Thursday, October 31, 2019
The Mesopotamians Essay Example | Topics and Well Written Essays - 250 words
The Mesopotamians - Essay Example The Mesopotamians had a pessimistic view of life because of the uncertainty in their lives. They were uncertain because of how land their land was open and the rivers were difficult to control. This pessimistic view of life was reflected even in some of their art. They revealed their pessimism through hiding statues and other arts about the things they were pessimistic about in their culture.They had a pessimistic view even of their gods. They viewed them as caprious and had to constantly struggle with their whims. This affected their art and especially when designing their temples. The designing and art work of the temples were in such a way that the statues of their gods were hidden or interrupted. This way, they became distant and difficult to be seen. Other than the pessimism revealed in the art of the Mesopotamians, other features that the cultureââ¬â¢s art reveal depend on the type of art being made. The art indicating nudity revealed that frailty and destitution of those in dividuals killed or enslaved in war. Vases on the other hand revealed that the Mesopotamians were people who presented offerings to their goddess during important ceremonies like marriages. The art also revealed that they valued and respected their rulers and leaders and this was depicted in arts of their leaders once they died.
Tuesday, October 29, 2019
Post-Soviet Russia Essay Example | Topics and Well Written Essays - 3000 words
Post-Soviet Russia - Essay Example The primordial president of the Russian Federation was Boris Yeltsin, a former member of the old Soviet Politburo who declared the moribund of the old Soviet-style regime. The reforms that he advocated pointed the country in the direction of democracy and a free-market economy. A small vested group and advisers took control from the debilitated president, and they ran the country as an oligarchy, granting themselves favors and inviting economic and political corruption. However, in spite of this development, a new constitution was put into place in 1993. The regular competitive elections have taken place since then. A new President, Vladimir Putin, was elected in 2000. Many observers believe that the influence of the oligarchy has declined since then. Modern Russia is a very changeable country. Russia has almost no empirical experience with democracy and a free market. In terms of administrative hierarchy, the Russian Federation is a constitutional democracy with three branches, executive, legislative, and judicial. In terms of procedure, however, the Russian Federation has a presidential form of government, which concentrates most authority in the president as the head of state. The head of state is Boris Nikolayevich Yeltsin was elected on June 16, 1996 for a four-year term. There is no vice-president. In the event of the incapability of the president to perform the constitutional mandate, the head of the government, the Premier, succeeds the president. The Premier and Chairman of the Russian Federation Government, Viktor Stepanovich Chernomyrdin was appointed in December 1992 by the president. A First Deputy Premier and First Deputy Chairman of the Government assist the Premier. Russian politics is pluralistic. There are myriad numbers of political parties in Russia. The democratic and market reform oriented parties include: "Our Home Is Russia", the Yabloko Bloc, Russia's Democratic Choice Party, and Forward Russia. Traditional parties include: Congress of Russian Communities and "Women of Russia". Revisionist parties include: Communist Party of the Russian Federation, Liberal Democratic Party of Russia, the Agrarian Party, Power To the People and the Russian Communist Workers' Party. During the past five years the Russian government has taken substantial measures in converting to a market economy. The government performed a market reform program in January 1992. In the following three years, the government freed nearly all prices, cut defense spending, eliminated the old centralised distribution system, adopted a convertible currency and completed an ambitious voucher privatisation program in 1994. The government established private financial institutions, and decentralizing foreign trade. Within 1997, the transition to a market economy was nearly complete despite having many problems of irregular regulatory policy. In some areas, there were inadequate regulatory activity leading to monopoly practices and corruption. In other areas, there is excessive state interference in the economy leading to inefficiencies and corruption. It would be disappointment if the post-communist Russia, where the political stakes and human costs are incomparably
Sunday, October 27, 2019
Performance Analysis for AD-HEED and N-HEED
Performance Analysis for AD-HEED and N-HEED 4.1 Results and Discussion In this section, we exhibit and discuss the results of the simulation. This section shows the performance analysis for AD-HEED and N-HEED compared to the original HEED protocol. Every result presented is the average of five experiments. The following sections give a detailed description of the experiments and the results. 4.4.1 Network Lifetime The number of alive nodes for each round is observed for AD-HEED and N-HEED compared to HEED protocol to evaluate the lifetime of the network. In the proposed methods and according to the distance between the CH and its anchor, we proposed AD-HEED30, AD-HEED87, N-HEED30 and N-HEED87. 30 and 87 are the distance between the CH and its anchor (dch_to_Anc) where 30 is the cluster radius and 87 is the threshold distance which depends on the environment. According to simulation results, AD-HEED87 and N-HEED87 have the same results for all experiments so N-HEED87 results will not be appeared in any figure. In all of the experiments, the sensor nodes were deployed uniformly. Figure ââ¬Å½4ââ¬â1 shows the performance of HEED protocol compared to AD-HEED and N-HEED. It is observed that AD-HEED87 outperforms HEED and the other proposed methods. AD-HEED87 increases the network lifetime until all nodes consume their whole energy by more than 150 rounds compared with HEED protocol. N-HEED30 also increases the network lifetime by more than 50 rounds until the whole nodes die. Figure ââ¬Å½4ââ¬â1: Number of alive nodes per rounds Figure ââ¬Å½4ââ¬â2 presents how AD-HEED and N-HEED behave with HEED protocol in term of node death percentage. The figure below shows the number of rounds for 10%, 25%, 50%, 75% and 90% of nodes that consume their whole energy. The results show that AD-HEED and N-HEED outperform HEED throughout the network. There is a slight advantage to HEED on AD-HEED30 in 90% of nodes death .The figure shows that for 10% of nodes death, the best choice is AD-HEED30 and N-HEED30 while the best choice for 75% and 90% of nodes death is AD-HEED87. For 25% and 50% of nodes death the best choice occurs with all proposed methods because they are approximately the same. According to both of figures, the results show that our proposed methods outperform HEED. Figure ââ¬Å½4ââ¬â2: Node death percentage per rounds 4.4.2 Energy Consumption Analysis The performance of AD-HEED and N-HEED is compared with that of HEED protocol in term of energy consumption for data transmission between CHs and the base station. Figure ââ¬Å½4ââ¬â3 reveals the ratio of energy consumption for AD-HEED and N-HEED per rounds compared with HEED. Here, the energy consumption is the energy consumed by nodes to transmit data to the base station. According to the listed parameters, the results show that the energy consumption for data transmission between CHs and the base station is approximately 19% from the whole energy in HEED protocol. According to our experiments, we have a network that consists of 200 sensors deployed in 100m Ãâ" 100m, the base station located away at (200, 200) from the surrounding area and the initial energy for each node is 2 J. The total energy for 200 nodes is 400 J and then the energy consumed to transmit data from CHs to the base station is 76 J (19% of 400 J). The figure below shows that AD-HEED87 is the lowest energy c onsuming and then N-HEED30 and AD-HEED30 respectively which means that all of them consumed energy lower than that consumed by HEED. AD-HEED87 decreases the energy consumption by HEED by almost 47% and this means it consumes 36 J for data transmission. Figure ââ¬Å½4ââ¬â3: The ratio of energy consumption per rounds Figure ââ¬Å½4ââ¬â4 presents the ratio of energy consumption in data transmission in term of node death percentage. The figure below shows the ratio of energy consumption for 10%, 25%, 50%, 75% and 90% of nodes that consume their whole energy. As it is obviously clear from the figure, AD-HEED and N-HEED consume lower energy than HEED throughout the network. AD-HEED87, N-HEED30 and AD-HEED30 are the lowest energy consumption respectively. Figure ââ¬Å½4ââ¬â4: The ratio of energy consumption for AD-HEED, N-HEED and HEED Table ââ¬Å½4ââ¬â2 reveals the improvement of energy consumed for data transmission of AD-HEED and N-HEED on HEED protocol for 10%, 25%, 50%, 75% and 90% of nodes death. The comparison results shown in Table ââ¬Å½4ââ¬â2 depict that AD-HEED87, N-HEED and AD-HEED30 respectively are more energy efficient than HEED throughout the network. It is worth mentioning here that the data transmission energy is the energy consumed to transmit data from CHs to the base station. Table ââ¬Å½4ââ¬â2: Improvement of AD-HEED and N-HEED on HEED protocol 4.4.3 Variance of the Base Station Location In this set of experiments we evaluate how varying the location of the base station could effect on both schemes; AD-HEED and N-HEED in term of network lifetime and energy consumption. Figure ââ¬Å½4ââ¬â5 compares the lifetime of the network of AD-HEED and N-HEED with HEED, where the network lifetime is the time until the first 10% of nodes die and when the locations of the base station are (150, 150), (200, 200) and (250, 250) on x-coordinate and y-coordinate. Similar comparisons are conducted for the network lifetime in term of HND and LNA10% as exhibited in Figure ââ¬Å½4ââ¬â6 and Figure ââ¬Å½4ââ¬â7 respectively. Both approaches improve the network lifetime with different locations for the base station compared to HEED protocol. Figure ââ¬Å½4ââ¬â5 shows that AD-HEED30 is the best choice where the network lifetime is FND10%. Figure ââ¬Å½4ââ¬â5: Comparing HEED with AD-HEED and N-HEED using different locations of the base station for FND10% metric Figure ââ¬Å½4ââ¬â6 and Figure ââ¬Å½4ââ¬â7 show that AD-HEED87 and N-HEED30 prolong network lifetime in term of HND and LNA10% while AD-HEED30 prolongs network lifetime in term of HND and LNA10% while AD-HEED30 prolongs network lifetime in term of HND. Thus, for the application that requires that at least 90% of nodes should work, AD-HEED30 is the best choice and appropriate for improving the network lifetime in term of FND10%. If the demand of the application is to boost the lifespan of the network in term of LNA10%, then AD-HEED87 will be appropriate because they improve the network lifetime in term of LNA10% significantly. Figure ââ¬Å½4ââ¬â6: Comparing HEED with AD-HEED and N-HEED using different locations of the base station for HND metric It can be easily observed form Figure ââ¬Å½4ââ¬â5, Figure ââ¬Å½4ââ¬â6 and Figure ââ¬Å½4ââ¬â7 that if the base station location is farther, the network lifetime will decrease in term of FND10%, HND and LNA10% in AD-HEED and N-HEED. The decreasing of network lifetime is due to consuming more energy to transmit data to the base station. We know that the anchor or CH consumes (k (Eelec + Eamp * dn)) J to transmit k-bit message to the base station where n = 2 for d 0, and n = 4 for d âⰠ¥ d0. Thus, the distance between the closest node and the base station according to the experiments is greater than 87 (d0) so n = 4 all the time. In other words, whenever the base station was nearer, CHs and anchors will consume less energy to deliver data to the base station and vice versa. This means that the distance between CHs or anchors and the base station is a critical factor which effects on the energy consumption. Figure ââ¬Å½4ââ¬â7: Comparing HEED with AD-HEED and N-HEED using different locations of the base station for LNA10% metric The following three figures present the energy consumed in Joules by HEED, AD-HEED and N-HEED using different locations of the base station. From the figures, it is clear that AD-HEED and N-HEED consume less energy than HEED protocol throughout the network. The energy saving by the proposed method increases as the location of the base station was farther. The explanation of this was aforementioned. It is clear from the figures that the fraction of improvement decreases as we go through the network lifetime. In other words, the fraction of improvement in the energy consumption for FND10% is greater than that for HND and LNA10%. This is due to that in the earlier periods of the network lifetime there are a lot of nodes that not consume their whole energy. Thus, CHs can select the beast node as anchor which is the closest node to the base station. But in the in the later periods of the network lifetime, a lot of nodes die. Thus, some of CHs may not use anchor to transmit data the base s tation or select a node as anchor which not effect on energy consumption impressively. Figure ââ¬Å½4ââ¬â8, Figure ââ¬Å½4ââ¬â9 and Figure ââ¬Å½4ââ¬â10 reveal that AD-HEED87 is the most energy saving and then N-HEED30 and AD-HEED30. Figure ââ¬Å½4ââ¬â8: The energy consumption using different locations of the base station for FND10% metric Figure ââ¬Å½4ââ¬â9: The energy consumption using different locations of the base station for HND Figure ââ¬Å½4ââ¬â10: The energy consumption using different locations of the base station for LNA10% metric 4.4.4 Variance of the Number of Sensors We also evaluate the effectiveness of increasing number of the nodes on both methods; AD-HEED and N-HEED. Figure ââ¬Å½4ââ¬â11 compares the lifetime of the network of HEED to AD-HEED and N-HEED, where the network lifetime is FND10% and when the number of nodes is varied between 150, 200, 250 and 300 nodes. Identical comparisons are conducted for HND and LNA10% as depicted in Figure ââ¬Å½4ââ¬â12 and Figure ââ¬Å½4ââ¬â13 respectively. Both methods improve the network lifetime as the number of nodes increases. The figures show that, in almost all cases, AD-HEED and N-HEED performs better than HEED. This improvement is also due to using the anchor as intermediate between CHs and the base station. This increases the network lifespan and decreases the energy consumption. The figures show that AD-HEED30 outperforms the others in term of FND10% while AD-HEED87 outperforms the other in term of LNA10% as the number of sensors increases. AD-HEED87 and N-HEED30 are approximately the same with a slight advantage to AD-HEED87 in term of HND. Figure ââ¬Å½4ââ¬â11: Comparing HEED with AD-HEED and N-HEED using different number of sensors for FND10% metric Figure ââ¬Å½4ââ¬â12: Comparing HEED with AD-HEED and N-HEED using different number of sensors for HND metric Figure ââ¬Å½4ââ¬â13: Comparing HEED with AD-HEED and N-HEED using different number of sensors for LNA10% metric The following three figures present the energy consumed in Joules by HEED, AD-HEED and N-HEED using different number of sensors. Figure ââ¬Å½4ââ¬â14: The energy consumption using different number of sensors for FND10% metric It is obviously clear that AD-HEED and N-HEED are more energy efficient because they consume less energy than HEED protocol in all experiments throughout the network. It can be easily observed form the figures that the percentage of improvement is almost the same when the number of the nodes increases. So, the proposed methods doesnââ¬â¢t affect by varying the number of sensors. Figure ââ¬Å½4ââ¬â15: The energy consumption using different number of sensors for HND metric Figure ââ¬Å½4ââ¬â16: The energy consumption using different number of sensors for LNA10% 4.4.5 Results Analysis In HEED protocol, each sensor gathers data and forwards it to its CH. CHs in turn aggregate data from sensors and transmit it to the base station which located far away from the surrounding area. CHs consume their energy during data aggregation from sensors, data compression per signal and forwarding them to the base station. Where ET is energy consumed for transmission of K bits for distance d, ER is energy consumed for receiving, Eelec is energy consumed by the sensor node circuit, Eamp is the energy consumed by amplifier and Efus is the energy consumed for data fusion. Our proposed technique focuses on data transmission between CHs and the base station. The energy consumed by CH to transmit data to the base station directly (EnDir) represents a certain percentage of the whole energy. This percentage differs according to many factors such as the base station location, number of sensors and etc. the energy consumed for direct data transmission is calculated as the following: EnDir = EnCH_to_BS EnCH_to_BS = The energy consumed to transmit data to the base station indirectly via anchor (EnIndir) is calculated as the following: EnIndir = EnCH_to_Anc + EnAnc_to_BS EnCH_to_Anc = (1) EnAnc_to_BS = + (2) Where n =2 if d 0 or n = 4 if d > d0. The energy of (1) is consumed for transmission data to the anchor by CH while the energy of (2) is consumed for receiving data from CH and forwarding it to the base station by anchor. In AD-HEED, CHs transmit the collected data to their anchors if EnDir > EnIndir and anchors in turn transmit data to the base station. Otherwise CHs transmit the gathered data to the base station directly. In N-HEED and in addition to AD-HEED, the current anchors transmit the gathered data to the next anchors if EnDir > EnIndir and the next anchors in turn transmit data to the base station. Otherwise the current anchors transmit the gathered data to the base station directly. Figure ââ¬Å½4ââ¬â17shows the detailed description of how can transmitting data via anchors reduce the energy consumption. If we assume that the point a is the CH, d is the base station and b, c and e are hypothetical points that located in the CHââ¬â¢s transmission range which represented by a circle. The deployment field is 100m x 100m and the base station located away at (200, 200) m from the network field. The transmission range is 30 (cluster radius). ac = ab = 30. ad is the distance between CH and the base station while bd, cd and ed are the distances between the points b, c and e respectively and the base station. According to our proposed technique, CH selects the closest sensor to the base station to be its anchor and it should be closer than CH itself. Firstly, we assume that the distance between the base station (d) and point (c) is equal to the distance between the base station and CH (a). After that, we reduce the distance cd by moving the position of point c and calculate the energy consumed to transmit one byte from CH (a) to the base station directly (EnDir) and the energy consumed to transmit one byte from CH to the base station indirectly (EnIndir) via point (c). This operation repeats many times until EnDir > EnIndir. The same operations are conducted with point (b). After testing and calculation and by assuming that c, b and e are sensors, we get that cd and bd are the maximum distances while ed is the minimum distance in which sending data to the base station indirectly via sensors c, b or e consumes less energy than sending data directly from CH to the base station. Now, we can see that for any sensor located in the gray zone in the circle and has a distance to the base station less than the maximum distance, transmitting data from CH to the base station via any of these sensors will consume less energy than energy consumed by transmitting data from CH directly to the base station. Figure ââ¬Å½4ââ¬â17: The mechanism of sending data via anchors Chapter Two: Conclusions and Future work 5.1 Conclusions In this research, we proposed an efficient mechanism for hierarchal protocols of wireless sensor networks which proved to be more efficient in the use of energy than HEED protocol in most cases. The main contribution is to allow CHs to transmit data by using other sensors called anchors as intermediates which are closer to the base station than CHs. Furthermore, this approach reduces the burden from the CHs which consume their energy by collecting data from sensors and forwarding them to the base station. The sensor which has the collected data compares between the energy consumed in case if it transmits data directly to the base station and if it transmits data indirectly to the base station via its anchor. After that, the sensor decided either to transmit data directly or via anchors to the base station base on way that consumes less energy. We compared and evaluated the proposed approach performance with the HEED protocol in terms of network lifetime and energy consumption. Simula tion results depict that the proposed methods which called AD-HEED and N-HEED perform better than HEED. The improvement percentage relies on the best choice of the distance between the CH and the anchor, the evaluation metrics and the properties of the wireless sensor network. This improvement is because of that the sensor consumes much less energy when they transmit data to sensor closer than another. We know that the CH consumes (k (Eelec + Eamp * dn)) J to transmit k-bit message to the base station. If the distance between CH and the base station less than threshold distance, the energy consumption equation is calculated by using distance to the power of 2 otherwise, to the power of 4. So, the energy consumption is decreased by using anchors which allow sensors to transmit data via short distances until all data received by the base station. According to simulation results, the distance between CH and the base station is very critical factor which effects on the network lifetime and energy consumption .Furthermore; we also conduct a performance evaluation between our proposed approach and HEED protocol by using different number of sensors and different locations of the base station. The simulation results show that the variation in the number of sensors doesnââ¬â¢t affect significantly on the percentage of improvement. The simulation results show also that the percentage of improvement decreases as the location of the base station was farther because the sensors consume more energy whenever transmitting data over long distances. 5.2 Future Work Though considerable effort has been made on this thesis, many ideas regarding the subject are still not investigated. This section outlines and presents some of our future plans to be conducted in order to improve this work. The choosing of anchors in our approach depended entirely on the distance between the sensors and the base station where CHs choose the closest sensor to the base station. We think to make the choosing of anchors more controlled by taking into account different conditions and other related parameters such as the residual energy, the positions of the nodes and the received signal strength. The collected data by sensors is transmitted by CHs to one base station. This assumption is similar to that in HEED protocol. For scenarios where there are more than one base station located in different locations, each CH should transmit data to the suitable base station. Thus, studying how our proposed approach behaves with these scenarios is a very good idea to be conducted for future work. Finally, the energy consumption and network lifetime are the only performance metrics that are used to evaluate our proposed approach. Using other performance metrics such as throughput, latency and packet delivery ratio to evaluate the proposed approach is a good idea to be conducted for future work.
Friday, October 25, 2019
Why Should I Be Moral? :: essays research papers fc
Why Should I Be Moral? The question of morality proves to be a complex interrogatory. Should I be moral? If I should be, then why? Why is morality important to society? An assumption can be made that morals derive from a purely religious perspective or the Golden Rule approach. We are told that it is right to be moral. This is an ineffective answer, since it does not apply to someone outside the moral circle (Olsen, 79). This in mind, there is really no way to prove this too a person who wants to know why he/she should be moral. According to Olen, the only answer to them would be "because you are". Happiness could also be included in the list of moral reasons. I personally feel that this is the best supported reason for being moral. Although there will be times when the moral decision will not be pleasurable, it will eventually lead to happiness. Morality is important for society as a whole, as it makes life livable. Now expanding on the happiness theory, I will discuss the ideas of Aristotle. Aristotle believed that happiness is the quality of whole human life. We all have misconceptions about happiness. Most of us believe that happiness is experiencing a lively feeling of joy or pleasant feelings. We can be happy at one moment, but not the next. Aristotle on the other hand said that true happiness includes pleasures, joys, and successes as well as many pains, griefs, and troubles in ones life. A happy life is not cause by the pleasures we've had, nor marred by the displeasures we've had. Aristotle also contended that children could not be happy as the requirement for happiness was a complete life. For instance, an old man looking back on his life and being able to say that it was good, is happiness. Aristotle defined the things that make happiness as health, wealth, friendship, and good moral character. Aristotle stated that happiness was also the highest good leaving nothing more to be desired. Life is made perfect by possession of all good things. We seek happiness for its own sake. All others are sought for happiness. Aristotle believed to become happy one must have good character and be willing to suffer to obtain the greater good later on. We should seek the good in the long run. Most men/women will not do this. We take the immediate pleasure. Most people think that happiness is unique to each person. Aristotle believed that there is only one true conception and that it holds the same for all humans. Power is not an attribute to happiness because
Thursday, October 24, 2019
Comparison of Poems the Magpies and Ozymandias Essay
In the two poems, The Magpies by Denis Glover and Ozymandias by Percy Bysshe Shelley a common theme is that of manââ¬â¢s immortality. In The Magpies this theme is made especially apparent through the comparison of the immortality of Elizabeth and Tom with natureââ¬â¢s ability to remain constant due to its continuous regeneration. Meanwhile, in Ozymandias a king has a statue built however just like him the statue does not survive and is actually left abandoned and forgotten in the desert. This theme of immortality is also shown through a range of techniques such as the structure, choice of language, imagery, movement and sounds. Likewise, this theme is illustrated through the distinctive tone of the author in each poem. The poem The Magpies has a very set structure of six four-line stanzas. In each of these stanzas the last two lines describe the sounds of the magpies, while the first two lines are about Tom and Elizabeth. The second line of each stanza also rhymes with the last line of each; ââ¬Å"The magpies saidâ⬠. For instance in the first stanza the second line is, ââ¬Å"The bracken made their bedâ⬠. This rhyming of the lines about Tom and Elizabeth with ââ¬Å"the magpies saidâ⬠links the two together and creates the idea of the magpies watching everything Tom and Elizabeth do. Likewise the structure of the last two lines being about the magpies enhances the idea that the magpies are constant and despite the time that has passed, ââ¬Å"the pines grew overheadâ⬠the magpies are still there while Tom and Elizabethââ¬â¢s lives come to an end, ââ¬Å"Elizabeth is dead nowâ⬠The poem Ozymandias is also written in the format of an iambic pentameter and has an irregular rhyming pattern throughout. The rhyming pattern helps to link the poem together and create a sense of flow and almost lyrical rhythm. For example the first line, ââ¬Å"an antique land,â⬠rhymes with the third line, ââ¬Å"on the sandâ⬠. The poem is also not broken into stanzas like The Magpies and is instead presented as a sonnet made up of an octet and a sestet. In the octet the question t hat is posed is, ââ¬Ëwho does the statue in the desert represent?ââ¬â¢ as the statue is only described as ââ¬Å"trunkless legs of stoneâ⬠and a ââ¬Å"shatterââ¬â¢d visageâ⬠. In the sestet this question is then answered through the quoting of the words found on the plaque on the statueââ¬â¢s pedestal, ââ¬Å"My name is Ozymandias, king of kingsâ⬠. The structure of this poem is interesting as in the sixth line the poem reads, ââ¬Å"its sculptor well those passions readâ⬠however it is not until the tenth line that the man the statue is of is named. This arrangement of the poem creates the idea that although Ozymandias was the one who commissioned the statue to be built and claims it as his, ââ¬Å"Look on my worksâ⬠; it is not really his works that have survived but those of a nameless sculptor. In the poem, The Magpies the choice of language is interesting as it is very simple and straight to the point. It also has some contradictions in the features used, for example it states ââ¬Å"Elizabeth is dead nowâ⬠while when describing Tomââ¬â¢s declining mental state it uses the euphemism ââ¬Å"Old Tom went light in the headâ⬠. The use of the onomatopoeia of the magpies calls, ââ¬Å"and Quardle oodle ardle wardle doodleâ⬠enhances how irritable the magpieââ¬â¢s calls are and the repetition of this exact same sentence illustrates how the magpies are constant and unchanging. However, the very last refrain of the magpieââ¬â¢s ends with ââ¬Å"the magpies sayâ⬠which creates the idea that even now and into the future, the magpies will continue to live on the farm that Tom and Elizabeth left so long ago. This is in keeping with the theme of the poem which is manââ¬â¢s mortality as it shows how human lives are limited while nature as a whole is constantly regenerating so can outlast any individual. Unlike The Magpies, the poem Ozymandias uses much more descriptive and poetic language. For instance the country that the traveller is from is described as ââ¬Å"an antique landâ⬠. As the reader assumes that the traveller is from the land where the statue stands this metaphor emphasises the id ea that the country has a long, rich history. Likewise, the smashed face of the statue is described as ââ¬Å"a shatterââ¬â¢d visageâ⬠. Alliteration is also a language feature that is used regularly throughout this poem. For example the statue is described as having ââ¬Å"a sneer of cold commandâ⬠. The hard ââ¬Ëcââ¬â¢ sounds illustrate that Ozymandias was not a kind ruler but one who ruled strongly over his people with very little compassion. In the last two lines of the poem alliteration is also used when describing the physical appearance of the desert such as ââ¬Å"boundless and bareâ⬠and ââ¬Å"lone and levelâ⬠. This use of alliteration emphasises how isolated the statue is and the soft consonant sounds provoke an image of rolling desert plains unbroken by human civilisation. In the poem Ozymandias the use of adjectives to describe the size of the statue, ââ¬Å"vastâ⬠and ââ¬Å"colossalâ⬠, add to the irony of the piece as despite the statues immense size it is nothing compared to t he magnitude of the desert and regardless of its size it has still been forgotten. This relates to the idea of the mortality of man as although Ozymandiasââ¬â¢ statue has survived long after his death his statue does not cause the ââ¬Å"despairâ⬠that he hoped it would but instead is now forgotten by most and mocked by the few who have found ââ¬Å"his worksâ⬠. This also creates an idea of human perception as while Ozymandias saw the statue as threatening, the sculptor saw it as an opportunity to make a mockery of Ozymandiasââ¬â¢ egocentric personality. In the poem The Magpies by Denis Glover and Ozymandias by Percy Bysshe Shelley a common theme is that of immortality. In both poems this idea is explored through features such as structure and the use of language techniques. The structure of the two poems were different, however each was suited to the authors purpose. For example in The Magpies the author illustrates the theme of human mortality through the comparison of the length of the lives of Elizabeth and Tom with the seemingly endlessness of the presence of the magpies. Meanwhile, in Ozymandias the poem is arranged in a sonnet which allows the author to let the poem flow despite its irregular rhyme pattern. The use of the chosen language techniques in each piece is also necessary for the emphasis of the theme of immortality. For instance in The Magpies the most significant feature is the onomatopoeia of the magpies call. As this refrain is unchanged throughout the poem it illustrates the point that despite manââ¬â¢s best efforts to tame nature it is often possible for a short time as human lives are limited while nature continuously regenerates. In Ozymandias the use of alliteration is essential as it allows for a greater understanding of just how isolated and abandoned the statue is. This in turn creates the idea that although Ozymandias had the statue built to immortalise himself and leave a legacy on earth as he was not the sculptor they are not really his works that remain and are remembered but those of an unnamed artist. Both these poems illustrate how people can spend their time on earth working hard to reach perfection or an ultimate goal but in the end it is often impossible and does not allow them to be any more immortal than the next person. Perhaps then people would do better to accept that their time is restricted and work with these limitations to ensure that their time is not wasted in seeking immortality or creating a useless legacy and instead doing what good they can in the short time that they are given.
Wednesday, October 23, 2019
All the World’s a Stage, the Dramaturgy
All The Worldââ¬â¢s a stage ââ¬Å"All the world's a stage, And all the men and women merely players. They have their exits and their entrances; And one man in his time plays many partsâ⬠Shakespeare. Although Shakespeare wasnââ¬â¢t a sociologist, I think this quote profoundly sounds like Ervine Goffmanââ¬â¢s ideas of dramaturgy and impression management. I agree with both Shakespeare and Ervine. We all have a part to play in this world and we do play it. To me Ervine Goffmanââ¬â¢s ideas about self and dramaturgy are the most applicable social ideas in my own life.He believed we do something called impression management. I have actually noticed myself using impression management every day. I have also noticed that in sociology we really need to understand face to face interactions of individuals to understand a society as a whole. He also believed in a concept called symbolic interactionism. He believed that social interactions are what make someone who they are. I b elieve that to understand his ideas better it is imperative that you know a little about him. Goffman was born June 11, 1922(Blackwood, 2011) to a Jewish Ukrainian couple in Canada.Initially, he received his bachelors in sociology at the University of Toronto. Then he went to the University of Chicago to achieve his masters and doctorate. Chicago was the center for many micro-sociologists and symbolic interationists like Goffman. His ideas must have made him fit right in with all the other sociologists studying at University of Chicago. He also studied a year in Shetland and wrote a book called The Presentation of Self in Everyday Life. This is where he refers to the theory of us always being onstage. He then went to Berkley to teach about Sociology and Anthropology (which he also studied).Goffman also went onto to write about his ideas of total institution (the sociology term for somewhere completely blocked off from normal society). He wrote many books over his life time and he re mained a very important man in the sociology world. He ended his writing career going back to address more evidence that we are all performers, he ended on the same note he started on. He passed on November 19th, 1982. ((Blackwood, 2011) Micro-Sociology is the study of a small group of people to understand how society works as a whole.Ervine Goffman advocated this idea and used face-to-face interactions as a basis to understand sociology. I believe that this is a very true idea because without individuals there is no society. I also believe that how we act as individuals is what makes a society how it is. For example as individuals we actually enjoy conflict when the conflicts involves others. In high school I remember that everyone always wanted to stop in the hallway to watch people fight. On a larger scale society watches reality Television shows like ââ¬Å"Bad girls Clubâ⬠just to see these conflicts.Everything we do individually affects us as a society. Another thing that Goffman believed in was how society is what makes us who we are, this is called social interactionism. Yes we make up society but in turn society molds us to who we are as well. For example a child is born completely without morals and values. These things are taught to the child by family and ultimately society. The child is taught killing is deviant and unacceptable. It is also taught that being overweight is a concrete stigma for females of society. Therefore if the child is a girl they will constantly want to be skinny, even at a young age.My Humanities professor was talking about how his 8 year old daughter was called fat the other day in school. Now the young girl will not eat very much. This not something we are born with, these are learned values that society teaches. I have my own personal experience with social interactionism. My whole life society has shaped me to be who I am. Itââ¬â¢s almost like a very subtle, yet powerful, form of peer pressure. For example I think that if it werenââ¬â¢t for the fact that society teaches that you should treat strangers with absolute respect I think I would have had a lot more conflicts with them.Society teaches us to not get as angry with strangers as we do with our own friends and family members. Another thing Goffman believed was an idea called dramaturgy. Dramaturgy is the idea that we all act around people as if we were actors on a stage. He believed that the only time we acted as our true selves was when we are backstage and no one else is around to see us. I believe this is true of everyone in society. Of course there are those who have to act because itââ¬â¢s their job. Politicians, lawyers, servers, parents these people have to put up a facade so that others reactions server their purpose.Not all of this acting is used for selfish purposes though. For example a parent doesnââ¬â¢t want their child to be scared so in a crisis they might smile and tell them everything is going to be all right, e ven if they know itââ¬â¢s not going to be alright. The final point I agreed with Goffman on was an idea called impression management. Impression management is similar to dramaturgy however it is how we are all the time. I use impression management every day. For example I am a server and I have to come off a certain way for my guests to like me or I wonââ¬â¢t make any money.I have to smile even when Iââ¬â¢m stressed and I have to use a completely different voice when addressing my guest than I would use with anyone else. I also have to pretend I like things on the menu I have not even tried. In conclusion, I agree with Goffmanââ¬â¢s theories on dramaturgy, impression management, micro-sociology, and symbolic interactionism. I concur with the fact that society shapes you to be who you are, it has definitely made me who I am. I also think that looking at how individuals interact with each other is imperative in finding out how society works.You cannot understand the big pi cture without first looking at the small details. Impression management is a very important part of my life because itââ¬â¢s how I make a living. Finally dramaturgy is something we all do every day. We are actors on the stage of Society Citations 1. Blackwood, B. D. (2011, July 06). Blackwood. org. Retrieved from http://www. blackwood. org/Erving. htm 2. Travers, A. (1997). Reviewing sociology. Retrieved from http://www. reading. ac. uk/RevSoc/archive/volume10/number1/10-1e. htm
Subscribe to:
Posts (Atom)