chosen to be made at this time because the girl's father had reached a certain political status, or because this girl had reached an age where it was believed she had survived the hardest part of her life, her childhood, or a combination of both.3 It is unlikely this portrait is a funerary memorial due to the simple fact that it is a round sculpture rather than relief. Most grave markers were decorated with relief in the ancient time... ...n citizens. In order for that to occur, both parents had to be legal Roman citizens. Marriage was a necessary function for survival of lineage, not something any Roman man wanted to be trapped in (Dixon, 1992, 60-65). See Lefkowitz and Fant on guardianship and the Julian Marriage Laws. 24 Dixon, 1992, 72-75. 25 Women were seen to be too careless to manage their own affairs, even as adults. However, women could appoint their own tutor, and may have chosen one strictly for social purposes and managed their own money. See Lefkowitz and Fant on the laws of guardianship. 26 Foss tells the story of Pomponia, the wife of Quintus Cicero, when she is a guest somewhere. She was not invited to have the responsibility of organizing and supervising the feast at the estate. Because she is treated as a guest, she refuses to attend the meal. 27 Foss, 1995.

Sunday, August 18, 2019

Behind The Scenes :: essays research papers fc

BEHIND THE SCENES In the aftermath of the untimely death of Princess Diana a timeworn issue re-plays itself like a tired re-run of “The Honeymooners.'; Does the media go too far? Maybe. But like any other commodity, supply and demand go hand and glove. Whether a high profile celebrity or an every-day Joe, we sit glued to our chairs as the nightly news somberly announces society’s latest barbarity. We eagerly snatch up the tabloids as these mudslingers breathlessly divulge their version of the most recent Hollywood gossip. The fact is that America has become obsessed with the goings on in other people’s lives. Greedy consumers of the First Amendment, we march defiantly under the banner of our “right to know';, but do we have just cause? Differences and difficulties in interpretation have characterized much of the later history of the First Amendment and historians continue to debate what the nation’s founders meant to include when they wrote that there shall be “no l aw'; abridging the freedom of speech or press. Today the U. S. Supreme Court blindly inches its way across the tightrope of censorship. Laws prohibiting obscenity and indecency have been successfully incorporated and public sentiment has historically served to curtail the over-zealous journalist. However the moral fiber of society has degenerated from its once prim and proper past, and the press now vulgarly oversteps the boundaries of decency with little retribution. In the words of Chief Justice Warren Burger, “The First Amendment should not be interpreted to include the protection of frivolous gossip that “lacks serious literary, artistic, political, or scientific value'; (Grolier Encyclopedia 1996, Miller v. California). The People’s “right to know'; does not justify the growing abuse of our right to Freedom of the Press. The negative effect upon today’s society is only beginning. Tabloids not only thrive on; they encourage the invasion of privacy. In an era defined by celebrity worship, Americans have become increasingly tolerant of what is acceptable concerning media coverage of celebrities’ private lives. It is unfortunate that Princess Diana died for a blurry picture, a pointless snap from a speeding motorcycle. Dodging tabloid photographers she was simply trying to preserve some privacy by holding back the media intrusion. In the sixteen years since her marriage, she became not only the most famous woman in the world, but the only personality who consistently sold big in the global marketplace (Alter, Dying 39).

Hamlet Virtue vs. Villainy Essays -- Shakespeare Hamlet

Hamlet Virtue vs. Villainy   Ã‚   The legendary drama, Hamlet, written by William Shakespeare is a play illustrating the theme of virtue vs. villainy. The 17th century tragedy is plagued with treachery and deceit as it opens with the news of a foul murder in the kingdom of Denmark. Prince Hamlet, by word of his late father's ghost, is informed that his uncle Claudius is to blame for his father's sudden demise. Prince Hamlet's mission is to uncover the secrets surrounding the murder and to avenge his father's death. Thus, the insidious web of disease and corruption is formed. The relationship between disease leading to the greater corruption of Denmark plays a significant role in the lives of the principle players.    The literary piece, Hamlet, is riddled with an abundance of seemingly diseased attitudes, perceptions, schemes, and acts. Disease is an impairment that interferes with normal bodily function. However, as demonstrated throughout the play, disease takes on many forms, not only in a physical sense, but in a mental sense also. The young Prince Hamlet conveys his secret thoughts of helplessness and suicide. "To be, or not to be, that is the question: Whether 'tis nobler in the mind to suffer the slings and arrows of outrageous fortune or to take arms against a sea of troubles, and by opposing end them" (Act III, i, Lines 64-68). He contemplates whether it will be deemed nobler to intentionally take one's life than to face the struggles he is forced to endure. The prince is torn between his diseased mentality that drives him to express his thoughts of suicide and the promise of more corruption by avenging his father's death.   Before her suspected suicide, Ophelia gives evide nce of her mental d... ... are obviously diseased; for it is neither commonplace, nor sane to kill other people. Corruption evolves from disease.    In the renowned drama, Hamlet, the association of disease leading to greater corruption is prominent and plays a key role in the lives of the principle players.    The reader is afforded a glimpse into the tragic lives of the characters that openly deceive and betray those considered most dear to them. The murder of King Hamlet sets the stage for the disastrous ruin of the kingdom, along with the lives of those living in it. The tragic lives of the characters, whose diseased method of thought clearly illustrate the fact that disease leads to eventual corruption.    Work Cited Shakespeare, William. The New Cambridge Shakespeare: Hamlet, Prince of Denmark. Ed. Philip Edwards. Cambridge: Cambridge U P, 1985.   

Saturday, August 17, 2019

Islamic Womens’ Rights Essay

Islam since its inception has maintained the claim of universality – a message and a way of life applicable and appropriate to all peoples in all places and times. Now more clearly than at any other point in the history of the Islamic tradition, this claim seems to be manifested through the presence of Muslim communities literally across the world. The Muslim population is estimated in the range of one billion, approximately half of whom are women representing a great range of cultures, racial-ethnic identifications, interests, attitudes, and aspirations. While it may be rather daunting to attempt to generalize about Muslim women, it is nonetheless true that certain themes emerge with some regularity when one looks across the Islamic world. Muslims struggle with and attempt to reconcile the affirmation of their heritage with the challenges of the modern world and the ongoing legacy of Western imperialism. Muslim women in all societies are key to these discussions, both subjects and objects in a very important and continuing debate about what it means to be a Islamic woman. Women’s rights (both Islamic and constitutional) are under constant debate, as are matters of seclusion and segregation, the relationship of women’s circumstances to fundamentalist religious pressures, and the role of women in political struggles for independence and economic advancement. Some countries such as Egypt have stressed the importance of women’s education for the better part of the century. Others like Saudi Arabia have only recently begun to work toward this goal. It is clear that overall there is increased attention to the importance of education for Muslim females both as a right and a value in and of itself, and as an essential ingredient in the advancement of nations. As in many areas, it is also clear that enormous differences exist educationally for women in urban and in rural areas, a dichotomy that at least in the short run probably will become even more pronounced (Carroll 85). There is also the major concern of women’s employment in Muslim countries and the debate over which occupations are considered proper for women to pursue. In many countries shortages in the labor force are making it imperative for women to work, but the tide of traditionalism tends to mitigate strongly in limiting those opportunities. In many countries increasing numbers of women are engaged as wage earners, but they are limited primarily to such occupations as teaching and medicine (Hussein and Radwan 12). The oil wealth of the Gulf states had led both to better education and to more work opportunities, although the conservative Islamic ethos has severely complicated the situation. Kuwait offers the greatest opportunities for women’s employment, and Bahrain with its economic diversification is opening new doors for female employment (Hussein and Radwan 12). Whether because of or despite Islam or government policies, women across the Islamic world are becoming more economically active. This does not necessarily mean, of course, that they are pressing for increased work opportunities. Many women would prefer not to work, doing so only because of economic necessities and happy that the extra money earned means a more comfortable life for their families. Enhanced professional opportunity for women is not without its down side. Women in a number of cultures have come to realize that along with the societal and familial strains that occur when women work outside the home (including perceptions that men cannot support their families) is the reality of women taking on added responsibilities without the expectation that they will be able to do less in other areas of their lives. And the relationship of economically and politically active women to the advancement of the state adds further strains for many women (Mintjes 17). In Iraq, for example, women’s liberation and full integration into society is a part of the Ba’th party platform. But reforms in personal status laws lag behind the political rhetoric, adding to the burdens of women (Sanasarian 124-125). This is generally true across the Islamic world, and it means that these burdens will continue as long as there is no real resolve in the tension between needing women for national development and not being able to accord them full status in society because of socio-religious restrictions (Rassam 99). The other issue is, undoubtedly, the question of women’s dress which is one of the most pressing concerns of Islamic societies today. Sometimes the government in allegiance with the religious establishment and seeking its support insists on women wearing â€Å"appropriate† covering. In other instances governments are making every attempt to discourage the wearing of Islamic dress precisely because they fear the rising power of extremist fundamentalism (Yeganeh 26-27). Today controversy over the government’s ban on students wearing Islamic dress at the universities has become a major ideological and political issue. Islamic conservatives say that the Quran dictates the wearing of the turban, preferably with a kind of long loose overcoat covering the body to the feet. The government’s supreme educational council has recommended disciplinary action for any female students appearing in such dress. The debate has become a major one in the struggle between secularist ideology and Islamic revivalism in that country (Bahry 502). Besides, the question of birth control is a matter of major concern to many Muslim families. While a few of the ulama, if supported by state efforts, are saying that there is Islamic sanction for some preventive measures, the majority oppose any such control as un-Islamic. When young Iraqi men and boys were being killed in the war with Iran, the government waged a campaign stressing the role of women as mothers. Contraceptives were no longer allowed at the same time that men were encouraged to take second wives for the purpose of having more children. Clearly there are differences in men’s and women’s attitudes on the issue of birth control. In Tunisia, for example, where legislation concerning women is generally seen to be more progressive than in many other countries, a survey showed that far more women than men favored the use of contraceptives. Where official policy does not support the possibility of contraception more subtle measures are sometimes used. In Bahrain housing projects limit the number of bedrooms so that they are available only to families with two children (Bahry 509- 511). Finally, a word needs to be said about Muslim women and the rise of feminism. It cannot perhaps be emphasized too strongly that whatever stand Islamic women may take on issues of education, employment, and equal opportunities in society, they have serious reservations about what they understand to be feminism in the Western context. For the most part they find it too individualistic, too removed from genuine cooperation between males and females, and too much tied to forms of Western colonialism and imperialism. â€Å"Sexual behavior that may strike an American feminist as liberated,† said one young Tunisian woman, â€Å"may strike me as just another form of slavery, and a rather neurotic form at that† (Megademeni 10). Muslim women and men together are still very much in the process of working out ways in which to affirm their Islamic identity as members of societies and nations moving into a new century. The issues they face will not be quickly or easily resolved. Women are not only faced by a number of conflicting pressures and claims on their allegiance, but find themselves speaking to a number of different audiences – their husbands and families, their Islamic sisters, their Western critics, the clerics or government agencies responsible for determining many of the circumstances of their lives, themselves. There is little question that many women across the Islamic world are becoming increasingly aware of the rights that belong to them within the Islamic system, as well as of themselves as key players in the movements that will continue to redefine the Islamic way of life. The responses they give to their own changing circumstances may vary with the different situations to which they are called to respond, and they may change fairly dramatically in the next few years. But it is clear that whatever solutions are found to the issues that they face, for most women they will be discovered in conversation with other females as well as males in the Muslim community, and they will be – in one form or another – Islamic solutions. Works Cited Bahry, Louay. â€Å"The New Saudi Woman: Modernizing in an Islamic Framework.† Middle East Journal. Vol. 34: 4, 2002. Carroll, Lucy. â€Å"Nizan-I-Islam: Processes an Conflicts in Pakistan’s Programme of Islamisation, with Special Reference to the Position of Women. † In Journal of Commonwealth and Comparative Politics. Vol. 20: 1992. Hussein, Freda and Radwan, Kamelia. â€Å"The Islamic Revolution and Women: Quest for the Quranic Model. † Freda Hussein, ed. , Muslim Women. New York: St. Martin’s Press, 1994. Megademeni, Negiba. â€Å"Muslim Women Developing a Theory of Islamic Feminism. † Unitarian Universalist World. Vol.16: 8, August 15, 1995. Mintjes, H. â€Å"The Doctor and the Ladies: A New Debate on ‘Women and Islam’ in Pakistan. † al-Mushir. Vol. 25: 1993. Rassam, Amal. â€Å"Revolution Within the Revolution? Women and the State in Iraq. † Iraq: The Contemporary State. New York: St. Martin’s Press, 2002. Sanasarian, Eliz. The Women’s Rights Movement in Iran. New York: Praeger, 2001. Yeganeh, Nahid. â€Å"Women’s Struggles in the Islamic Republic of Iran. † Azar Tabari and Nahid Yeganeh, eds. , In the Shadow of Islam: The Women’s Movement in Iran. London: Zed Press, 1982.

Friday, August 16, 2019

Syllabus: Rational Number and Gwalior Glory High

Write laws of powers & exponents (along with one example) in an AY Size sheet. Puzzle solving based on Rational Nose. Science l- Explore your refrigerator or storage cupboard and list 8-10 food items that are preserved using preservatives. Find out about the mode of action of each preservative record the data in a given tabular format. Al- Product Name Method of packaging Expiry date Method of (sealed bag, bottle, can, carton etc. ) (best before) preservation You can take help from pig. 18 of your science book. Or To make a wind chem.. (Hint : Use 4-6 pieces of hollow metal tubes of different lengths – paint them in different colors.Hang them on a cardboard so that they swing and strike each other) Social Studies l- Collect pictures of some resources you use in your house and classroom and make a collage in your copy with the pictures. Al- Write the Preamble of the Indian Constitution in your copy. Ill- Visit a museum and find out the various sources of information of modern h istory. Paste the pictures and label them in your copy. Computer Prepare a file or a chart explaining the types of networks.Write laws of exponents along with one example on AY Size Sheet. Q. 2 Solve the puzzle based on rational numbers. Read the given clues Smallest set of numbers which is closed under subtraction. A number of the form p where p, q are integers and q 0 q 7 A number divisible by Related to an operation on rational number which gives same result even when the number change places. Opposite of the word negative Additive identity for rational numbers A prime number which is sum of an even number and a prime number.

Thursday, August 15, 2019

Critically analyse how the Global Energy Assessment pathways represent future socio-technological change in the energy system, focussing on the building sector.

Abstract There has been growing concern surrounding climate change over recent years and much emphasis has been placed upon the ways in which the environment can be protected. Accordingly, because of how important it is for organisations and individuals to adopt environmentally friendly practices, effective environmental controls are vital. There is much debate as to the extent to which the Global Energy Assessment pathways represent future socio-technological change in the energy system, yet this study intends to find this out by focussing on the building sector. Introduction The government has placed a great deal of emphasis upon climate change in recent years by exploring the different ways it can be tackled (Department for International Development, 2011: 13). The Department of Energy and Climate Change aims to make sure that the UK has â€Å"secure, clean and affordable energy supplies† (DEEC, 2014: 1) and seeks to promote international action in order to eliminate climate change. In 2012 the Global Energy Assessment (GEA) was therefore launched and a new global energy policy agenda was established (GEA Writing Team, 2012: 4). The GEA intended to change the way society uses and delivers energy in order to mitigate climate change. In doing so, it brings together hundreds of international researchers to provide an analysis of the current issues that exist and to identify the possible options that can be taken in tackling climate change. Technology options and policies are also included in the GEA and are considered vital in protecting the environ ment and maintaining sustainable development (GEA, 2014: 1). As noted by Greening, the Secretary of State for International Development: â€Å"The long-term effects of climate change threaten to undermine progress in reducing global poverty† (Department for International Development, 2011: 3). This is the main reason why the UK is committed to helping developing countries adapt to climate change in a positive way by ensuring that they take up low carbon growth and effectively tackle deforestation. This study will therefore examine some of the Global Energy Assessment pathways, by focusing on the building sector, in order to consider the effects these will have upon the energy system in the future. Socio-Technological Change in the Energy System In order for climate change to be tackled effectively, socio-technological changes are needed within the energy system. This can be ascertained by reviewing the different sectors which impact the environment and then considering what socio-technological changes are required. The building sector has a significant impact upon the environment because of the fact that it accounts for one-third of the planet’s total energy use (Global Alliance, 2012: 1). Technological improvements to buildings are therefore a cost-effective way of mitigating climate change. By using existing proven technologies we have the ability right to â€Å"reduce energy consumption in new and existing buildings by 30-50 percent at extremely low or no cost, and usually at negative cost (Global Alliance, 2012: 1). Increased building efficiency is therefore the future for the building sector because not only do greener buildings help to promote sustainability but they are also better for the consumer in that th ey are more comfortable and cheaper to maintain (NAR, 2014: 1). The pathways for transition that have been explored in the GEA therefore need to be followed if the building sector is to become more energy efficient. This is important given that GHG emissions are expected to nearly double by the year 2030 under a high-growth development scenario (Metz et al; 2007: 6). The GEA supports sustainability in the building sector by helping decisions makers address the challenges associated with building development (CCCSEP, 2012: 1). Energy Efficiency Barriers in the Building Sector The building sector can contribute to tackling climate change through socio-technological change in the energy system, yet there are many barriers towards improved efficiency in this sector. One of the main barriers that exists is a lack of technical, economic and general knowledge about the energy sector. Not only does this knowledge gap apply to consumers but it also applies to building designers, architects and politicians (Urge-Vorsatz, 2012: 702). Because of this lack of knowledge, it is very difficult for many of the technologies and practices that exist in this area to be implemented. Furthermore, although energy efficient practices are considered cost effective, they are not being widely adopted due to the high initial start-up costs. The high upfront costs are thus discouraging, especially when there is a lack of knowledge that exists in this area and unless greater awareness is provided, it is unlikely that the GEA pathways will have much of an influence in the future. Mark et failures also provide barriers to energy efficiency because of the failures in the way the market operates (Urge-Vorsatz, 2012: 702). Such flaws prevent the trade-off between energy efficiency investments and energy saving benefits. Behavioural barriers are also a problem for energy efficiency in the building sector as the behaviours of individuals and companies may be difficult to change. For example, individuals may fail to turn the lights off in their homes, whilst organisations may fail to identify energy saving opportunities, especially if they do not benefit directly from them. An example of this can be seen in relation to green leases since these are one of the main pathways to energy efficiency. Green leases thus impose obligations on landlords and tenants to achieve targets for energy consumption. This ensures that the energy use of commercial buildings is minimised through â€Å"better measurement, greater awareness and systematic management† (All Party Urban Development Group, 2008: 2). There are a number of different green lease shades which represent different commitments to the green agenda: light green leases represent a modest commitment to the agenda, whilst dark green leases reflect a much more serious commitment (Bright, 2008: 158). Regardless of the benefits green leases have on the environment, however, they are not being used as much as they should. This is largely the result of the â€Å"conventional relationship between the landlord (as building owner) and tenant (as occupier)† which generally neglects â€Å"environmental co nsiderations† (Hinnells et al; 2008, 1). The extent to which green leases represent future socio-technological change in the energy system is therefore unclear and it seems that further changes are required if a more robust system is to be implemented. Green leases should be used more frequently than they are at present, yet it is questionable whether this is likely to happen given that â€Å"change may be rapid, disruptive and challenging (Hinnells et al; 2008: 1). Bright believes that capital investment will allow for more efficient equipment to be introduced that will allow for better energy savings to be made (Bright, 2008: 158). This will encourage landlords and tenants to enter into a green lease if they can identify the real benefits that are associated with them. Consequently, it is evident when looking at green leases that one of the main barriers towards improved energy efficiency is the lack of awareness that exists. In order to remove this barrier to energy efficiency, campaigns and sector learning networks could be introduced in order to increase the current awareness of GEA’s (Carbon Trust, 2005: 16). Furthermore, actions could also be taken that raise the attention of building owners such as; tax incentives and low interest loans (Rezendes, 1994: 41). This will allow greater access to energy efficient equipment and will encourage individuals to take advantage of the opportunities that are available. Another barrier towards energy efficiency in the building sector is transaction costs and the limited availability of capital. Because building owners do not generally have spare capital available to make their buildings more energy efficient, they are less likely to take the GEA pathways into consideration (Ecofys, 2012: 3). Furthermore, as has been pointed out; â€Å"financial barriers to the penetration of energy efficiency and building integrated distributed generated technologies include factors that increase the investments costs and/or decrease savings resulting from the improvement† (Urge-Vorsatz, 2012: 698). Arguably, building owners are unlikely to make energy efficient changes if they are not also cost-effective despite the fact that the equipment is more efficient. This could also be rectified through tax incentives and low interest loans, yet economic instruments could also be introduced that reduce the overall costs of the equipment. Energy prices could also be increased so that going green would be more of an incentive than it is at present. This is because, unless there are significant cost benefits of becoming more energy efficient, it is unlikely that individuals will be actively encouraged to do so. Market misalignment is another barrier that prevents â€Å"the consistent trade-off between specific energy-efficient investment and the societal energy-saving benefits† (The Carbon Trust, 2005: 16). An example of this can be seen in relation to tenant-landlord relationships where companies have no direct control over the premises and so are reluctant to invest in energy effi ciency. This barrier could be overcome through the provision of split-incentives. This would encourage landlords to become more energy efficient if they were being incentivised to do so. If the GEA pathways are implemented, the environment will benefit significantly from this and the passivhaus standard will be applied in the building sector. This standard is the robust approach to building design which seeks to minimise the heating demand of buildings by building houses that have exceptional thermal performance (Passivhaus, 2011: 1). Unless it is less costly for builders to employ the passivhaus standard, there will be no incentive for them to do so as they will not benefit from the reduced energy savings. GEA Pathways for the Energy Efficiency Transition Because of how important it is to protect the environment, it is necessary that the multiple objectives outlined in the GEA are being met through environmental control. The main objective of the GEA pathways is to understand the combination of measures, time scales and costs that are needed to transform the energy system. In understanding this, however, it is necessary to first identify the energy efficiency barriers that exist so that appropriate measures can be implemented to alleviate them. Reducing thermal energy use is achievable through a number of different pathways such as; best practice in building design, construction and operation; the elimination of energy poverty; the increase of living space and economic development ((Urge-Vorsatz, 2012: 703). Before these pathways can be incorporated, it will be necessary to for significant investments to be made as well as the introduction of new appliances and technology and discounted energy saving costs. Because this will require h igh start-up costs, increased knowledge of the GEA pathway benefits will be needed so that individuals and organisations will be incentivised to adopt such pathways. Hence, many approaches have already been implemented to manage pollution-generating processes (Stuart, 2006: 1), yet it cannot be said that the obligations placed upon individuals under the Environmental Protection Act 1990 and the EU’s Council Directive 96/61/EC to control the environment are being realised (McEldowney and McEldowney, 2010: 48). This is likely to be the result of market failures and behavioural barriers since individuals and organisations may not be able to identify when an energy saving opportunity arises. Nevertheless, since the Climate Change Act 2008 was first enacted various mitigation and adaption strategies have been introduced, such as the Government’s ‘Green Deal’. The objective of this deal was to limit greenhouse gas emissions so that the increase of global tempe rature could be decreased. The Green Deal has been considered a welcoming development because of the fact that it has enabled the energy efficiency of many households and businesses to be improve â€Å"without consuming so much energy and wasting so much money† (DEEC, 2010: 1). This is beneficial for consumers and is likely to reduce the initial startup costs. The Green Deal is also effective in increasing the awareness of energy saving benefits, which is likely to remove any subsisting behavioral barriers. Conversely, it has been argued that the implementation of the GEA pathways may actually lead to further energy use, through the so-called rebound effect (Gillingham et al, 2013: 474). Although the GEA have identified the possible re-bound effect the implementation of their pathways may have, it seems as though little consideration has been given to this (GEA, 2012: 1573). Accordingly, it cannot be said that the barriers to energy efficiency have been given much thought and unless the behaviour of individuals and organisations change, it is unlikely that the GEA pathways will have much of an impact in the future. There are both direct and indirect rebound effects that are likely to occur. The direct rebound effect happens when people consume more energy as a result of the low costs, and the indirect rebound effect happens when people use savings from lower energy costs to spend on other energy intensive activities (Sorrell, 2010: 636). In view of this, is thereby essential that rebou nd effects are taken into consideration when evaluating how beneficial energy efficiency really is. As noted by Giillingham et al; however: â€Å"Empirical evidence indicates that the direct rebound effect will dominate in the near term† at around 10-30 per cent (2013: 476). Regardless of this, it was also pointed out that rebound effects are not necessarily bad since the overall well-being of society will be improved as a result. Therefore, even if the re-bound effect does not lead to a significant reduction in energy use, societal well-being will be improved. It is unclear whether the target of 80 per cent emission reductions by 2050 will be achieved since there are a number of different changes that need to be implemented in order for the barriers to energy efficiency to be overcome (Bell and McGillivray, 2008: 531). In effect, whilst many implementations have been made towards establishing a sustainable future in the energy sector, the extent to which these have proven su ccessful remains largely unclear. If the barriers to energy efficiency are removed and the GEA pathways are followed, there is a possibility that the emission reductions will be reduced by 2050, yet it remains to be seen whether this will be by 80 per cent. This is because as put by Riahi et al; â€Å"although the GEA pathways have shown that such a transformation is possible, the task remains and ambitious and will require rapid introduction of policies and fundamental policy changes that lead to coordinated efforts to integrate global concerns† (2012: 1300). Consequently, the barriers to energy efficiency will need to be overcome before the GEA pathways can be implemented, yet this is likely to prove extremely complex. Increased awareness would be the first step as this will lead to behavioural changes that will ensure the GEA pathways are being adopted. Conclusion Overall, whilst there are a number of different GEA pathways that are intended to make effective socio-technological changes in the energy system, the extent to which these will prove successful remains unclear. This is because, whilst many of the pathways are considered effective ways of creating an environmentally friendly energy system, it cannot be said that the current mechanisms are being employed by all. This is evidenced by the introduction of green leases, which are aimed at establishing energy efficient ways of occupying commercial property. Whilst these leases do seem rather beneficial to both landlords and tenants, their place in the market has not yet been established. The lack of incentives may be one reason for this, which signifies how further benefits ought to be made available. In addition, the future of the mitigation and adaption strategies that have been implemented into the building sector is also unclear because of the fact organisations do not always co-operat e in the implementation of such strategies. The re-bound effect is also not being given enough consideration and thus needs to be taken into account when analysing the GEA pathways. Consequently, in order to maintain sustainable development and minimise climate change, it is vital that the GEA pathways are being promoted a lot more so that the impact the building sector has on the environment can be minimised, yet in doing so the re-bound effect should be taken into account in order to ensure that a more realistic approach is undertaken References All Party Urban Development Group., (2008). Greening UK Cities Buildings; Improving the Energy Efficiency of Our Offices, Shops and Factories. A Report Delivered by the Officers, (2008), 20 March 2014. Bell, S. and McGillivray, D. (2008). Environmental Law, 7th edn Oxford University Press. Bright, S., (2008). Going Green. 158 New Law Journal 1135, Issue 7333. CCCSEP. (2012) ‘Global Energy Assessment: Energy-Efficient Building Modelling Scenarios’ Centre for Climate Change and Sustainable Energy Policy, Centre European University, 29 March 2014. DEEC. (2010). ‘What is the Green Deal?’ (2010) The Department for Energy & Climate Energy, Accessed 20 March 2014. Department for International Development. (2011) ‘Tackling Climate Change, Reducing Poverty’, UK International Climate Fund, Accessed 19 March, 2014. Dowden, M., (2008). Property/Landlord & Tenant: Contentious Carbon158 New Law Journal 1707, Issue 7348. Ecofys. (2012) ‘The Benefits of Energy Efficiency – Why Wait?’ Sustainable Energy for Everyone, Accessed 30 March 2014. Gillingham, K. Kotchen, M. J. Rapson, D. S. and Wagner, G. (2013) ‘The Rebound Effect and Energy Efficiency Policy’ Yale University School of Forestry & Environmental Studies, [Online] Available: http://www.yale.edu/gillingham/ReboundEffectLongForm.pdf [03 April, 2014]. Global Alliance. (2012) Why Buildings, Global L-eadership in our Built Environment, Accessed 20 March 2014. Global Energy Assessment (GEA) Writing Team. (2012) Global Energy Assessment, Towards a Sustainable Future, New York: Cambridge University press. Global Energy Assessment (GEA). (2014) ‘Global Energy Assessment’ International Institute for Applied Systems Analysis, Accessed 19 March 2014. Hinnells, M., Bright, S., Langley, A., Woodford, L., Schiellerup, P., and Bosteels, T., (2008). McEldowney, J. and McEldowney, S. (2010) Environmental Law, 1st edition Longman. NAR. (2014) ‘What is Green Building’ National Association of Realtors, Accessed 14 March 2014. Passivhaus. (2011) ‘The Passivhaus Standard’ [Online] Available: http://www.passivhaus.org.uk/standard.jsp?id=122 [03 April 2014]. Rezendes, V, S. (1994) Geothermal Energy, DIANE Publishing. Riahi, K., et al; (2012) Global Energy Assessment, Chapter 17, [Online] Available: http://www.iiasa.ac.at/web/home/research/Flagship-Projects/Global-Energy-Assessment/GEA_Chapter17_pathways_lowres.pdf [03 April 2014]. Sorrell, S. J. (2010) ‘Dimitropoulus, The Rebound Effect: Microeconomic Definitions, Limitations and Extensions’ Ecological Economics, 65(3): 636-649. Stuart, R. (2006) ‘Command and Control Regulation’, The Encyclopaedia of Earth, Accessed 20 March 2014. The Carbon Trust. (2005) ‘The UK Climate Change Programme: Potential Evolution for Business and the Public Sector’ Making Business Sense of Climate Change, Accessed 29 March 2014. The Department of Energy and Climate Change (DEEC). (2014) What we do, Gov.uk, Accessed 20 March 2014. The Greening of Commercial Leases. Emerald Group Publishing Ltd, 20 March 2014. James, R., (2010). Not Easy Being Green. Property Law Journal 22, 20 March 2014. King, V., (2009). Is My Lease Green32 Company’s Secretary Review 24, Issue 24. LRCI., (2009). Guidance: Green Commercial Leases. Low Carbon Research Institute Convergence Programme, 20 March 2014. Urge-Vorsatz, D. (2012) ‘Energy End Use: Buildings’ Accessed 29 March 2014.