Topic Sentences Are Optional And Should Not Be Used In A Persuasive Essay
Wednesday, November 27, 2019
The Troubled Succession of Charles V of Spain
The Troubled Succession of Charles V of Spain By the time he was 20, in 1520, Charles V ruled the largest collection of European land since Charlemagne over 700 years earlier. Charles was Duke of Burgundy, King of the Spanish Empire and the Habsburg territories, which included Austria and Hungary, as well as Holy Roman Emperor; he continued to acquire more land throughout his life. Problematically for Charles, but interestingly for historians, he acquired these lands piecemeal - there was no one single inheritance - and many of the territories were independent countries with their own systems of government and little common interest. This empire, or monarchia, may have brought Charles power, but it also caused him great problems. The Succession to Spain Charles inherited the Spanish Empire in 1516; this included peninsular Spain, Naples, several islands in the Mediterranean and large tracts of America. Although Charles had a clear right to inherit, the manner in which he did so caused upset: in 1516 Charles became regent of the Spanish Empire on his mentally ill motherââ¬â¢s behalf. Just a few months later, with his mother still alive, Charles declared himself king. Charles Causes Problems The manner of Charlesââ¬â¢ rise to the throne caused upset, with some Spaniards wishing for his mother to remain in power; others supported Charlesââ¬â¢ infant brother as heir. On the other hand, there were many who flocked to the court of the new king. Charles caused more problems in the manner in which he initially governed the kingdom: some feared he was inexperienced, and some Spaniards feared Charles would focus on his other lands, such as those he stood to inherit from Holy Roman Emperor Maximilian. These fears were exacerbated by the time it took Charles to put aside his other business and travel to Spain for the very first time: eighteen months. Charles caused other, much more tangible, problems when he arrived in 1517. He promised a gathering of towns called the Cortes that he wouldnââ¬â¢t appoint foreigners to important positions; he then issued letters naturalizing certain foreigners and appointed them to important positions. Furthermore, having been granted a large subsidy to the crown by the Cortes of Castile in 1517, Charles broke with tradition and asked for another large payment while the first was being paid. Heââ¬â¢d so far spent little time in Castile and the money was to finance his claim to the Holy Roman throne, a foreign adventure feared by Castilians. This, and his weakness when it came to resolving internal conflicts between the towns and nobles, caused great upset. The Revolt of the Comuneros 1520-1 During the years 1520 - 21, Spain experienced a major rebellion within its Castilian kingdom, an uprising that has been described as the largest urban revolt in early modern Europe. (Bonney, The European Dynastic States, Longman, 1991, p. 414) Although certainly true, this statement obscures a later, but still significant, rural component. There is still debate on how close the revolt came to succeeding, but this rebellion of Castilian towns - who formed their own local councils, or communes - included a true mix of contemporary mismanagement, historical rivalry, and political self-interest. Charles wasnââ¬â¢t completely to blame, as pressure had grown over the last half-century when towns felt themselves increasingly losing power versus the nobility and the crown. The Rise of the Holy League Riots against Charles had begun before he had even left Spain in 1520, and as the riots spread, towns began rejecting his government and forming their own: councils called comuneros. In June 1520, as nobles remained quiet, hoping to profit from the chaos, the comuneros met and formed themselves together in the Santa Junta (Holy League). Charlesââ¬â¢ regent sent an army to deal with the rebellion, but this lost the propaganda war when it started a fire that gutted Medina del Campo. More towns then joined the Santa Junta. As the rebellion spread in the north of Spain, the Santa Junta initially tried to get Charles Vââ¬â¢s mother, the old queen, on theirà side for support. When this failed, the Santa Junta sent a list of demands to Charles, a list intended to keep him king and moderate his actions and make him more Spanish. The demands included Charles returning to Spain and giving the Cortes a much greater role in government. Rural Rebellion and Failure As the rebellion grew larger, cracks appeared in the alliance of towns as each had their own agenda. The pressure of supplying troops also began to tell. The rebellion spread into the countryside, where people directed their violence against the nobility as well as the king. This was a mistake, as the nobles who had been content to let the revolt carry on now reacted against the new threat. It was the nobles who exploited Charles to negotiate aà settlement and a noble led army which crushed the comunerosà in battle. The revolt was effectively over after the Santa Junta was defeated in battle at Villalar in April 1521, although pockets remained until early 1522. The reaction of Charles wasnââ¬â¢t harsh given the standards of the day, and the towns kept many of their privileges.à However, the Cortes was never to gain any further power and became a glorified bank for the king. The Germania Charles faced another rebellion which occurred at the same time as the Comunero Revolt, in a smaller and less financially important region of Spain. This was the Germania, born out of a militia created to fight Barbary pirates, a council which wanted to create a Venice like city-state, and class anger as much as a dislike of Charles. The rebellion was crushed by the nobility without much crown help. 1522: Charles Returns Charles returned to Spain in 1522 to find royal power restored. Over the next fewà years, he worked to change the relationship between himself and the Spaniards, learning Castilian, marrying an Iberian woman and calling Spain the heart of his empire. The towns were bowed and could be reminded of what they had done if ever they opposed Charles, and the nobles had fought their way to a closer relationship with him.
Saturday, November 23, 2019
There is More to Amir than Being a Decorated Marine Veteran
There is More to Amir than Being a Decorated Marine Veteran Hashtag: #FreeAmirNow Imprisoned for Bravery and Intellectual Capacity There is more to Amir Hekmatiââ¬â¢s arrest and imprisonment in Iran than being a decorated United States Marine veteran. In fact, the main reason for Amirââ¬â¢s 2011 arrest, imprisonment, and death sentence in early 2012 was his intellect and participation in the development of Kuma Reality Games as culture and language consultant. Amir Hekmati completed his high school studies in 2001 and since then participated in several educational and training programs offered by the U.S. military. He participated in the Naval Junior Reserve Officersââ¬â¢ Training Corps in 2001 and later attends the School of Infantry at Camp Pendleton, California. His intelligence, bravery, good conduct, and participation in Operation Iraqi Freedom earned him several awards and decorations, opportunity to study Arabic at the Defense Language Institute in Monterey, California, and later honorably discharged as a sergeant in 2005. In 2006, Amirââ¬â¢s experience as a translator in Iraq allowed him to establish Lucid Linguistic LLC and acquire Arabic and Persian translation contracts from U.S. military. He later got involved in different translation projects for DARPA (Defense Advanced Research Projects Agency) and language-learning video game (Kuma Reality Games) for the U.S. Department of Defense. Amir was about to start an economics degree at the University of Michigan when he was arrested and detained for espionage. You may be interested in: Moral Failure in Academic Institutions Yasar Kemal Is a Master of Word Torture Is Never Justified The Misdemeanors of Well-Educated People in Public Office Who and What Deserve Respect? Why Iran Think Amir Is Spying for CIA There is nothing special about Amirââ¬â¢s enthusiasm for education and specialist training including his seemingly extraordinary intelligence, courage, and integrity. The reason is that Amirââ¬â¢s father (Ali Hekmati), before brain cancer diagnosis, was a college professor at Mott Community College, Flint, Michigan. His sister remembered Amir as an energetic young man who loves sportsà and was curious about culture and languages. Despite being a natural born American with Iranian descent, Amir is fluent in Arabic and spent most of his military service as a linguist and translator. Iranââ¬â¢s Revolutionary Court labeled Amir as ââ¬Å"Corrupt on Earthâ⬠and ââ¬Å"An Enemy of Godâ⬠for allegedly spying and helping the United States undermine Iranââ¬â¢s integrity. The basis for such claim is Amirââ¬â¢s alleged intelligence training in 2001, direct participation in the development of MITRE Corporationââ¬â¢s two-way translation system and design of the languageââ¬âlearning aspects of Kuma Reality Games that are sponsored by the U.S. Department of Defense. The first one is certainly baseless but the rest are facts that are enough to convince Iranian authorities of espionage. Iran is historically hostile to insulting and malevolent activities such as Salman Rushdieââ¬â¢s ââ¬Å"Satanic Versesâ⬠, American governmentââ¬â¢s arrogance and consistent insulting remarks on Iran such as ââ¬Å"terrorist alliesâ⬠, ââ¬Å"an axis of evilâ⬠, and ââ¬Å"sponsor of global terrorâ⬠, and death sentence for a 30-year old man who posted a religiously offensive remarks on Facebook. Amir did nothing similar, but being an Iranian-American, a Middle Eastern culture, and language expert, and a favored contractor of U.S. military projects visiting relatives in Iran made him a credible spy in the imaginations of Iranian authorities. Amirââ¬â¢s education, military experience and recognitions, expertise, and chosen line of work are difficult to ignore particularly to people who are exceedingly sensitive and hostile to change and spread of democratic values.
Thursday, November 21, 2019
Organizational Behavior Principles Essay Example | Topics and Well Written Essays - 500 words - 2
Organizational Behavior Principles - Essay Example Friendship group is more social in nature. George and Jones define this workgroup as ââ¬Å"a collection of organizational members who enjoy each others company and socialize with each other (often both on and off the job).â⬠Basically, the project team staff which was formed can be best characterized as a task force. Consistent with the definition of George and Jones, the project team was established for a certain goal and that is to ââ¬Å"realize process gains.â⬠There is also a definite time frame for the achievement of the workgroupââ¬â¢s objective, after which it will disband. The workgroup is expected to realize its mission ââ¬Å"within three months.â⬠A research conducted by the Filine Institute concluded that the most essential factors in determining the performance of a workgroup which hopes to achieve a certain goal is good communication and cohesion (Sourcemedia 2005). As a task force, the project staff team can take advantage of these research results as it is an organization which strongly depends on the cooperation of each individual member in the achievement of its common goal. Good communication is really a key in achieving process gains. Communication within the project staff team enables the dispensation of relevant information which will aid the whole organization in transferring ideas, evaluating possibilities, and promotes harmonious relationship between group members. Good communication also eliminates probable errors which can be brought about by miscommunications. Cohesion or interdependence is another key in boosting the performance of project staff team. The realization within the group that they are a part of a cohesive whole whose goals can only be achieved by strong coordination will motivate each member to do best for the group. Cohesion also cultivates each memberââ¬â¢s sense of belongingness. Process losses
Wednesday, November 20, 2019
Tibet Buddhism Essay Example | Topics and Well Written Essays - 500 words
Tibet Buddhism - Essay Example This relates to the vehicles by practicing the Buddhaââ¬â¢s teachings. Vehicles are paths followed to gain enlightenment. The vehicles are Hinayana, Mahayana and Tantrayana. The three turnings are teachings that allow an individual to choose a vehicle to enlightenment The Creation or Generation Stage is the first step in meditation of Buddhist sadhana. The Completion or Perfection Stage is when an adept realizes their personal path of enlightenment. The Great Perfection is the highest teachings of Tibetan tradition. Thus first the Generation Stage must be complete, the Perfection Stage, and finally Great Perfection can be learned. Trungpa meant that Tantric wisdom allows the suffering to stop, or nirvana, which goes into the cycle of birth, death, and reincarnation, or samsara. If hate, pain, and anger are stopped, the individual reaches nirvana. If these emotions are no longer there, than samsara is easier to accept. Luminosity, bliss, and emptiness are the states of the mind. Every mind is a luminous mind. Bliss is a state the mind tries to achieve. Emptiness leads to bliss due to the purging of all negative emotions. The reason Buddhist want to empty their minds is to alleviate suffering. If a soul is empty it cannot suffer. 4. Using Davidsonà ¢Ã¢â ¬Ã¢â ¢s Tibetan Renaissance and Karmayà ¢Ã¢â ¬Ã¢â ¢s The Great Perfection as guides, tell me how the relationship between the Tibetans and Tantra changed from the time of Relpachen to roughly one hundred years after his assassination. During Relpachenââ¬â¢s rule, the Tibetans and Tantra were closely intertwined. The Tantra was ancient Tibetan teachings of love. Since Relpachen support Buddhism, the Tantra was encouraged during his time. However after his assassination of Relpachen, his brother became king. This king was anti-Buddhist. So for a period of time Buddhists were persecuted. Thus the Tantra passed down by the Tibetans was weakened through this persecution, civil wars, and
Sunday, November 17, 2019
World War II Essay Example for Free
World War II Essay In retrospect, there is no doubt that Japanese Americans were discrimated against during World War II. From almost the first moment they arrived in this country, many white people had negative feelings about them. With the negative feelings of wartime escalating, the Japanese internment seemed just the thing to do in order to be proactive in the war. At least that is what government officials told themselves and sold the American public on. The government was able to intern the Japanese because of a long history of prejudice, wartime hysteria, and economic motives. The Japanese were discriminated against in many ways. One way is that they were the only group interned during World War II. Japan did bomb Pearl Harbor, but these were Japanese Americans that were interned with absolutely no proof that they were ever plotting against the United States. The United States was also pitted against Germany and Italy and these citizens were never interned. This is because those people has assimilated and become part of the population at large. Interning Germans would have included interning people like icon Joe DiMaggioââ¬â¢s father. The Japanese were much easier to identify and single out as a group. They could not assimilate because government policies had singled them out and they were not allowed to marry or otherwise mix with the general population. Many United States citizens had always harbored negative feelings toward the Japanese. As early as 1900, the San Francisco mayor James Duval Phelan spoke out publicly against the Japanese. He said, ââ¬Å"The Japanese are starting the same tide of immigration which we thought we had checked twenty years agoâ⬠¦Personally we have nothing against the Japanese, but as they will not assimilate with us and their social life is different from ours, let them keep a respectful distanceâ⬠(Yancey 15). ). By 1905, being greatly influenced by all the sensationalism in the newspapers, Western legislators made statements like ââ¬Å"Japanese laborers, by reason of race habits, mode of living, disposition and general characteristics, are undesirableâ⬠¦They contribute nothing to the growth of the state. They add nothing to its wealth, and they are a blight on the prosperity of it, and a great and impeding danger to its welfareâ⬠(Daniels 11). This is to say nothing of the fact that they were stripped of all their civil liberties when they were interned. They were herded like cattle into first assembly centers and then internment camps. They could pack only what they could carry; they were forced into tight quarters with little or no privacy. They were surrounded by armed guards and barbed wire fences. They had basically no rights for as long as four years. Most of the Japanese Americans did not struggle or resist in any way. They went along willingly with the government orders because they wanted to prove their loyalties to this country. They resisted this discrimination by doing exactly what was asked of them. Once they were in the internment camps, they went about coping with their lives the best way they knew how. Typically this included how to improve their situation. they formed. Mary Tsukamoto describes a typical day at the camps. ââ¬Å"A typical day in an internment camp such as Jerome would begin with families getting up. Remember we did not have any water in our rooms. We just had one light bulb and a small stove. We had to get dressed and go to the middle of the block to use the toilet, wash up and take showers. Usually there were people waiting in lines. After you brushed your teeth and cleaned up, you had to go to a separate building for breakfast, lunch, and dinner. They had two sessions. If you were late or forgot your ticket, you could not eat. We stood in line for the food, which was served on metal trays, and we sat at long wooden tables with benches. There really wasnt much to do the rest of the time. My dad ran the recreation center for our block. Mother organized and coordinated YWCA (Young Womens Christian Association) and USO activities. The USO was organized to welcome Nisei soldiers who were visiting their families. At night we would stay in our room. We didnt have TV in those days. And we did not have a radioâ⬠(Tsukamoto). In Farewell to Manzanar, Houston points out other details, like the kitchens being badly ventilated so that food spoiled quickly so that many people constantly had the ââ¬Å"Manzanar runsâ⬠(Houston 27). There were many other ways in which Manzanar totally upended their lives before the camps. Because they had to endure this unusual treatment, they were discriminated against. One of the ideas Tsukamoto highlights is that people had to wait in line for everythingââ¬âto eat, to use the bathroom, etc. Life was basically one monotony after another although internees did all kinds of things to improve their environments from beginning educational courses to starting baseball leagues to planting gardens. They actually built baseball fields themselves and formed leagues to play baseball. They did everything they could to make their lives seem as normal as possible. They formed their own neighborhoods inside the walls of these camps that functioned much like neighborhoods on the outside with their own beauty shops, produce stores, newspaper, etc. It has been proven in retrospect that the Japanese were discriminated against. According to information from the web site densho. org, ââ¬Å"In 1983, however, a U. S. congressional commission uncovered evidence from the 1940s proving that there had been no military necessity for the unequal, unjust treatment of Japanese Americans during WWII. The commission reported that the causes of the incarceration were rooted in ââ¬Å" race prejudice, war hysteria and a failure of political leadership. [2] Works Cited Recommendations section, Personal Justice Denied: Report of the Commission on Wartime Relocation and Internment of Civilians. (1982. Seattle: University of Washington Press, 1997), page 459. Tsuakamoto, Mary. And Justice for All: an oral history of the Japanese detention camps. Houston, James. Farewell to Manzanar, Japanese American Legacy Project. http://www. densho. org
Friday, November 15, 2019
The Allegory Of Young Goodman Essay -- essays research papers fc
In Hawthorne's 'Young Goodman Brown,'; the characters and settings are used to show allegory. The characters and setting are used in metaphor to represent something else. The whole story of 'Young Goodman Brown,'; represents the journey of everyman. It's path that everyone follows, or so Hawthorne seems to believe. Ã Ã Ã Ã Ã The main character, Young Goodman Brown represents the sense of everyone. His last name, Brown, is a common name and therefore could be taken to mean everyone because it is so common. Young could mean someone who is innocent and inexperienced. He is newly married and starting his new life or journey down that path we call fate. Goodman represents just that, a good man. Ã Ã Ã Ã Ã Faith, Goodman Brown's wife, represents just that, faith. She stands for Brown's faith in god or a greater power than himself. 'There was a scream, drowned immediately in a louder murmur of voices, fading into far-off laughter, as the dark cloud swept away, leaving the clear and silent sky above goodman Brown. But something fluttered down through the air, and caught on the branch of a tree. The young man seized it and beheld a pink ribbon. 'My Faith is gone!' cried he, after one stupefied moment. 'There is no good on earth; and sin so but a name. Come devil! for to thee is this world given.' '; (Hawthorne 196) The ribbon Brown seized from the branch was one of the things Hawthorne had used to describe Faith in the beginning of the story. ...
Tuesday, November 12, 2019
Home Security System
ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM MIOR MOHAMMAD HAFIIZH BIN ABD. RANI UNIVERSITI MALAYSIA PAHANG ABSTRACT Nowadays, house security system becomes the best solution to overcome house intrusion problem when user is not in house. As we know, there are many types of house security system which is too expensive and difficult to use. For that reason, an effective house security system at low cost is built where user can also program the security system by their own.This project is focusing on developing a house security system with an active infrared motion detector which is controlled by microcontroller Intel 8051. The overall project is divided into two parts. The first part is concern on the hardware development where all electronics component are connected via the circuit design using wrapping technique. An active infrared, the magnetic sensor, and keypad are the input components while buzzer, indicator, and LCD display are the output components where itââ¬â¢ s all controlled by controller circuit. The second part is base on software programming to operate the hardware structure.Program for security system based on microcontroller Intel 8051 assembly language is assemble using ASM51 assembler to get the binary file thus, to load into external memory of the hardware structure via serial communication. The process of downloading and executing the program is done using HyperTerminalââ¬â¢s communication software to the microcontroller serial port. In order to achieve the best house security system, more detectors or sensors can be connected to the microcontroller output port where it can be reprogram by user using their personal computer at home. Read thisà Chapter 2 ââ¬â Why Security is NeededAs the result, the infrared motion detector is capable to detect motion while the microcontroller is capable to control the whole operation of the security system. CHAPTER 1 INTRODUCTION 1. 1 Background Motion detection is the action of sensing physical movement in a given area. Motion can be detected by measuring change in speed or vector of an object in the field of view. This can be achieved either by mechanical devices that physically interact with the field or by electronic devices that quantifies and measures changes in the given environment.There are two device of motion detection which is the mechanical device, and the other one is electronic device. In the mechanical device, a tripwire is a simple form of motion detection. If a moving objects steps into the tripwire's field of view then a simple sound device like bells may alert the user. Mechanical motion detection devices can be simple to implement, but at the same time , it can be defeated easily by interrupting the devices' mechanics like ââ¬Å"cutting the wireâ⬠. While in electronic device, the electronic motion sensing such as motion detectors, can prevent such mechanical intervention.The principal methods by which motion can be electronically identified are optical detection and acoustical detection. Infrared light or laser technology may be used for optical detection. Motion detection devices, such as motion detectors, have sensors that detect movement and send a signal to a sound device that produces an alarm or switch on an image recording device. There are motions detector which employ cameras connected to a computer which stores and manages captured images to be viewed over a computer network.The applications for such detection are detection of unauthorized entry, detection of cessation of occupancy of an area to extinguish lighting, and detection of a moving object which triggers a camera to record subsequent events. The motion det ector is thus a basic idea of electronic security systems. 1. 2 Project objective The objective of this project is to build a house security system using microcontroller Intel 8051 based on active infrared motion detection. 1. 3 Project scope This project concentrates on a development of an active infrared motion detector for house security system.To develop the whole project, it consists of three methods which are the concept of security system, the electrical structure, and the software programming. The concept of security system is on the detection of movement using active sensor to trigger alarm controlled by the microcontroller Intel 8051. The electrical structure consist of two systems which are the active infrared circuit that used to detect or sense motion and the microcontroller Intel 8051 circuit, used to control the whole operation of the security system. While the software programming is base on the microcontroller Intel 8051 instruction sets.It contains a program design ed for a security system as an interaction to operate the electrical structure. 1. 4 Literature review Motion detectors are mainly used in security systems [4]. It is typically positioned near exterior doorways or windows of a building to monitor the area around it. Since motion detectors are so flexible and have so many uses, it offers feelings of protection and security for the average homeowner as well as commercial organizations [4]. An electronic motion detector is a device used to detect any physical movement in a given area and transforms motion into an electric signal.It consist of sensor that electrically connected to other devices such as security system, lighting, audio alarms, and other applications. Motion sensors are used in a wide variety of applications and as a result, many different types of motion sensors are available including the infrared sensor. Infrared sensors are widely known in the arts of intrusion detection and in fire or smoke detection. It is a device that often used in automatic light switches and security systems to turn on a light or to activate some other form of alarm or warning indicator when a person enters a monitored area [4].The infrared sensors have basically two forms: active and passive. [4] An active infrared detector includes a radiation source and an infrared sensor which is sensitive to interruptions in the radiation sensed from the source. [4] These detectors are used as intrusion detectors by providing a path of radiation from the source to the sensor in a place where the path is likely to be interrupted by an intruder. The proposed active infrared method of motion detection has the advantage of fast speed response of a relatively large sensor.This advantage permits simpler optical system design, especially for wide fields of view. Besides, it is insensitivity to mechanical and acoustic noise, which presents substantial problems in the passive infrared (PIR) sensors. Low production cost is another advantage of these active infrared detectors. [4] Passive infrared motion detection detects heat energy radiated or emitted by an object, such as a body of a person, moving across a field of view of a heat sensor of the motion detection system. It is generally use an optical ollection system and multiple sensing elements of alternating polarity to create a detection pattern in the volume of interest. PIR detectors employ a group of radiation sensors coupled through amplifiers to a logic circuit. The radiation sensors detect changes in ambient infrared radiation. The detection system has an electrical circuit operatively coupled to the heat sensor for producing a detection signal in response to the heat sensor detecting a change of temperature caused by the body heat of a person entering the detection pattern. PIR motion detectors are perhaps the most frequently used home security device. 4] Passive IR motion detectors are usually designed to provide an indication to an alarm panel in response to detecting IR that is indicative of motion of the object. The alarm panel is responsive to receipt of the breach indication to cause an alarm condition to occur. The other motion detector used in security system is an ultrasonic motion detector. It is commonly used for automatic door openers and security alarms [4]. It is inexpensive and can operate with narrow beam-widths. The ultrasonic transducers are the sensor that used in ultrasonic motion detector.It can be used to detect motion in an area where there are not supposed to be any moving objects. This type of motion detector is most commonly used in burglar alarm systems since they are very effective in this application [4]. In an ultrasonic motion detector, there are two transducers; one emits an ultrasonic wave and the other picks up reflections from the different objects in the area. The reflected waves arrive at the receiver in constant phase if none of the objects in the area are moving. If something moves, the received sig nal is shifted in phase. A phase comparator detects the shifted phase and sends a triggering pulse to the alarm.Ultrasonic motion detectors have certain advantages and disadvantages when compared with other types of motion detectors. The main advantage is that they are very sensitive and extremely fast acting. However, the largest problem with this type of motion detector is that it sometimes responds to normal environmental vibration that can be caused by a passing car or a plane overhead. Besides, the installation options on this type of motion detector are limited because ultrasonic beams are easily blocked by thin materials, including paper. False triggering is easily caused by reflections from blowing curtains, pets, and flying insects.While the passive infrared motion detectors offers problem where it can be falsely triggered by warm air movement or other disturbances that can alter the infrared radiation levels in an area. In order to prevent this problem, newer systems use t wo infrared sensors, which monitor different zones within a protected area. Logic within system triggers the alarm only when the two zones are activated in sequence, as would occur if a person walked through the protected area. For that reason, the purpose of using the active infrared as a sensor to detect motion for this project is surely on the advantage offers by the sensor.Its capability on detecting motion with a simple design at lowest cost is needed to build an effective house security system based on motion detection. 1. 5 Thesis outline Chapter 1 explains the background of motion detection, the project objective, the project scope, and the literature review of motion detector for security system. The concepts of motion detector are the major element as a guide for the development of the security system. Chapter 2 explains the systems involved for the development of the active infrared motion detector for house security system.The understanding of three systems which are the active infrared, motion detector, and house security system stated in this chapter needed for the development of the whole project. Chapter 3 focuses on the methodologies for the development of the electrical structure and the implementations of microcontroller programming. It gives a brief review on the concept of active infrared motion detector, the electrical structure for hardware development, and the programming for the operation of the security system. Chapter 4 discusses on the results obtained of the whole project.All discussions are concentrating on the result and performance of the security system. The discussion is valuable for future development of the security system. Chapter 5 discusses about the conclusion on development of the active infrared motion detector for house security system. The recommendations and modification required on this project is stated in this chapter for further development. CHAPTER 2 ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM 2. 1 Introduction There are two systems on a development of the active infrared motion detector for house security system.The first system is an active infrared motion detector and the other one is the controller system. The first system concentrates on a development of an active infrared motion detector. It is consists of three element, which are the active infrared, the motion detector, and the house security system. The motion detector circuit will be control by the second system which is the microcontroller Intel 8051 based system. The combination between this two systems will built a project called an active infrared motion detector for house security system. 2. 2 Active infrared (IR)Infrared is an electromagnetic spectrum at a wavelength that is longer than visible light. It cannot be seen but it can be detected. Objects that generate heat also generate infrared radiation and those objects include animals and the human body whose radiation is strongest at a wavelength of 9. 4à µ meter. Infrared in this range will not pass through many types of material that pass visible light such as ordinary window glass and plastic. However it can pass through, with some attenuation, material that is opaque to visible light such as germanium and silicon. The active infrared sensors use invisible light to scan a defined area.In active infrared systems, there are two-piece elements which are consisting of an infrared transmitter and an infrared receiver. There is a 3/8 inch infrared beam between the transmitter which is placed on one side of the trail and the receiver which is placed on the other side of the trail. The transmitter and the receiver can be separated by as much as 150 feet. The transmitter emits a beam of light into the scan zone. The light, which is reflected by the background returns to the receiver, which constantly monitors the scan zone. When a person or object enters the zone the infrared light is interrupted.It then sends a signal to the controller sys tem, which is wired into the door controls. One variation of this operating mode is called ââ¬Ëbackground suppressionââ¬â¢. This is when the receiver only detects a change in the reflected light when a person or object enters the scan zone thus causing a reflectance variation of the light, sending a signal to the microcontroller thus trigger the alarm of the security system. 2. 3 Motion detector A motion detector is a device that contains a motion sensor and is either integrated with or connected to other devices that alert the user of the pre-sense of motion.An electronic motion detector contains a motion sensor that transforms the detection of motion into an electric signal. The electric signal can be connected to a burglar alarm system which is used to alert the home owner or security service after it detects motion. An example of sensor that used in security system is an active sensor. Active sensors in motion detectors system are commonly used inside homes for a security system. An active motion detector emits optics or sound waves and measures feedback to detect motion. The simplest type of active motion detector is commonly used in commercial doorways to trigger a doorbell.A device is fixed to one side of the doorway, an optical sensor to the other. A beam of light will passes from the device through the sensor. When someone enters the establishment, the beam is broken, triggering the doorbell thus warn user for the intrusion. For that reason, active motion detectors can be purchased for home improvement security system. It is inexpensive devices that can add for more security to a home and provide peace of mind for home owners. 2. 4 House security system House security system is one of security that truly related to burglar or safety alarm system.Burglar and safety alarms are found in electronic form nowadays. Sensors are connected to a control unit via either a low-voltage hardwire which in turn connects to a means for announcing the alarm to el icit response. In a new construction systems are predominately hardwired for economy while in retrofits wireless systems may be more economical and certainly quicker to install. Some systems are dedicated to one mission; handle fire, intrusion, and safety alarms simultaneously. In common security system, the lights are triggered by motion gives the impression to user that someone is at home and able to see the burglar.Infrared motion detectors placed in house security system in crucial areas of the house can detect any burglars and alert the home owner or police. The first security system invented, house alarms were triggered by the release of a pressure button fitted into a door or window frame. This basic alarm was fundamentally flawed as the entire intruder needed to do to silence the alarm was to close the door or window. While various systems on the market ranging from inexpensive house security alarms to highly sophisticated systems requiring professional installation.All mode rn alarms are based on the same foundation, the electric circuit which is completed either when the door is opened or closed depending on the security system designed. The alarm is triggered when the circuit is altered and will not be silenced until a code is punched into the control panel. The most expensive and complicated alarm systems might also involve a combination of motion sensors and pressure pads to ensure even the most cunning intruder doesnââ¬â¢t get his hands on treasures. 2. 5 Microcontroller Intel 8051 The microcontroller 8051 is an 8-bit machine.Its memory is organized in bytes and practically all its instruction deal with byte quantities. It uses an Accumulator as the primary register for instruction results. Other operands can be accessed using one of the four different addressing modes available: register implicit, direct, indirect or immediate. Operands reside in one of the five memory spaces of the 8051. The five memory spaces of the 8051 are the Program Memo ry, External Data Memory, Internal Data Memory, Special Function Registers and Bit Memory. The Program Memory space contains all the instructions, immediate data and constant tables and strings.It is principally addressed by the 16-bit Program Counter (PC), but it can also be accessed by a few instructions using the 16-bit Data Pointer (DPTR). The maximum size of the Program Memory space is 64K bytes. The External Data Memory space contains all the variables, buffers and data structures that can not fit on-chip. It is principally addressed by the 16-bit Data Pointer (DPTR), although the first two general purposes register R0 and R1 of the currently selected register bank can access a 256-byte bank of External Data Memory. The maximum size of the External Data Memory space is 64K bytes.The external data memory can only be accessed using the indirect addressing mode with the DPTR, R0 or R1. The Internal Data Memory space is functionally the most important data memory space. In it resi des up to four banks of general purpose registers, the program stack, 128 bits of the 256-bit memory, and all the variables and data structures that are operated on directly by the program. The maximum size of the Internal Data Memory space is 256-bytes. The register, indirect and direct addressing modes can be used in different parts of the Internal Data Memory space.The Special Function Register space contains all the on-chip peripheral input and output registers as well as particular registers that need program access. The maximum number of Special Function Registers (SFRs) is 128, though the actual number on an 8051 family member depends on the number and type of peripheral functions integrated on. The SFRs can only be accessed using the direct addressing mode while the upper 128 bytes of the Internal Data Memory can only be accessed using the Indirect addressing mode. The Bit Memory space is used for storing bit variables and flags.There are specific instructions in the 8051 th at operate only in the Bit Memory space. The maximum size of the Bit Memory space is 256-bits. Bits can only be accessed using the bit instructions and the direct addressing mode. 2. 6 Summary The understanding on the elements of the systems involved for this project which are the active infrared, the motion detector, and the house security system is needed before proceed for the design and development process. This is important to ensure the project done according to the main idea of each part discuss in this chapter. CHAPTER 3 METHODOLOGY 3. 1 IntroductionThere are several steps to be applied in designing an active infrared motion detector for house security system. The relevant information is gathered through literature review from previous chapter. Data on motion detection and security system projects has been collected where the theoretical design is studied based on the motion detector for security concept. The understanding on the electrical structure for the hardware develop ment is needed for the design circuit process of the motion detector and the basic security circuit. The next is the hardware development according to the circuit designed.This process is just only being proceed if each part of the circuit being improved is valid, else, it will be repeated until it is valid as the theoretical. Once the hardware development circuits have the output as the expected, then, the comparison for both hardware and theoretical analysis will be done. Next is the step where software structure is developed for the security system to be interface with the hardware development. While the final step of this research is on applying the whole project to the real house entrance like doors and windows. 3. 2 The concept of motion detector for security systemFigure 3. 1 Active infrared motion detectors Figure 3. 2 shows the concept of an active infrared motion detector for a security system. In the active system each sensor consists of two housings. The first housing co ntains an infrared-emitting diode and an infrared-sensitive phototransistor as the infrared detector. The other housing contains an infrared reflector to reflect the infrared signal. When positioned in front of an entrance to a protected area, the two housings establish an invisible beam. Figure 3. 2 The concept of infrared motion detector for security systemA person who enters the area will interrupts the beam causing an alarm to be triggered. For this type of motion detector uses the basic concept of the active infrared motion detector. An interruption in the signal modulated pulsating beam transmit by an infrared diode while receive by an infrared detector will set ââ¬Ëonââ¬â¢ or ââ¬Ëoffââ¬â¢ the alarm of the security system. 3. 3 Hardware development Figure 3. 3 Block diagram for the house security system The hardware development is divided into three stages as shown in block diagram above. The inputs stage of the security system is the motion detector circuit, keypa d, and magnetic sensor.The second stage is the controller unit which is the microcontroller Intel 8051. The purpose of using microcontroller is to control the whole system operation by sending data to the output stage which is the LCD display, indicator, and buzzers. 3. 3. 1 Motion detector circuit In designing the infrared motion detector circuit, it is based on two basic principle of active infrared motion detector which is the infrared transmitter and infrared receiver as shown in Figure 3. 4. Figure 3. 4 Basic principle of infrared operation 3. 3. 2 Infrared transmitterFor the infrared transmitter which is also known as emitter circuit, it is on a basic design of timer 555 astable operation. The output of timer is connected to the infrared transmitter is used to produce pulse using an astable timer circuit. In astable circuit operation, pulse will continually generated until the power supplied through the circuit is removed. The astable circuit produces a continuous train of pul ses at any frequency required. This means that the 555 timer can operate repeatedly; it will switch ââ¬Ëonââ¬â¢ and ââ¬Ëoffââ¬â¢ continually to generate data for the infrared transmission. . 3. 3 Infrared receiver The infrared receiver which is also known as infrared detector receives the data transmitted by the infrared transmitter circuit. It is a simple electronics device on detecting infrared signal. This infrared detector can be directly connected into the controller circuit to produce logic high ââ¬Ë1ââ¬â¢ or low ââ¬Ë0ââ¬â¢ from the output terminal thus activate or deactivate the controller system operation. The range of infrared detector components according to datasheet stated that the infrared detector can fully operates on detecting the infrared signal of 38 to 45 kHz. . 3. 4 4 ? 4 hexadecimal keypad The purpose of using 4 ? 4 hexadecimal keypad in the project is as an input where secure code entries to activate of deactivate the security system ope ration. The keypad provides eight interface pins, where one pin for each row and column of the keypad matrix. This 4 ? 4 hexadecimal keypad is connected to the keypad encoder (MM74C922) to control the keypad bouncing in the hardware development. 3. 3. 5 Keypad encoder (MM74C922) The MM74C922 key encoders provide all the necessary logic to fully encode an array of 4 ? hexadecimal keypad. It is used to encode the data received from the keypad code entry thus convert into binary code. These binary code is in hexadecimal number is required in data bus of the microcontroller system. Figure 3. 5 Interaction between keypad, keypad encoder, and octal buffer The figure 3. 5 above shows the block diagram on the interaction between the 4 ? 4 hexadecimal keypad, keypad encoder (MM74C922), and the octal buffer (74LS244). The keypad is used as a switch to give logic configuration to the keypad encoder.While the encoder will encode the data configuration from the keypad into the binary code based on datasheet of the encoder. These binary codes will be stabilized using the octal buffer to be process in the microcontroller system. These data will be process by the microcontroller thus running the system operation based on software designed for the security system. 3. 3. 6 Octal buffer (74LS244) A buffer is simply a unity-gain amplifier, usually with very high input impedance and very low output impedance. It allows a connection of heavily loaded to another load which requires a lot of current like capacitive load.The octal buffer is used to isolate one device from another by eliminating loading effects. It provides a ââ¬Ëbufferââ¬â¢ between the two devices. The 74LS244 are octal buffers and line drivers designed to be employed as the memory address drivers, clock drivers, and bus-oriented transmitters/ receivers which provide improvement on the controller board density. 3. 3. 7 Microcontroller circuit (Intel 8051 ââ¬â expended mode) The controller systems that use to control the motion detector system and other electronic devices are the microcontroller Intel 8051 ââ¬â expended mode.In expended mode configuration, external ROM and RAM are used to add the data memory to be more than internal memory provided by the Intel manufacturer. The purpose of using an expended mode for the project is to expend more data available on developing and designing an excellent operation of the security system. Figure 3. 6 Intel 8051 block diagram The microcontroller Intel 8051 is a widely used on controlling devices and instruments due to its flexibility, existence of multiple producers. It consists of a simple architecture introduced by Intel in the year of 80ââ¬â¢s.It produced with 128 bytes of RAM, 4K bytes of on-chip ROM, 2 timers, one serial port, and 8-bits wide of ports. This type of microcontroller become very popular after Intel allowed another manufacturer to make and market any flavor of the 8051, and still remains compatible with 8051. There ar e various versions of 8051 with different speeds and amount of the on-chip ROM which is valuable on controlling a system designed. 3. 4 Software development The software structure is using the assembly language where a set of program based on security system is assembled using ASM51 assembler.The 8051 Cross Assembler (ASM51) takes an assembly language source file created with a text editor and translates it into a machine language object file. This translation process is done in two passes over the source file. During the first pass, the Cross Assembler builds a symbol table and labels that used in the source file. While the second pass of the Cross Assembler is actually translates the source file into the machine language object file. During the second pass, the listing file of the assembled is generated for the analysis purpose.A security program as shown in flow chart below were written in notepad based on 8051 instruction set before assembling process to get the binary code. Thi s binary code is then used to be load into the location of the memory thus operates the hardware developed. The flowchart as shown in Figure 3. 7 is a basic designed for the security system operation. In this security system, the security code is set as ââ¬Ë1985ââ¬â¢ to activate or deactivate security system. When user closed the door, the system will activate where the magnetic switch and infrared is in active condition.To deactivate the system where opening door without alarm, user must enter the deactivation code. The chance to deactivate the system is once before keypad locked, where user can not enter the code anymore. If deactivation code was correct, green LED will ââ¬Ëonââ¬â¢ while alarm will ââ¬Ëoffââ¬â¢ condition. System at this time is successfully deactivated and user can open the door without alarm. Figure 3. 7 Flow chart of software design for the security system If deactivation code enters was incorrect, system is still activate and for that, red LED and alarm will ââ¬Ëonââ¬â¢ where the system is in a warning mode.The system will keep in this mode until the correct deactivation code entered. When the correct deactivation codes enter, the reconfirm code is needed where user need to reenter the correct deactivation code before the system successfully deactivate; the green LED will ââ¬Ëonââ¬â¢ and the alarm will ââ¬Ëoffââ¬â¢ condition. The reconfirm code is designed in the system to make more security for the system developed. If intruder open the magnetic switch without entered the correct security code, thus the alarm will ââ¬Ëonââ¬â¢. User must enter the correct deactivation code to turn ââ¬Ëoffââ¬â¢ the alarm system.The activation and deactivate code for this system are ââ¬Ë1985ââ¬â¢ and the ââ¬Ëenterââ¬â¢ button codes are ââ¬ËAââ¬â¢ for every codes entered. 3. 5 Summary There are three elements discussed in this chapter which are the concept of motion detector for security syste m, the hardware development, and the software designed for the security system. Each part of these elements is related to each other. The understanding of the concepts and methods on developing the project is very important to achieve the main objective for the whole project. CHAPTER 4 RESULTS AND DISCUSSIONS 4. 1 IntroductionThis chapter will briefly discuss on the results and discussions of the hardware development. There are three major modules in developing the hardware structure which are the active infrared motion detector circuit, keypad module circuit, and the most important; the controller circuit 4. 2 Motion detector circuit The hardware development of the active infrared motion detector system is divided into two parts, which are the infrared emitter circuit and the infrared detector component. 4. 2. 1 The emitter The emitter which also known as infrared transmitter circuit was build as shown in Figure 4. . A probe or the oscilloscope is attached to the infrared LED while the adjustable resistor is varied to calibrate the emitter to transmit 38 kHz square wave. The Figure 4. 1 shows the final configuration of the emitter circuit: Figure 4. 1 The emitter circuit Figure 4. 2 shows the result obtained from the oscilloscope where the frequency generated by the emitter circuit is 38. 67 kHz square wave. At this generated frequency, the voltage maximum produced is 1. 60V and the peak to peak voltage is 1. 16V. Figure 4. 2 The 38 kHz frequency generated by the emitter circuit
Sunday, November 10, 2019
The Asian Carp Cake (Boong-uh Bbang)
Korea is indeed known for its colorful history and rich culture and tradition. Each and every component of the country plays an important role in the development of Koreaââ¬â¢s culture and tradition even its foods and cuisines. Aside from Kimchi- Koreaââ¬â¢s best known cuisine, Korea is also famous for its fish-shaped pastry which is known as Boong-uh Bbang or Bungeobbang. Boong-uh Bbang literally means goldfish since the pastry resembles the Asian carp fish bungeobbang where the pastry gets its unique shape. Boong-uh Bbang was believed to be introduced by the Japanese during their occupation on Korea in 1930ââ¬â¢s.The Japanese originally called the fish-shaped pastry as taiyaki and right after the Japanese colonization the Koreans used the name Boong-uh Bbang to refer to the fish-shaped pastry. From then on, the fish-shaped bean filled pastry had become a favorite street food in the country of Korea (Nation Master). Boong-uh Bbang does not contain actual fish or any fish pr oducts; in fact it is filled with sweet azuki bean paste known as pat. The batter is poured into both side of the fish-shaped mold. The read bean paste which is made from azuki bean is then put on one side of the mold and the mold is then closed.The batter is toasted until it is golden brown. The pastry is toasted in an appliance which has a carp fish shape. This equipment performs like a waffle iron which gives the pastry its unique fish shape. The exterior of the pastry when toasted has soft and light cakey appearance with a nice texture while the thin edges of the pastry are very crispy. Like most Asian desserts, the flavor of Bungeobbang is barely sweet. Boong-uh Bbang is usually sold in the street of Korea during winter (Nation Master). Koreans have developed an ice cream version of bungeobbang which is filled with vanilla ice cream and sweet red beans known as Sshaman-ko.There are also other varieties of Bungeobbang such as Gukhwappang and Gyeranppang. The former is also fille d with sweet red beans; however its shape is not like a goldfish but rather like a sunflower. Meanwhile, gyeranppang is filled chicken egg and has a rounded rectangular shape (Reference. com). Knowing the story behind a particular cuisine of a country is very significant as it plays a significant role in the development of the countryââ¬â¢s culture and tradition. The recipe in particular of the cuisine tells the ingredients of the dish and how the dish is done.The manner of how the food is prepared and the ingredients used in preparing the dish may give us an idea on what tradition and culture does the country has. Moreover, each single ingredient of the dish and the dish as a whole may even tell the history of a particular country. The era on when it is first introduced or developed can tell in particular the important events in the history of the country. It is indeed important that before eating a particular food, one should have at least an idea on what he or she is eating an d how the food is done or processed for safety reasons.One might have an allergy on one of the ingredients of the food and he or she might avoid the attack of the allergy if he has some knowledge on the contents of the food he is eating. Furthermore, one might be mistaken on eating a particular food that is against their norm, beliefs and religion such as those who are not eating pork meat or any other animal meat. As for the vegetarians, they may avoid eating foods that contain even little animal meat if they have knowledge on the ingredients and contents of the food they are eating. References Reference. com. (2008). Bungeoppang.Retrieved July 28, 2008 from Reference. com database. NationMaster. com. (2005). Bungeoppang. Retrieved July 28, 2008 from NationMaster. com database. Bungeoppang is the name of a Korean fish-shaped pastry. Bungeoppang consists of sweet azuki bean filling known as pat, which is encased in batter and then toasted in a special appliance that performs like a waffle iron. This appliance is specially molded to create the fish shape of bungeoppang. It is then toasted golden-brown and served. Bungeoppang is usually sold as a snack by open-air food vendors throughout Korea during the winter season.Crispy thin edges meet a soft and light cakey exterior with an inner pouch holding the maroon azuki bean filling. Surprisingly, itââ¬â¢s barely sweet like most asian desserts but has a nice texture with the nearly whole beans. Hardly unusual for someone who has grown up supping red bean soup or eating sesame paste balls for dessert, itââ¬â¢s pleasant but I canââ¬â¢t imagine craving its flavours. I love the novelty of the bungeoppang but much prefer the hoddeok, a dense and round pancake with a thin layer of sugar and cinnamon through the middle.It's called Boong-uh Bbang (literally means goldfish bread because it looks like a gold fish). There's an ice cream version of it, filled w/ vanilla ice cream and sweet red beans called Ssah-man-ko. Bungeobbang (lit. ââ¬Å"crucian carp cake/breadâ⬠) is the name of a Korean fish-shaped pastry. Bungeoppang consists of sweet azuki bean filling known as pat (? ; see red bean paste), which is encased in batter and then toasted in a special appliance that performs like a waffle iron. This appliance is specially molded to create the unique fish shape of bungeoppang.It is then toasted golden-brown and served. Wikipedia does not have an article with this exact name. â⬠¦ Taiyaki (e? â⬠ºcââ¬Å¾? a ) is a Japanese waffle-like cake traditionally filled with sweet azuki bean paste (although it can be filled with other things such as sweet custard), fried and molded into the shape of a fish; as Tai means sea bream in Japanese. â⬠¦ Hangul also refers to a word processing application widely used in Korea. â⬠¦ A domestic Belgian waffle iron A waffle iron is a cooking appliance used to make waffles. â⬠¦Bungeoppang is usually sold as a snack by open-air food vendors thr oughout Korea during the winter season. It is usually sold in quantities of four or more. Although the pastry is shaped like a fish, it does not contain any fish or fish products. Korea (Korean: (i? à °iââ¬Å¾ or iâ⬠¢? eà µÃ ¬, see below) is a geographic area, civilization, and former state situated on the Korean Peninsula in East Asia. â⬠¦ There are also bungeoppang-shaped waffles filled with ice cream and pat. koreanfood. about. com/od/snacksanddesserts/a/bungeoppang. htm www. nationmaster. com/encyclopedia/Bungeoppang Bungeoppang (lit.ââ¬Å"crucian carp cake/breadâ⬠) is the name of Korean fish-shaped pastry. Bungeoppang consists of sweet azuki bean filling known as pat (? ; see red bean paste), which is encased in batter and then toasted in a special appliance that performs like a waffle iron. This appliance is specially molded to create the fish shape of bungeoppang (see Asian carp for the fish's significance in East Asian culture). It is then toasted golden-br own and served. History Bungeoppang was first introduced into Korea by Japanese during Korea under Japanese rule in the 1930s; although there it is known as taiyaki.How to get Bungeoppang is usually sold as a snack by open-air food vendors throughout Korea during the winter season. The vendors sell them in a similar way to Korean eomuk or Japanese kamaboko. It is usually sold in quantities of four or more. Although the pastry is shaped like a fish, it does not contain any fish or fish products. There are also bungeoppang-shaped waffles filled with ice cream and pat (sweetened and boiled red beans or azuki beans). www. reference. com/browse/Bungeobbang
Friday, November 8, 2019
Hindenburg essays
Hindenburg essays Thesis: The Hindenburg has contributed to the history of aircraft as well as A. attention getter and relate it to Hindenburg A. Count von Zeppelins first rigid airships III. Paul von Hindenburg: The man that the famous airship was named after. A. Hindenburg, king of rigid airships and the last of them. B. aircraft has changed because of it C. investigations have changed because of it. the hindenburgs history and investigation A 747, O.J. Simpson, the Goodyear blimp and the shooting at Columbine High School all have one thing in common. The Hindenburg has contributed to these things in one way or another. The 747 is a modern aircraft that is very popular in commercial airlines. O.J. Simpson is a man that was charged with the murder of two humans; he was proven not guilty in one court and guilty in another. The shooting at Columbine High School was an occurrence, just over a month ago, in which two students destroyed their high school while killing 15 people. Have you found the connection yet? As you read on, the connection will be clear. The Hindenburg has contributed to the history of aircraft as well as The rigid airship took no time to develop into useful source of transportation (Hindenburg video 1). Count Von Zeppelin was the first to create rigid airships (video 1). His idea was to fill many airbags with hydrogen, enclose them in an aerodynamic rigid structure and have onboard engines (video 1). He built the LZ1 and flew it, July 2, 1900, two years before the Wright Brothers first flight (video 1). The Zeppelin company began developing and expanding (video 1). They offered sight seeing tours, but were however, very expensive (video 1). By 1914, the Zeppelins had carried over 10,000 people over 100,000 miles (video 1). All along the success, the Zeppelins were soon used for a military purpose (video 1). In 1928 the Graf Zeppe...
Tuesday, November 5, 2019
Definition and Examples of Eponyms in English
Definition and Examples of Eponyms in English An eponym is a word that is derived from the proper name of a real or mythical person or place. Adjectives: eponymic and eponymous. Over time, the name of a well-known person (such as Machiavelli,à Italian Renaissanceà author of The Prince) may come to stand for an attribute associated with that person (in Machiavellis case, cunning and duplicity). Etymology: from the Greek, named afterà Pronunciation: EP-i-nim Examples and Observations We are well-armed for battle in a Machiavellian world of reputation manipulation, and one of our most important weapons is the delusion that we are noncombatants.(Jonathan Haidt, The Happiness Hypothesis: Finding Modern Truth in Ancient Wisdom. Basic Books, 2006)Jeff: You probably just Brittaââ¬â¢d the test results.Britta: No, I doublewait! Are people using my name to mean ââ¬Ëmake a small mistakeââ¬â¢?Jeff: Yes.(Joel McHale and Gillian Jacobs in Horror Fiction in Seven Spooky Steps. Community, October 27, 2011)[Alton] Brown can fill an entire episode on popcorn, teaching you how to MacGyver a nifty, cheap popper (hint: a stainless-steel bowl and some perforated foil).(Entertainment Weekly, August 14, 2009)The crowd parted reluctantly, and [Lance Armstrong] glided off, Batmanning through the crowd toward the start line.(Daniel Coyle, Lance Armstrongs War. HarperCollins, 2005)Lily: Dont Ted-out about it.Ted: Did you just use my name as a verb?Barney: Oh, yeah, we do that behi nd your back. Ted-out: to overthink. Also, see Ted-up. Ted-up: to overthink with disastrous consequences. For example, Billy Tedded-up when heTed: All right, I get it!(Matchmaker. How I Met Your Mother, 2005) Americans now nibble their way through two billion popsicles a year; their favorite flavor is a Jaggeresque red cherry.(Oliver Thring, Consider Ice Lollies. The Guardian, July 27, 2010)Sandwich: named after John Montagu, the Fourth Earl of Sandwich (1718ââ¬â1792), a British politician.Cardigan: a knitted garment, such as a sweater or jacket, that opens down the front. Named after the Seventh Earl of Cardigan, James Thomas Brudenell (1797ââ¬â1868), a British army officer.Andy Bernard: I really schruted it.Michael Scott: What?Andy Bernard: Schruted it. Its just this thing that people say around your office all the time. Like, when you screw something up in a really irreversible way, you schruted it. I dont know where it comes from though. Do you think it comes from Dwight Schrute?Michael Scott: I dont know. Who knows how words are formed.(Traveling Salesmen, The Office, Jan. 11, 2007)Lets not Rumsfeld Afghanistan.(Senator Lindsey Graham, quoted in Time magazine, Aug. 24, 2009)S axophone: named after Belgian instrument makerà Adolphe Sax. Other eponyms in English include boycott, braille, camellia, chauvinist, dahlia, diesel, dunce, gardenia, gerrymander, guillotine, hooligan, leotard, lynch, magnolia, ohm, pasteurize, poinsettia, praline, quixotic, ritzy, sequoia, shrapnel, silhouette, volt, watt, and zeppelin.ââ¬â¹ Achieving Wordhood As a word,à eponymous is a bit anonymous itself. Its moment in the sun came with the release of REMââ¬â¢s album Eponymous, a subtle dig at musicians who name records after themselves, such as Peter Gabriel, whose first four albums are all entitled, Peter Gabriel. In short, an eponym is anything thatââ¬â¢s ever been named after anybody. . . .But a name only crosses into true wordhood once it is no longer used as a reference. When we speak of hectoring wives and philandering husbands, it is without a picture of valiant Hector or lover-boy Philander popping into our minds, the way a bespectacled Viennese man with a pipe does when we say Freudian slip.(John Bemelmans Marciano, Anonyponymous: The Forgotten People Behind Everyday Words. Bloomsbury, 2009) Eponyms and Allusions An eponym is similar to an allusion, referring to a specific famous person to link his or her attributes with someone else. Using an eponym well can be something of a balancing act; if the person is too obscure, no one will understand your reference, but if its too well known, it may come across as a clichà ©.(Brendan McGuigan, Rhetorical Devices: A Handbook and Activities for Student Writers. Prestwick House, 2007) Skutniks When CNNs Jeff Greenfield assured the crowd, I havent planted a Skutnik here, I stopped him: I had heard of a Sputnik, the Russian word for the first Soviet satellite, but what was a Skutnik?Greenfield directed me to his book Oh, Waiter! One Order of Crow! about the media failure on election night: A Skutnik is a human prop, used by a speaker to make a political point. The name comes from Lenny Skutnik, a young man who heroically saved lives after the Air Florida plane crash in Washington in 1982 and who was introduced by President Reagan during his State of the Union speech.The introduction of heroes became a staple in presidential addresses to joint sessions of Congress. In 1995, the columnist William F. Buckley was one of the first to use the name as an eponym: President Clinton was awash with Skutniks.(William Safire, On Language. The New York Times, July 8, 2001) The Lighter Side of Eponyms First the doctor told me the good news: I was going to have a disease named after me.(Steve Martin)
Sunday, November 3, 2019
Ataraxia Essay Example | Topics and Well Written Essays - 2250 words
Ataraxia - Essay Example It is a difficult state to attain in modern times, as it is almost impossible to be detached from the material world and gain access to philosophical state of mind. Hellenistic philosophy, also called philosophy of Plato recommended that man should be self-sufficient and self-dependent and should rely only on himself for happiness. It is important to find the right balance of mind, deed and outlook so that happiness is not beyond reach to attain ataraxia, imperturbability, which could also be termed as mere 'peace of mind'. "Ataraxia is a spiritual balance, the research of physical and psychical harmony so difficult to achieve by human beings. Ataraxia becomes a state of tension able to open our minds and be receptive towards life experiences" http://www.myspace.com/histrionia Epicurus gave a totally different meaning to ataraxia. This philosopher had given a lot of thought to death, its imminence and relevance in day-to-day life. He thought that without connection and thought of death, every day life takes a queer shape and hence, death is an inescapable truth and the ultimate aim. It is also a total blackout and hence not painful later, and we should avoid physical pain while being alive. And to live without being bothered by physical pain is the pleasure of life. "Since death is a total annihilation that cannot be experienced, in our present lives we need only live a simple life and seek always to avoid physical pain. It is pleasure, understood in this negative sense, that is the highest good for Epicurus. Freedom from mental disturbance. http://www.philosophypages.com/ph/epiu.htm EPICTETUS Epictetus stressed on basic good life of humans. According to him the good life itself is based on ataraxia and if one is conscious of it and controls his own life based on high values as a rational human being should do, he would live in complete happiness. He offered extensive arguments on complete and achievable happiness, based on his amazing understanding of life. "The eudaimonia ('happiness') of those who attain this ideal consists of ataraxia (imperturbability), apatheia (freedom from passion), eupatheiai ('good feelings'), and an awareness of, and capacity to attain, what counts as living as a rational being should. The key to transforming oneself into the Stoic sophos (wise person) is to learn what is 'in one's power', and this is 'the correct use of impressions' (phantasiai), which in outline involves not judging as good or bad anything that appears to one" http://www.iep.utm.edu/e/epictetu.htm He said people have to be motivated and inspired by virtue, act virtuously. According to him, life with right principles is the secret of attaining happiness. Total happiness cannot be achieved without a clear conscience and this cannot come without a guiltless life. Self-satisfaction and the feeling that the individual had taken every decision in life without selfishness, without any personal gain and with total ethical justice is the path that leads to a clear conscience and self-acceptance. He said this is the only way to attain imperturbability. DIOGENES Diogenes argued from an entirely diverse viewpoint. He said marriages should be made null and void and the family should become communal and the responsibility of community and State. He was so advanced for his time that he demanded patriotic citizenship and the citizenship of the world. Diogenes was considered to be
Friday, November 1, 2019
Liquidity Function Essay Example | Topics and Well Written Essays - 1500 words
Liquidity Function - Essay Example Liquidity preference is the desire to hold cash. The money in cash and the rate of interest which is demanded in exchange for it is a "measure of the degree of our disquietude (ICFAI Center for Management Research (ICMR), 2005)." The rate of interest, in Keynes' words, is the "premium which has to be offered to induce people to hold the wealth in some form other than hoarded money." The higher the liquidity preference, the higher will be the rate of interest that will have to be paid to the holders of cash to induce them to part with their liquid assets. The lower the liquidity preference the lower will be the rate of interest that will be paid to the cash-holders. Transaction Motive: This motive is related to the "need of cash for the current transactions of personal and business exchanges." It is further divided into the income and business motives. The income motive is meant "to bridge the interval between the receipt of income and its disbursement", and similarly, the business motive is "the interval between the time of incurring business costs and that of the receipt of the sale proceeds." Precautionary Motive: The precautionary motive relates to the "the desire to provide for contingencies regarding sudden expenditures and for unforeseen opportunities of advantageous purchases." Banks keep cash in reserve to meet unexpected needs. Individuals hold some cash to provide for illness, accident, unemployment and other unforeseen contingencies. Money under the speculative motive is for "securing profit from knowing better than the market what the future will bring forth." Liquidity Vs Profitability Short run trade-off exists between liquidity and profitability. Other things remaining constant, the more liquid a bank the lower its return on equity and return on assets (The Banker, 2004). Both asset and liability liquidity contribute to this relationship. Facts about liquidity of a bank: The more liquid a bank, the less profitable the bank Liquid assets earn less than illiquid assets. The shorter the maturity, the lower the yield. The highest yielding loans are loans with the highest default or interest rate risk and are therefore the least liquid. Asset liquidity is influenced by the composition and maturity of funds i.e. the ease with which a bank can convert assets to cash with a minimum loss (Comptroller of the Currency Administrator of National Banks, 2001). Large holdings of cash assets evidently decrease profits because of the opportunity loss of interest income. In terms of investment portfolio, short-term securities yield lower returns compared to long-term securities. As investors value price stability and therefore long-term securities pay a yield premium over short term securities, to induce the investors to extend their holding period. For banks that purchase short-term securities, this increases the liquidity but at higher potential returns. For example, in an environment where market expectations are constant for short-term treasury yields, the treasury yield curve will slope upwards, reflecting liquidity premiums that increase with maturity. A bank's loan portfolio displays the same trade-off where the loans carrying the higher yields are the least
Subscribe to:
Comments (Atom)