Featured Post

Sample Final Project Chapter 1 Free Essays

Section I INTRODUCTION A. The Background of Selecting The Title In business world, to accomplish an objective it is truly need to have a dec...

Thursday, October 31, 2019

Research Topic Identification Essay Example | Topics and Well Written Essays - 250 words

Research Topic Identification - Essay Example For example, when I studied the article written by Dufwenderg (2011) on game theory to explain the human psychology, I found the cognitive understanding of the psychology as an essential part of the psychology to have grip to answer most of the question of human psychology. We consider Chess games as the toughest games and there is a requirement of minds that can decide rationally but Ewerhart (2000) argues that Chess-like games are solvable in at most two steps. This is the power of cognitive powers that a human mind can use to solve the complex problems. Another important aspect of cognitive psychology is that it starts observing the human psychology right from beginning. This is the basic way to explore and drive new dimensions in the field of Psychology. This is illustrated by Eacott and Crawley (1999) by analyzing on the childhood amnesia. Childhood amnesia refers to the inability of children and adults to recall events that took place during their infancy and early childhood (H ayne & Jack, 2011). This is very augmenting for me to choose the cognitive psychology in order to learn on ways that can reflect the human psychology. Dufwenberg, M. (2001). Game theory. Interdisciplinary Reviews: Cognitive Sciences. Vol. 2 (2). p. 167. Ewerhart, C.

Tuesday, October 29, 2019

Assess the case against Moral Elitism Essay Example for Free

Assess the case against Moral Elitism Essay Moral Elitist believe in a metaphysical claim: there are moral facts and an epistemic claim: we have access to them. According to moral relativism, there are no moral principles or values objectively real and applicable to everyone; rather, what’s right/wrong and good/bad essentially depends on individual preference or culture, and this varies from person to person or group to group. There is not just one moral fact but instead there are millions and we access them be research. There are two different forms of moral elitism one is cultural relativism which based on societies and the other is in the individualistic form, moral subjectivism. Moral relativism seems tolerant (â€Å"you do your thing and I’ll do mine†), but is it reasonable to believe? We should think not. First, let’s look at it in its group or cultural form, cultural relativism. According to cultural relativism, ethics essentially depend on one’s culture or tribe. That is, CR says action X is right or good if the society says X is right or good, and X is wrong or bad if the society says X is wrong or bad. Action X may be right in one culture but wrong in another. Our culture may hold that apartheid is wrong, but another culture may be okay with apartheid, because of a difference in the history of interracial relations. On cultural relativism, then, morality is wholly a matter of cultural invention, i.e. social construction and because such circumstances vary from group to group, so do the constructed moralities. Thus, we shouldn’t impose our culture’s moral values on others, and others shouldn’t push theirs on us. There are no better or worse societies, they are just merely different and so one society cannot judge another. Instead we should be non judgemental and celebrate diversity. Cultural relativism sounds good, but is it sound? Let’s assume that cultural relativism is true, this would be very problematic. The biggest problem for this argument is put forward by G.E Moore’s Open Question. He suggests that the relativists have mis-defined morality, it makes to sense to ask whether society approve of something or it, but does this make it automatically good? This ends up giving support to obviously evil regimes and evil cultural practices. For example it becomes impossible to criticize the Nazis. If Nazi culture says that genocide is right, then, for Nazi Germany, genocide is right. It was just their culture, after all. But we know that we can and should condemn such regimes and practices. There is also the criticism put forward by Objectivists who believe in moral development, where sometimes we have to go against the popular view, we need to be able to compare different societies. For example surely the German society now is much better than how it was like with all the racism involved when Hitler was in power. Objectivists believe that societies are a hierarchy where some are in fact better than others whereas cultural relativism believes in breadth where all societies are equal, but surely their tolerance goes too far? If cultural relativism is true, then internal cultural reform is disabled. What the culture says is right is right, so its not possible for ones culture to be mistaken let alone reformed. Yes, one can critique acts according to cultural standards, but its not possible to criticize ones own cultural standards. However they do arise for example Jesus, Gandhi and Martin Luther King, they were all trying to apply another standard for example Martin Luther King was trying to apply the standard of equality. The existence of cultural reformers is a fact, and this fact counts against cultural relativism. Cultural relativism also self-refutes. If CR is true, it allows for the possibility of a society having a non-relative or absolute morality. That is, on cultural relativism a society could hold that cultural relativism is false, and they would say that this morality is true. So, if cultural relativism, then it is also not true. This is a serious logical problem. There is also the problem of which culture? The one youre born into or the one you presently occupy? When asking someone what cultural groups they belong in they will struggle as they have loads, for example being a student, a Muslim etc. Now let’s look at moral subjectivism. According to moral subjectivism ethics are merely a matter of individual preference. That is, to say action X is right or good if I like X, and X is wrong or bad if I don’t like X. Depending on our feelings, action X may be right for you but wrong for me. You may not like abortion, but I may be okay with abortion, if my feelings are not as troubled by it as yours are. Morality, then, is basically a matter of taste, and tastes vary. People should choose our own morals and have freedom, not simply just accept our parents, society or religion. They are relative to the individual and so are presented through our personal feelings. Feelings are the main index and guide to show what morals we should follow. However this could result in problems as intra-personal criticism is lost. If moral subjectivism is true, whatever we feel is right is right. In other words, we can never be wrong morally and we cannot criticize ourselves (all we can be is true to our feelings). This does not destroy subjectivism but it serves as a red flag against IR, because our pre-theoretic experience of morality is that we sometimes make moral mistakes, in spite of our feelings. We also cannot criticize others. We can’t truly morally condemn the behaviour of, say, Jack the Ripper clearly liked killing women; the feelings of a person justified their actions. In other words, according to subjectivism: Who are we to judge them? There is also the problem of how are our feeling a reliable guide to right and wrong? Sometimes we can misjudge and feelings can cloud our judgement, for example someone with a bad temper might kill someone by accident due to their anger issues. Also reason can sometimes change our feelings, for example if I am on a diet but I feel like I really want a chocolate ice cream, reasoning about this would convince me not to follow my feelings and opt to eat something healthy instead. In conclusion we have seen the two types of moral elitism. Both are quite sophisticated and a lot more open minded. Surely our feelings mater sometimes when it comes to moral decisions. There cannot be just set moral facts as how would everyone even agree about what they are. When trying to decide what is right and wrong, everyone seems to disagree so surely our feelings and following our own society would lead to our moral decisions. However many problems arise logically from moral elitism as sometimes we cannot choose our own morals instead we are a passive recipient where morals impose themselves on us. Following our society or feelings do not necessarily lead us to what is right or wrong and so it’s reasonable to conclude that individual moral relativism is flawed—logically, factually, and morally as following it will lead to wrong situations where wrong things will be condoned. Therefore moral elitism should be rejected.

Sunday, October 27, 2019

Cracking Ciphers Through Mathematics

Cracking Ciphers Through Mathematics Math Exploration:  Cracking different Ciphers Rationale From the ancient times to the modern day cryptography has played an important role in our lives. This mathematics exploration is going to look at different ciphers ranging from Monoalphabetic to machine driven cipher. The main use of ciphers is to protect sensitive information when it is being send on paper or digitally. In the 100 BC the Caesar cipher was used by Julius Caesar to send messages to his general which included strategies for war. Now a days these ciphers can be cracked instantly using a computer which makes these ciphers very unsecure. In this exploration I will look at the Caesar Cipher, Vigenà ¨re cipher, Hill Cipher and the Enigma Code machine. The Enigma code machine was one of the most fascinating machines I have encountered in my life. It was a complicated machine and could have been unbreakable if the Germans hadn’t had the flaw. After the war ended â€Å"It was thanks to Ultra (project associated with the cracking of the Enigma) that we won the war.â₠¬  Winston Churchill to King George VI. All the ciphers being explored in this exploration have been cracked using mathematics. Monoalphabetic Substitution Cipher: Caesar Shift Cipher: The Caesar Shift Cipher was used by Julius Caesar and thus is named after him. This cipher was used to encrypt military messages. The Caesar cipher is a type of substitution cipher. The Caesar cipher was decrypted 800 years after its creation by an Arab mathematician Al-Kindi using the process of frequency analysis. The Caesar Shift Cipher used the English letters and shifted each letter by 3 places to encrypt it. For Example: In this example let the alphabet be x and the cipher text will be x+3. Plain Text Number 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Plain text a b c d e f g h i j k l m n o p q r s t u v w z y z Cipher Text D E F G H I J K L M N O P Q R S T U V W Z Y Z A B C The plain text is â€Å"attack the castle at dawn†. This is currently plain text and if Caesar send it to his military his enemies could easily find out. But when it is encrypted applying the formula e(x) = (x + k) (mod 26) Using the formula above where x is the plain text number and k is the number by which the cipher is shifted and modulo 26 is the total number of alphabets in the English language. This leads us to the encrypted message from Caesar would be â€Å"dwwdfn wkh fdvwoh dw gdzq† this message could be only decrypted only by the people who knew the shift value. There are only 25 possibilities in this cipher which makes it relatively easier to crack than other ciphers. In the modern age this type of cipher can be decoded in seconds making the message being transmitted very unsecure. Breaking the Caesar Cipher This Cipher was cracked using a method called frequency analysis which bases on the some letters occurring more than other. This process was discovered by Al-Kindi in the 9th century. As we can see from the frequency analysis of the English language there is a lot of repetition of the word e. Thus making it easier to crack the Caesar Cipher or any other similar kind of substitution ciphers. To crack this cipher when we are looking at the encrypted test find the letters that are occurring the most which will tell us the shift needed for the cipher text. For example: â€Å"nmfajfxjhwjyrjxxfljktwymjljsjwfq† Using the text without spaces makes it harder for the person trying to decode without the key. Now as we can see from the encrypted message above if we use the frequency analysis method we find that j repeats 8 times and if we assume that j is represented as e then it has a shift of 5 alphabets in this cipher. e(x) = (x k) (mod 26) Now we use the above equation in which we now subtract the shift and multiply with modulo 26. After decrypting the final message we have is â€Å"ihaveasecretmessagefromthegeneral†. Polyalphabetic Substitution Cipher: Vigenà ¨re Cipher: The Vigenà ¨re Cipher method was originally described by Giovan Battista Bellaso in his 1553 book La cifra del. Sig. Giovan Battista Bellaso. This method was later misattributed to Blaise de Vigenà ¨re in the 19th century thus giving the cipher the name â€Å"Vigenà ¨re cipher†. Vigenà ¨re cipher is method that uses a series of different Caesar ciphers based on a lettered keyword. This cipher is a form of polyalphabetic substitution. In this cipher we make a key before encrypting the message so that it is a bit more secure. In this method the key shifts the alphabets according to its position. In this encryption the key needs to be known for the person decrypting it because there are about 26n possibilities where n is the number of letters in the string. For example let the code be: â€Å"mybirthdayisinjanuary† and let’s take the key to be â€Å"math† Plain Text m y b i r t h d a y i s i n j a n u a r y Key m a t h m a t h m a t h m a t h m a t h m Encrypted Text y y u p d t a k m y b z u n c h z u t y k Thus the encrypted text cannot be broken easily and if someone tried without a key there are 265 ≈ 1.2 X 107 possibilities unlike the Caesar cipher with just 25 possibilities. Decrypting the Vigenà ¨re cipher: The first crack for the Vigenà ¨re cipher was discovered in 1854 by British Cryptographer Charles Babbage. This Vigenà ¨re cipher can now be easily cracked in the modern day cryptography using the Kasiski analysis method to crack this cipher. To crack a Vigenà ¨re cipher the most difficult part is to find the length of the key. The method used to find the key uses repeating patterns and finds the distance between the patterns. This can be done using the Crypto-Corner tool which will find the periods of the repeating patterns. Then using the frequency analysis we can decrypt the message. For example let the encrypted code be â€Å"GZEFWCEWTPGDRASPGNGSIAWDVFTUASZWSFSGRQOHEUFLAQVTUWFVJSGHRVEEAMMOWRGGTUWSRUOAVSDMAEWNHEBRJTBURNUKGZIFOHRFYBMHNNEQGNRLHNLCYACXTEYGWNFDRFTRJTUWNHEBRJ† Now to decrypt it just put the code in the crypto-corner tool and it gives us a repeating period of 3. Which leaves us with 3 separate Caesar shifts to decrypt this message using the frequency analysis. The image above shows the encrypted message and the decrypted message. It also shows us the key used to encrypt this message. This was done using frequency analysis for three Caesar shift ciphers. After the cipher is decrypted the key is discovered to be â€Å"NSA†. It is a relatively easy cipher to crack but can be time consuming using a computer brute force attack. The main uses of Vigenà ¨re cipher was in the military to send secrets to allies so the enemy could not decrypt it easily. As this cipher took me around 4 minutes to crack using the tool. Diagraph Substitution Cipher: Hill Cipher: The Hill cipher is a polygraphic substitution cipher which is based on linear algebra. It was invented by Lester Hill in 1929 it was the first polygraphic cipher in which it was possible to operate on more than three symbols at once. Plain Text Number 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Plain text a b c d e f g h i j k l m n o p q r s t u v w x y z The main idea behind hill cipher is to convert the plain text into numbers and separate into blocks and then covert them into column matrix. Then it is multiplied by a key of the form .The result of this is multiplied by modulo 26 which keeps the numbers in a cycle of 0 to 25. The matrix in the form obtained by this method is then covered back to a non-column form and then to plain text. For example let’s take the word â€Å"TROJANHORSES† which converts to 19, 17, 14, 9, 0, 13, 7, 14, 17, 18, 4 and 18. Now let the key that is known by the person who is encrypting and decrypting be . Thus now we divide the plain text numbers into two column matrix and multiply by our key. Thus this encryption gives us a cipher text â€Å"ETRVNNLGBUOU† from the original text â€Å"TORJANHORSE† the Hill cipher overcomes the problems related to frequency analysis associated with the Caesar shift cipher. Decryption of Hill Cipher: For the decryption process of the Hill cipher the inverse of the key is done. To make it into the form thus making the encryption matrix key used in the example into the form. Now we calculate the determinant of the encryption key is = (5*3) (3 * 2) = 9 A-1 = 9-1 mod 26 To get rid of the mod 26 we take modulo inverse of the determinant and thus it gives us. This can sometimes be a problem because if the determinant of a matrix is not a co-prime number to the 26. Then it is not invertible and thus we cannot decipher the text. A-1 = 9-1 Thus 9-1 mod 26 is 3 as per the modulus tables of multiplicative inverse modulo and modulo of A-1 = 3 A-1 = = mod 26 The decryption key now is now we multiply the cipher text â€Å"ETRVNN† which will give us â€Å"TROJAN† Thus the deciphered text is ‘TROJAN† which makes this cipher weak if a person is aware of the keys as it might not take a lot of time to do this by hand. Also nowadays the computer can easily crack this cipher given the key is present with the person cracking it. Cracking this cipher can be easily done these days using a brute force attack on the cipher and it took me around 40 seconds to break the code. Which indicates it is relatively insecure to use hill cipher to code the text today to send secret messages as it can be intercepted and easily decrypted. Machine Driven Cipher: Enigma Code Cipher: The Enigma code cipher was invented by the German engineer Arthur Scherbius at the end of World War I. It was used to send encrypted messages to German U-Boats and communicate between German military. During the World War II it was adopted by the Nazi Germany to send and receive encrypted messages from German army or the Air Force. The Enigma machine uses a keyboard on which the operator types the message he wants to encrypt. Then the message goes to the 3 rotors these rotors combine of 3 different types of rotors a fast rotor which turns when a letter is types. Then a medium rotor which turns when the fast rotor completes a revelation and the slow rotor which rotates when the medium rotor completes a revolution. After the plain text has gone through the three rotors it reverses and goes again through the slow, medium and fast rotor to the plug board. The German army had a choice of choosing 3 rotors from a set of 5 rotors and the rotors could be set in any orientation. The number of ways the rotors can be positioned from a set of 5 are = 60 possibilities. The different starting positions of the rotors as they were changed every day giving 263 = 17576 possibilities of different codes. The 1-26 numbers on the three rotors represent the alphabets from a-z. After the letter is plain text in pressed on the enigma it goes through plug board to the 3 rotors and gets ciphered. Then the cipher text goes back to the plug board usually the plug board would have been connected to the 10 wires which connected 20 alphabets together. Thus if the ciphered text is connected to a wire it would light up the alphabet it might be connected to. For example if the letter h was pressed it would go to the plug board then through the circuit it goes through the 3 rotors which cipher the plain text 3 times. After that it returns back to the plug board as letter M which is connected to the letter A and thus the bulb connected to letter A lights up. The number of possibilities on the plug board are The possibilities that are displayed above are the total theoretical possibilities for changing the plug board setting in different orientation giving ways. The total number of possible ways the settings of the enigma could be changed into are: (Possibilities the settings could be changed into. Thus making it really difficult to solve by pen and paper. The use of computer is really essential to break a code which has been encrypted using enigma. Decrypting Enigma code cipher: To decrypt the enigma code the German army distributed a sheet which contained the settings for each day of the month. So the side receiving the code can set the settings and then type the code using the keyboard which reverses the process and after typing the plain text blinks on the light panel. The enigma code was cracked by the allies during the World War II by the Alan Turing and his team consisting of mathematicians. The flaws that helped decrypting the enigma code cipher was that if a letter was typed it wouldn’t place the same letter in the cipher text. For example if a person typed B in code the cipher would be something like X but never B. To break the code Alan Turing built a bomb machine which checked all the Possibilities of settings and took only 20 minutes to break the code. For example let the plain text message be â€Å"THISISAVERYSECRETMESSAGE† as I don’t have access to an enigma machine using an online simulator. The cipher text using the rotor order as VI-I-II, the rotor start as EGW (5, 7, 23), the ring setting as JEN and the plug board setting as QF XV SM YH JL KC GP IO UN ZD. Now when we encode this message we use the encoding setting as EHU and the cipher text is â€Å"UVATHXTYABCBRSDXJPHFEXLN†. To decrypt this message either a brute force attack which took around 7 minutes or if the settings are provided use a decryption tool online to decrypt the cipher text to plain text. Bibliography Ekert, A. (n.d.). Cracking codes. Plus.maths.org. Retrieved October 29, 2014, from http://plus.maths.org/content/cracking-codes Caesar cipher. (n.d.). Princeton University. Retrieved October 29, 2014, from https://www.princeton.edu/~achaney/tmve/wiki100k/docs/Caesar_cipher.html Casselman, B. (n.d.). Feature Column from the AMS. American Mathematical Society. Retrieved October 29, 2014, from http://www.ams.org/samplings/feature-column/fcarc-enigma Clark, D. R. (n.d.). Vigenà ¨re Cipher. Crypto Corner. Retrieved October 29, 2014, from http://crypto.interactive-maths.com/vigenegravere-cipher.html#intro Clark, D. R. (n.d.). Hill Cipher. Crypto Corner. Retrieved October 29, 2014, from http://crypto.interactive-maths.com/hill-cipher.html#2x2encypt Count On :: Codebreaking :: The Vigenà ¨re Cipher. (n.d.). Count On :: Codebreaking :: The Vigenà ¨re Cipher. Retrieved October 29, 2014, from http://www.counton.org/explorer/codebreaking/vigenere-cipher.php Crypto. (n.d.). Practical graphy. Retrieved October 29, 2014, from http://practicalcryptography.com/ciphers/hill-cipher/ Crypto. (n.d.). Practical graphy. Retrieved October 29, 2014, from http://practicalcryptography.com/ciphers/vigenere-gronsfeld-and-autokey-cipher/ Crypto Analysis to Crack Vigenà ¨re Ciphers. (n.d.). IB Maths Resources. Retrieved October 29, 2014, from http://ibmathsresources.com/2014/05/31/crypto-analysis-to-crack-vigenere-ciphers/ Cunningham, Z., Mabey, M. (n.d.). Security Ninja. Security Ninja. Retrieved October 29, 2014, from http://csilm.usu.edu/~securityninja/index.psp Ellis, C. (n.d.). Exploring the Enigma. Plus.maths.org. Retrieved October 29, 2014, from http://plus.maths.org/content/exploring-enigma Enigma machine. (2014, October 27). Wikipedia. Retrieved October 29, 2014, from https://en.wikipedia.org/wiki/Enigma_machine Lyons, J. (n.d.). Crypto. Practical graphy. Retrieved October 29, 2014, from http://practicalcryptography.com/cryptanalysis/ Simpson, R. (n.d.). Cipher Machines. Cipher Machines. Retrieved October 29, 2014, from http://ciphermachines.com/enigma Singh, S. (n.d.). The Black Chamber. Caesar Cipher. Retrieved October 29, 2014, from http://www.simonsingh.net/The_Black_Chamber/caesar.html Singh, S. (n.d.). The Black Chamber. Vigenere Cipher. Retrieved October 21, 2014, from http://www.simonsingh.net/The_Black_Chamber/vigenere_cipher.html Sutherland, S. (n.d.). 3 The Caesar Cipher and Modular Arithmetic. 3 The Caesar Cipher and Modular Arithmetic. Retrieved October 29, 2014, from http://www.math.sunysb.edu/~scott/papers/MSTP/crypto/3Caesar_Cipher.html Vestergaard, E. (n.d.). The German cipher machine Enigma. Enigma. Retrieved October 29, 2014, from http://www.matematiksider.dk/enigma_eng.html Vigenà ¨re cipher. (n.d.). Vigenà ¨re cipher. Retrieved October 22, 2014, from https://www.princeton.edu/~achaney/tmve/wiki100k/docs/Vigen%C3%A8re_cipher.html

Friday, October 25, 2019

Rock and Roll Essay -- Music, Elvis Presley

What comes to mind when you think about Rock and Roll? Is it the pulsating rhythms, and upbeat tempo that seemingly sooth the mind? What many don’t realize is this phenomenon was started by a single man that combined various elements he loved. This man, Elvis Presley, not only created Rock and Roll but a new era of attitude and personality which people perceived as they watched him perform. Elvis Aaron Presley, one of the most popular American singers of the 20th century, started a new clothing style for his generation, influenced a new era of dance, and most notably introduced Rock and Roll to the world. Elvis Presley was born in Tupelo, Mississippi into a loving but poor family (Tracy 1). From the young age of 7, Elvis showed a passion for music. He was introduced to music in the family’s Assembly of God church where the southern gospel music became an important influence on his success. When Elvis’ mother Gladys acquired enough money, she bought him his first guitar, he then taught himself to play and in October 1945, he had his first taste of success in music by placing in the town fair talent contest (â€Å"Famous Quotes†. After graduating high school in 1953, he worked various jobs while still pursuing his musical career. Later in 1953, he walked into Sun Studios where he paid four dollars to record his first record. Upon hearing Elvis’ recording, Sam Philips decided to take him under his wing and then became his record label owner (â€Å"Elvis Presley†). In 1954, he produced his first single â€Å"That’s all Right.† From then unt il his death he became the biggest phenomenon ever in the world of entertainment (Morrison 1). From the start of Elvis’ career, he was in the center of the spotlight but before his career even started his appe... ...ers of his time. Elvis is known as the leading artist in R & B, gospel, and American country (â€Å"Elvis Presley†). He has sold over a billion records, more than any other artist known to man. He was one of the first performers ever inducted into the Rock and Roll Hall of Fame in 1986 (Brewster 1). Elvis loved performing live concerts â€Å"A live concert to me is exciting because of all the electricity that is generated in the crowd and onstage,† it’s his favorite part of his business (â€Å"Famous Quotes† 1). Even today he still remains a legendary music icon for popularizing and creating the start of Rock and Roll (Brewster 1). It is impossible to think of a Rock and Roll star who doesn’t owe a debt to Elvis Presley (Ebsco). Today he is still known as the starter of Rock and Roll, and is the most successful recording artist in terms of hit songs and hit albums still today.

Thursday, October 24, 2019

An Analysis of “Peach” by D. H. Lawrence Essay

What will you think of, when you eat a fruit, like a peach? I think many people’s answer would be nothing at all. However, a peach triggers some poetic romance in D.H. Lawrence, and some beautiful verses are thus created. The poem _Peach_ was brainless at first glance–this is indeed not an impenetrable poem, but it renders a significant thought that the creations of nature, even the most unconscious ones, has the beauty that no artificial objects can ever achieve. The poem itself in free verse is modernist, defying conventional structured form and the language is more prose than scanned lines – the whole poem is a kick at traditional attitudes and the Victorians were not traditionalists but reactionaries regarding their attitudes to sex, so this is a complex revolutionary poem and extemely modern for its time. The poem is intensely modernist. Not only does D H Lawrence take an everyday activity (eating a peach) and unpack unsuspected and surprising meaning from it. Lawrence suggests that the simple pleasure of eating a peach may be connected with the way that the peach hasn’t been manufactured. Nature’s beauty is embodied in its imperfection because there are no straight lines or perfect shape in nature. It exists randomly and obliquely. After we stepped onto this world mankind has been finding all ways to be ‘perfect’, as defined by them. This is nature’s definition of perfection, or perhaps working towards a common goal of being perfect. Why do we have to turn that 180 degrees and make straight lines all over the world? We grasp our pencils and place the rulers on that sheet of paper and zoom the line goes straight and â€Å"perfect†. We connect the dots with straight lines and we draw geometric figures in mathematic and so on. But maybe we need to adjust our angle of  see the world. Actually nature has very little to do with math. Most things in the world cannot and should not be simply viewed scientifically. Things were, are and will never be judge to be right or wrong. We live in a wonderful world but we are probably making a hash of it. Nature has given us beauty in everything we see and for no good reason – nature or unknown forces could have made the world ugly but it has not and almost illogically has given us wonderfully coloured flowers, incredible animals and sunsets to die for. Lawrence saw man as kind of a mad animal like many painters saw the industrial revolution as a disaster. Next time we encounter a fruit, we should not only eat it for nutrients, but also soak in its incomparable beauty endowed by nature.

Wednesday, October 23, 2019

Fire and Its Social and Economical Problem

Fire has been called the foundation of human civilization. Fire provides warmth and heat, protecting us from the ravages of the elements . Fire gives us light to see in the dark and to signal other people who may be looking for us. Its light also tends to keep predatory animals away. Fire enables cooking, which improves the taste of many foods and helps eliminate harmful bacteria. In extreme situations, fire can be used as a weapon, brandished against wild animals or others who intend us harm. Fire plays an important role in various aspects of the Hindu Tradition. It is both the creator and destroyed of life. Uncontrolled and misuse of fire can cause tremendous adverse impacts on the environment and the human society. Forest fire is a major cause of degradation of India’s forests. Some common causes of fire in the houses are kitchen stoves, electric blankets, faulty wiring, clothes dryers, lighting, LPG, candles, crackers, flammable liquids etc. The potential for fire is present in any workplace. But, if you’re aware of the causes and conditions, if you’re prepared, and if you think before you act, the risk of a workplace fire and its damaging effects – on you, your co-workers or your company – can be minimized. Fire extinguishers are a critical component of saving property and lives in the case of a fire emergency. Ensure that fire protection equipment (i. e. , sprinklers, smoke/heat detectors, alarms, fire hoses, fire extinguishers, and fire blankets) are maintained, available for use, and not impaired or concealed. Make sure fire extinguishers correspond to the potential risk. Know where they’re located and how to use them. Good housekeeping practices and fire fighting training are the crucial to fire prevention. Ultimately it is the extra economic burden on the society.