Monday, December 30, 2019
Children s Innate Desire For Adults Based On Rewards
The desire of the participants to please or behave for adults based on rewards is another concern with Bandura et al. (1961) findings. According to Ferguson (2010), childrenââ¬â¢s innate desire to please their elders may have been a major influence in participantââ¬â¢s adopting aggressive conduct towards the Bobo Doll. Given the children were aware of the adultââ¬â¢s expectation to punch or push the Bobo Doll back, it was reported the childrenââ¬â¢s motivation to comply with this expectation was as a key influence in deciding the outcome of their behaviour and hence their aggressive conduct. Ferguson also discussed that aggression is distinctly different to violence. He explained the intention of the Bobo Doll to bounce back, conveyed the impression to the test subjects that it was going to hit them and thus, producing their survival instincts to ignite and respond by hitting the doll. Fergusonââ¬â¢s view suggested that participants were acting on survival instinct rat her than aggression undermines Bandura et al. (1961) historical findings and hence illustrated that fundamentally, acknowledging various causes for the basis of aggression amongst children is essential. Ferguson (2010) additionally stated that aggressive behaviour and violent behaviour are not identical. He explained the intention of violence is to cause substantial physical harm, whereas aggressive behaviour can be enjoyable between consenting people such as wrestling or play fighting (Ferguson, 2010). Although violentShow MoreRelatedFactors that Promote Rapid Language Learning in Children?1406 Words à |à 6 PagesSavage-Rumbaugh, Sevcik, Hopkins, 1988), but language acquisition is a mystery of human beings, it starts before a child is born (DeCasper Spence, 1986). Until today, no artificial intelligence has been created which can learn a language. Healthy newborn children acquire seemingly effortlessly and rapidly the language of any part of the world, independently from the parents native language. In the last decades various theories have emerged which try to explain the language learning process from psychologicalRead MoreWhy Some Children Are More Aggressive Than Others? Essay2022 Words à |à 9 Pages SWK501 (Human Lifespan and Social Ecology) TMA01 Topic: Why some children are more aggressive than others? Lim Hup Lip Stephen 22 May 2016 Ã¢â¬Æ' Introduction Why some children are more aggressive than others? Bandura Walters (1959) defines aggression as any behaviour harbouring the goal or intention to cause hurt, harm to another human, or destruction to an object. Nativists like Noam Chomsky would answer this question according to the theory of nativism ââ¬â that a personââ¬â¢s character traitsRead MoreThe Psychological Theories Of The Human Personality2210 Words à |à 9 Pagesbiologically innate (nature) or defined by environmental variables (nurture). Carl rogerââ¬â¢s humanistic approach surfaced as a revolted reaction to Freudââ¬â¢s psychoanalysis approach. The humanistic approach is a holistic, idiographic approach to psychology. humanist argue that other psychological approaches (for example Freudââ¬â¢s psychoanalysis theory) are to deterministic. Therefore, not taking into account: the uniqueness of each individual, the boundless freewill individuals possesses, and the innate willRead MoreLife Span Development1429 Words à |à 6 Pagesbaby is hungry, the id wants food, so the baby cries. When the id wants something, nothing else matters. As the baby gets older, it interacts with the world and its personality starts to develop. This part of development is called the ego. The ego is based on the reality principle. The ego realizes that other people have needs and takes them into consideration. The ego understands you cannot be selfish and impulsive. The ego meets the needs of the id while considering reality. The super ego develops byRead MoreIs Learning A Second Language?3786 Words à |à 16 Pagessuch as learnersââ¬â¢ attitude towards the target language, linguistic aptitude, age, personality differences and motivation respectively. Then it attempts to evaluate the effectiveness of two teaching techniques on learner motivation which are offering rewards and giving feedback. The first learner related factor which is likely to have an influence to the learner is attitude. Some researchers believe that L2 learnersââ¬â¢ success may depend on their attitudes towards target language. According to AtchadeRead MoreRole of Nature and Nurture in Language Development3195 Words à |à 13 PagesHow do both nature and nurture interact in the promotion of language development in young children? The debate between many researchers is the argument of whether nature or nurture play a more important role in development. In this essay I will be looking into both aspects of nature and nurture focusing specifically on their influence towards language development in children. A main controversial question I will be looking into is the question of whether are we born already equipped with mechanismsRead MoreDescribe How Children Learn, with Reference to Major Theories2991 Words à |à 12 Pagestheories How children learn is very important in child care and in understanding how a child is to development. As children who are deprived of stimulation in early years develop slower, this statement opens up a massive debate which has been unanswered for years, the nature v nurture debate. There are 3 models of learning that cover all this debate and strive to be the correct theory they are the transmission model, the laissez-faire model and the constructivist view. How children learn FirstlyRead MoreCriminality: Criminology and Extra Y Chromosome3476 Words à |à 14 PagesCriminality has been sociologically defined as a form of deviant behavior from the norm and the acceptable rules of society. A more generic definition of criminality is a behavioral predisposition that disproportionately favors criminal activity. It is based on the premise that the act or acts committed by an individual violates the natural rights that are given to the person by birth and or by right. The statement ââ¬Å"Are criminals born, or made?â⬠is wide reaching and still the subject of many debates. Read MoreResearch on the Cognitive Moral Development Theories of Jean Piaget Lawrence Kohlberg2712 Words à |à 11 PagesLAWRENCE KOHLBERG DONNA O. O CONNOR INTERNATIONAL UNIVERSITY OF THE CARIBBEAN ABSTRACT The intention of this paper is to provide an overview of the psychological theories of Jean Piaget and Lawrence Kohlberg. While Piaget s perspective was psychological, Kholberg s viewpoint was psychological with emphasis placed on moral development and both theories will be compared and contrasted in this paper. Furthermore, the implications of these theories for counselling will be examined. RESEARCH ONRead MoreExplain the Principal Psychological Perspectives Applied to the Understanding of the Development of Individuals7716 Words à |à 31 Pagespsychosexual stages are a discontinuous theory. There is also an issue of nomothetic vs idiographic; some theorists adopt a nomothetic approach while others adopt an idiographic approach. Individuals that adopt a nomothetic approach create theories based on what we share with others, and find general laws that can be applied to large groups of people, for example behaviourism is a nomothetic approach. On the other hand the idiographic approach goes into large detail for the individual to investigate
Sunday, December 22, 2019
Is Information Systems Security For Secure Sensitive...
In todayââ¬â¢s climate the need to secure sensitive digital data is more important than ever. That is why the discipline I have chosen to pursue is Information Systems Security. The job of an information systems security professional is to keep a companyââ¬â¢s data assets available, confidential, and assuring itââ¬â¢s integrity. The primary focus of this field is design, maintain, and implement security procedures and system to secure digital data. As an information systems security professional I would work with computer and security software and hardware in order to secure a companyââ¬â¢s important information. I would insure that information is not only secure but also available to those who are authorized to access it. The primary motivation for choosing this career is the growing increase in internet security breaches in the news. I felt that the demand for qualified people for this profession will only increase as more and more information is stored and transmitted digitally. The way data is stored and transmitted digitally over vast networks spanning the globe has always fascinated me. I am excited to learn more about this industry and how to secure it. I was also influenced by friends and family who are currently in computer and networking related fields. The types of writing in this field are varying. They range from technical writing when documenting procedures and processes to more formal styles when responding to or sending emails. You will also use a cadenced type of writingShow MoreRelatedAnnotated Bibliography On Database Security1383 Words à |à 6 PagesIntroduction: Database security is the system, processes and procedure that protect the database from unauthorized individual or malicious attacks. The researches on database security has been increased gradually over the years as the most of critical business functionalities and military secrets became digitized. Database is an integral part of the information system and often holds the sensitive data. The database have to be protected from external connections like firewalls or routers on the networkRead More5 Ways to Measure the Quality of Your Cryptography Essay1243 Words à |à 5 PagesYour Crypto Introduction Cryptography is definitely become a more mainstream topic today. Almost every device in this world is connected to the internet and sharing information. At the same time of the increasing of number in the device, the number of sensitive data in the information shared between devices, application, and server is also increasing in a larger scale. That information must be protected, so that the sensitive data will remain private. The dominance attack today is not just aboutRead MoreThe Lack of Digital Privacy Essay1031 Words à |à 5 Pages With everyone joining the online world your privacy is at even greater risk then ever before. The internet has become part of our everyday lives, from social networking to online transactions. Your privacy is threatened every day. However is our privacy threatened by our own government? According to the pew research data 56% of Americans say that it is acceptable for the NSA to run through millions of Americans phone records in order to prevent terrorism. (Pew Research Center) Many peopleRead MoreEssay about Communication and Technology in the Business Organization1702 Words à |à 7 Pages Company websites, blogs, and wikis allow a business to directly communicate with customers. The Internet allows employees to telecommute and work from remote locations. Executives from different countries can use videoconferencing to meet without ever leaving the office. O nline document services such as Google Docs and Microsoft Office Live Workspace allow documents to be created, edited, and stored online for collaboration by multiple people in multiple locations. Web 2.0 innovations includingRead MoreSecurity Incidents And Security Violations2103 Words à |à 9 Pagesthat 63,437 security incidents and 1,367 confirmed security breaches had significantly impacted their business. [cite] Even more staggering, over 100 million Americansââ¬âthat s 1 out of 3 citizensââ¬âhad their credit or debit card information pilfered by hackers over the course of 4 data breaches between 2013 and 2014 [cite], with confirmed evidence that breaches of this type are increasing. These statistics show that there are serious problems now existing in the realm of information security and theRead MoreAnalysis Of BJG Cybersecurity Consultants1427 Words à |à 6 PagesCybersecurity Consultants provide companies with Security Analysis, Security Awareness, and then re commends the right Security Awareness plans for your company. Our mission statement is to provide the best security environment for our customers. Our staff provides world class customer service. Cyber-attacks are any type of offensive maneuver employed by nation-states, individuals, groups, or organizations that targets computer information systems, infrastructures, computer networks, and/or personalRead MoreIn The Digital Era, Where Data Happens To Be The Most Important,1830 Words à |à 8 Pagesthe digital era, where data happens to be the most important, critical, valuable and at the same time, most vulnerable asset of any enterprise; cyber security becomes one of the most important elements in the startup ecosystem. In the complex online world of ever flowing data where users are getting more educated about issues like privacy policies, terms of use, concerns over sharing persona information online or similar concerns about their banking details, it has become ever more important to deployRead MoreDigital : Digital Signature And Encryption1435 Words à |à 6 Pages1. Digital Certificates Digital signature and Encryption together protects data in the internet. Digital signature is the internet ID that is given to a person to identify himself that who is and how they can be trustable. They are used together to protect the data that are confidential from the intruders and threats. A digital certificate is a file on your computer a pair, you can use it to create the digital equivalent of a handwritten signature and seal of the envelope. Each file is divided intoRead MoreIT Security: The Men Behind the Scenes1083 Words à |à 5 Pagessupposed to protect this confidential information? The truth is that those in IT security are the ones on the forefront of the underground war on hackers and other threats to national security. Overall, IT security is one of the most precise and important jobs of the modern age. What is IT security? According to TheFreeDictionary.com, IT security is ââ¬Å"The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, orRead MoreCyber Attacks On Maritime Targets1468 Words à |à 6 PagesDanish government institutions before it was discovered in 2014. Reasons for the ever-increasing security exposure include the growing use and interdependence of computer systems, the relative ease and extreme value of executing attacks, and the exceptional difficulty in identifying the culprits and bringing them to justice. Regrettably, some port authorities contribute to their vulnerability by addressing cyber-security as a technology threat best left to IT professionals. On the contrary, successful
Saturday, December 14, 2019
Artificial Intelligence in Missile Technology Free Essays
string(48) " which will guide itself during its trajectory\." ARTIFICIAL INTELLIGENCE IN MISSILE TECHNOLOGY K. Manasa B-Tech III/IV Branch: EEE Shadan College of Engg Tech, Peerancheru, Hyderabad-08. konda_sowmya @yahoo. We will write a custom essay sample on Artificial Intelligence in Missile Technology or any similar topic only for you Order Now com Abstract: The development, strength, economy and progress depends on the status of the Defence, This paper deals with various generations of computer where the fifth generation computers use Artificial Intelligence. A few applications of Artificial Intelligence used in various technologies have also been discussed. The main focus of paper is on chaser missiles, which implements the missile technology using Artificial Intelligence. The Anupama processor designed in India can be used in chasers. This shows the development of Artificial Intelligence in Indian defence systems. The On-Board Computer department of RCI and ASL of DRDO are working on similar missile technology mostly on the guidance systems for Agni, Trishul, Akash and NAG along with which even the Chaser using the AI technology may replace the existing guidance system of the missiles. Keywords: IC, VLSI, Turing test, Chasers, OBCS, Seeker, IGMDP, DRDO, BDL, Anupama Processor, Deep Blue, Seed AI. 1. Introduction: Artificial Intelligence is a branch of Science that deals with helping machines finding solutions to complex problems in a more human-like fashion. It is intelligence exhibited by any manufactured system, which is often used in works of science fiction. The term is often applied to general-purpose computers and also in the field of scientific investigation into the theory and practical application. This generally involves borrowing characteristics from human intelligence, and applying them as algorithms in a computer friendly way. For more complex problems, things get more difficult. Unlike humans, computers have trouble understanding in specific situations and adapting to new situations. Artificial Intelligence aims to improve machine behavior in tackling such complex tasks. A more or less flexible or efficient approach can be taken depending on the requirements established, which influences how artificial the intelligent behavior appears. From AI we can learn something about how to make machines solve problems by observing other people or just by observing our own methods. On the other hand, most work in AI involves studying the problems the world presents to intelligence rather than studying people or animals. . Various Generations of a Computer: With the advent of computers there has been a vast proliferation in them. A computer is truly an amazing machine as it performs various functionalities. For generations, it has been the constant endeavor of man to get the better of his adversary by inventing more and more potent computers. Till today we got five gener ations of computers. The 1st generation computers used vacuum tubes. These computers occupied large space, liberated a large amount of heat and also lead to many uncontrolled operations. The 2nd generation computers used enormous number of transistors. After some years these transistors were fabricated on a single chip called ICs. Computers using these were called the 3rd generation computers. With the advancement of technology in VLSI, a large number of ICs were integrated on a single chip made of silicon, which is further used by the 4th generation computers. An attempt is being made to apply artificial intelligence on these computers, which constitutes the 5th generation computers. These computers are expected to be faster results and thus may influence international policies, strategy and tactics to an enormous extent. 3. Is AI different from Human Intelligence? Alan Turingââ¬â¢s article ââ¬Å"Computing Machinery and Intelligenceâ⬠discussed some conditions where a machine can be used in an intelligent fashion. He argued that if a machine can perform successfully as a human can do, then the observer will certainly consider it as an intelligent device. This test called Turing test would satisfy many people but not all the philosophers. The observer can be able to interact with the machine but canââ¬â¢t differentiate it from the actual human works (actions voices) while interacting and thus it camouflages the observer. The Turing test is a one-sided test. A machine that passes this test should certainly be considered as intelligent, irrespective of having knowledge about human. There are many adversaries about this fact, that an excellent discussion on the Turing test is not supportive, with restrictions on the observerââ¬â¢s knowledge of AI and the subject matter of questioning. It turns out that some people are easily misinterpreted that, a rather dumb program is intelligent. When we set out to design an AI program, we should attempt to specify as well as possible the criteria for success for that particular program functioning in its restricted domain. . 1 Hardware for AI: In order to use AI in any system a few hardware specifications are required. The minimum requirements include a computing system containing an IC built processor, a control unit, memory devices, and a converter for external interfaces, floating-point unit, input-output ports and timers. These components work relatively with the computing system as per the AI o riented software. 4. 2 Software for AI Software is the intelligence that runs the hardware in a computer. Basically AI is in form of information fed to the processor through a programming language. The parameters acts as input that results into desired output. A fifth generation language use AI to create software based on our description of what the software should do. 5. Missile Technology and AI: Missile: It is an object or weapon that is fired, thrown, dropped, or projected at a target. Missiles play major role in warfare. The earlier versions of missiles were simple in design and operation. When the fighter plane first came into use the missiles used were of simple nature that involved only target mode and firing angle. The present day missiles are much complicated. The concept of employment of these missiles has also undergone a drastic change. Chasers: It is a type of missile that may be designed to chase the target until it hits or causes damage to the target. The Chaser contains an OBCS in its control unit, which contains AI as a backup, which will guide itself during its trajectory. You read "Artificial Intelligence in Missile Technology" in category "Essay examples" Chaser continuously emits either Laser light, Infrared rays or Radio waves continuously from its IR Dome. When the enemy unit comes in its path a part of these waves reflect back giving a signal to the Chaser. Then this missile automatically changes its position so as to knock down the enemy. [pic] [pic] [pic] Working: The main purpose of an OBCS is to obtain guidance and control. The OBCS mainly contains an IC built processor, a control unit, memory devices like flash memory, SRAM, NVRAM, communication devices like UART and a converter for external interfaces. It is the seeker that actually applies AI. Before missile is launched the target is fed to the OBC in the form of a signal or image, which is basically intelligence. The seeker continuously scans the image target and gives signal to the OBCS. The input is in the form of co-ordinates that allows the chaser to change the position of radar and direction of missile by changing the position of the fins, nozzle and wings such that the target is always at its center of view. This is done by the control unit by varying the altitudes of the missile i. e. Roll, Yaw and Pitch thus guiding the missile towards its target. [pic] The missile control operation follows a closed loop system. Characteristics: The following are the characteristics to be possessed by a Chaser: â⬠¢ The chaser should be faster than sharp enemy. It should take the shortest path to reach the enemy. â⬠¢ The Propellant composition should be such that it is able to effectively engage the target. â⬠¢ The longitudinal, lateral and vertical axis of missile must be varied in a smooth fashion when enemy tries to dive or jump suddenly. Future Trends: With the application of AI the missiles may be capable of automatic target recognition and even be able to tell the condition of the terrain. It may be able to identify tanks and trucks as friendly or enemy vehicles. The missile, while in flight may have the ability to prioritize target on battlefield. If the missile thinks that it should go after a high priority target rather than trying to kill its original target, it will do so. Software programme will be so advanced that mission options will be decided by brains built into the missiles with the help of embedded real time computers. The ongoing developments and changes in this field may however cannot be forecasted. 6. Development of AI in India: India launched its missile development programme through IGMDP under the aegis of DRDO, the premier defence research agency. Under this programme five missile systems are currently under different stages of development and production. BDL, Hyderabad has also been established as a premier production agency for all missile systems. The following missiles form part of IGMDP: Prithvi ââ¬â Introduced in 1996 Trishul ââ¬â under development AKASH ââ¬â under development NAG ââ¬â under development AGNI ââ¬â under development The most recent attempt made for the development of AI based technology in India is the design of Anupama Processor. It has been designed at Anurag Research Institute, Hyderabad. Anupama was first used in Mission Control system mounted on under water self propelled missile, Torpedo. It is a 32-bit processor based on RISC architecture. It mainly contains a 32-bit floating-point unit, 32-bit parallel input-output port and two 16-bit timers. It has a non-multiplexed bus structure with 32 data lines and 32 address lines. A bus interface unit supports Synchronous, Asynchronous and Burst data transverse. It also supports dynamic bus sizing. The same can also be used in OBCS of chasers. 7. Other Applications: 7. 1 Robotics: Robots are typically used to do tasks that are too dull, dirty, or dangerous for humans. Industrial robots used in manufacturing lines used to be the most common form of robots. Other applications of Robotics include toxic waste cleanup, underwater and space exploration, surgery, mining, search and rescue, and mine finding. Robots are also finding their way into entertainment and home health care. 7. 2 Medicine: Artificial Intelligence in Medicine allow computers to process and analyze three-dimensional images of the heart in much the same way an experienced human operator would. The program applies artificial intelligence techniques to the measurement of parameters critical to understanding the state and behavior of the human heart. This automated approach allows information to be obtained very quickly that is quantitatively accurate and does not suffer from intra-observer or inter-observer variability. The software and algorithms developed by the AIM program are widely considered to represent the gold standard in nuclear cardiology. 7. 3 Banking: AI systems are used to detect fraud and expenditure financial transactions, with daily transaction volumes in billions. These systems first use learning algorithms to construct profiles of consumer usage patterns, and then use the resulting profiles to detect unusual patterns and take appropriate action. Ex: To disable the credit card. 7. 4 Data Processing: Data Mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus on most important information in the data warehouses. Data mining tools predict future trends and behaviors, allowing business to make proactive, knowledge-driven decisions. It answers business questions that traditionally were too time consuming to resolve. The past history in the form of records is taken as a backup, which is fed in the form of intelligence for data processing. 7. 5 Game playing: The AI based machines can be applied for playing games mainly through brute force computation using the entire game play as a backup in the form of AI. Advantage of using this type of machine is the players can have a practice session where they will have a tough opponent (machine) and then in a real match the players will not face much difficulty. Ex: Deep Blue computer for chess. 7. 6 Speech Recognition: The areas where continous interaction is required between the user and computer, the need not go for the commands using input devices. He can just dictate the commands while the system accepts it in the form of speech signal and achieves the task to be performed. Ex: In a highly protected zone where the security levels must be maintained high can make use of speech recognition system, where the password can be broken only by a particular official. 7. 7 Computer Vision: The human eye as well as TV cameras capture objects and give it as an input to the main system. But here the input given is two-dimensional; some programs may run with this input while the computers require partial three-dimensional information that can be possible by computer vision. Ex: The images taken from satellites can be of three-dimensional type. 7. 8 Machine Translation: It is a form of translation where a computer program analyses text in one language i. e. , ââ¬Å"Source textâ⬠and attempts to produce another language called ââ¬Å"Target textâ⬠without human intervention. Ex: In the fields having highly limited ranges of vocabulary and simple sentence structure like weather reports, machine translation can deliver useful results. 7. 9 Handwriting Recognition: Several attempts were made to produce ink pens that include digital components such that a person write on a paper and have the resulting text stored digitally. So the user need not write once in a paper and then enter it again as input in computer, thus saving time. 8. Friendly AI: Friendliness theory is a proposed solution to the dangers believed to stem from smarter-than-human artificial intelligence. According to the theory, the goals of future AIs will be more arbitrary and alien than commonly depicted in science fiction and earlier futurist speculation, in which AIs are often anthropomorphized and assumed to share universal human desires. Because AI is not guaranteed to see the ââ¬Å"obviousâ⬠aspects of morality and goals that humans see so effortlessly, the theory goes, AIs with intelligences greater than our own may concern themselves with endeavors that humans would see as pointless or even laughably bizarre. One example is that of an AI initially designed to manufacture paperclips, which, upon becoming superhumanly intelligent, tries to develop molecular nanotechnology because it wants to convert all matter in the solar system into paperclips. Friendliness theory stresses less the danger of superhuman AIs that actively seek to harm humans, but more of AIs that are disastrously indifferent to them if steps are not taken to specifically design them to be benevolent. Doing so effectively is the primary goal of Friendly AI. This belief that human goals are so arbitrary derives heavily from modern advances in evolutionary psychology. Friendliness theory claims that most AI speculation is clouded by analogies between AIs and humans, and assumptions that all possible minds must exhibit characteristics that are actually psychological adaptations that exist in humans (and other animals) only because they were once beneficial and perpetuated by natural selection. Many supporters of FAI speculate that AI able to alter and improve itself, seed AI, is likely to create a huge power disparity between it and less intelligent human minds, that its ability to reprogram itself would very quickly outpace human ability to exercise any meaningful control over it. While many doubt such scenarios are likely, if they were to occur, it would be important for AI to act benevolently towards humans. One of the most recent significant advancements in Friendliness theory is the collective volition model. More concretely, the collective volition of humanity is the actions we would collectively take if we knew more, thought faster, etc Friendly AI should initially seek to determine the collective volition of humanity, with which it can then alter its goals accordingly. 9. Conclusion: Artificial intelligence has to be applied to the machines where the human involvement is not applicable. Keeping this in point of view, we have seen ample applications in real life so as to enhance the life of the human. These machines are very well suited for real time systems because of their fast response and computational efforts. In future people will witness a radical change in the cyber environment in the form of artificial intelligent oriented technologies. The countryââ¬â¢s economical development depends on the strength of Defence. The chaser missile mentioned in this paper uses this reliable technology playing a prominent role in fortifying the defence. Further research on the lines of missile technology using AI may fetch more advanced and better technology in designing the missiles. From past so many years India was depending on other countries for its requirements in Defence. Now with this India will be self-dependant. Regarding the usage of AI even today there are so many comments on the threat towards humans from this intelligent so called machines. For this the friendly AI mentioned in this paper can be an answer. Finally we would like to conclude that the applications of Artificial Intelligence might be applied in real life making it no longer a fiction. 10. Acronyms: AI: Artificial Intelligence. IC: Integrated circuit. VLSI: Very Large Scale Integration. OBCS: Onboard Computer System SRAM: Static Random Access Memory NVRAM: Non Volatile RAM UART: Universal asynchronous receiver transmitter RISC: Reduced Instruction Set Computing IGMDP: Integrated Guided Missile Development Programme. DRDO: Defence Research and Development Organisation. BDL: Bharat Dynamics Limited. RCI: Research Center Imarat ASL: Advanced Systems Lab 11. References: â⬠¢ ââ¬Å"Computing Machinery Artificial Intelligenceâ⬠3rd edition, by Alan Turing. â⬠¢ Research paper on ââ¬Å"Machine Intelligenceâ⬠by Sankar Kumar Paul, Indian Stastical Institute, Kolkata. â⬠¢ ââ¬Å"Super Intelligent Machinesâ⬠by Bill Hibbard. â⬠¢ ââ¬Å"Artificial Intelligenceâ⬠2nd edition 2004, by Elaine. Rich and Kevin Knight. â⬠¢ ââ¬Å"Applications of AIâ⬠by Richardson, IEEE paper, September 2004. How to cite Artificial Intelligence in Missile Technology, Essay examples
Thursday, December 5, 2019
Case of the dead musician free essay sample
On the day in question Mr. Karazaiââ¬â¢s only son called the police saying that his father had hung himself from a chandelier at his estate. The police found his feet hanging about two feet above the stool, and several pieces of steel wire had been ripped out of his beloved piano. As a result from the evidence I concluded that his son murdered him. First, Mr. Karazaiââ¬â¢s hands are tied together. Generally, it is almost humanly impossible to tie your hands together then hang yourself from a chandelier. In conclusion, someone else mustââ¬â¢ve tied his hands together. Secondly, some steel wire had been ripped out from his piano. Although, Mr. Karazai was depressed and angry at himself for his lack of strength, his piano was something that he loved very much. Generally, if you really love something you wonââ¬â¢t harm it no matter how mad you are. Thirdly, there was only one thin line of blood right across his Adamââ¬â¢s Apple. As a rule, the material he used to commit suicide wouldnââ¬â¢t have caused that cut, that means that someone else murdered him with a different type of material. More importantly, Mr. Karazaiââ¬â¢s son was the only family he had left meaning that his son would be the person who ended up keeping Mr. Karazaiââ¬â¢s money. Mr. Karazaiââ¬â¢s son probably killed his father so he could keep all the money. According to the evidence I reviewed, I have concluded that Mr. Karazaiââ¬â¢s son has indeed murdered his father and will be question by authorities. The Case Of The Dead Musician On the day in question Mr. Karazaiââ¬â¢s only son called the police saying that his father had hung himself from a chandelier at his estate. The police found his feet hanging about two feet above the stool, and several pieces of steel wire had been ripped out of his beloved piano. As a result from the evidence I concluded that his son murdered him. First, Mr. Karazaiââ¬â¢s hands are tied together. Generally, it is almost humanly impossible to tie your hands together then hang yourself from a chandelier. In conclusion, someone else mustââ¬â¢ve tied his hands together. Secondly, some steel wire had been ripped out from his piano. Although, Mr. Karazai was depressed and angry at himself for his lack of strength, his piano was something that he loved very much. Generally, if you really love something you wonââ¬â¢t harm it no matter how mad you are. Thirdly, there was only one thin line of blood right across his Adamââ¬â¢s Apple. As a rule, the material he used to commit suicide wouldnââ¬â¢t have caused that cut, that means that someone else murdered him with a different type of material. More importantly, Mr. Karazaiââ¬â¢s son was the only family he had left meaning that his son would be the person who ended up keeping Mr. Karazaiââ¬â¢s money. Mr. Karazaiââ¬â¢s son probably killed his father so he could keep all the money. According to the evidence I reviewed, I have concluded that Mr. Karazaiââ¬â¢s son has indeed murdered his father and will be question by authorities. The Case Of The Dead Musician On the day in question Mr. Karazaiââ¬â¢s only son called the police saying that his father had hung himself from a chandelier at his estate. The police found his feet hanging about two feet above the stool, and several pieces of steel wire had been ripped out of his beloved piano. As a result from the evidence I concluded that his son murdered him. First, Mr. Karazaiââ¬â¢s hands are tied together. Generally, it is almost humanly impossible to tie your hands together then hang yourself from a chandelier. In conclusion, someone else mustââ¬â¢ve tied his hands together. Secondly, some steel wire had been ripped out from his piano. Although, Mr. Karazai was depressed and angry at himself for his lack of strength, his piano was something that he loved very much. Generally, if you really love something you wonââ¬â¢t harm it no matter how mad you are. Thirdly, there was only one thin line of blood right across his Adamââ¬â¢s Apple. As a rule, the material he used to commit suicide wouldnââ¬â¢t have caused that cut, that means that someone else murdered him with a different type of material. More importantly, Mr. Karazaiââ¬â¢s son was the only family he had left meaning that his son would be the person who ended up keeping Mr. Karazaiââ¬â¢s money. Mr. Karazaiââ¬â¢s son probably killed his father so he could keep all the money. According to the evidence I reviewed, I have concluded that Mr. Karazaiââ¬â¢s son has indeed murdered his father and will be question by authorities. The Case Of The Dead Musician On the day in question Mr. Karazaiââ¬â¢s only son called the police saying that his father had hung himself from a chandelier at his estate. The police found his feet hanging about two feet above the stool, and several pieces of steel wire had been ripped out of his beloved piano. As a result from the evidence I concluded that his son murdered him. First, Mr. Karazaiââ¬â¢s hands are tied together. Generally, it is almost humanly impossible to tie your hands together then hang yourself from a chandelier. In conclusion, someone else mustââ¬â¢ve tied his hands together. Secondly, some steel wire had been ripped out from his piano. Although, Mr. Karazai was depressed and angry at himself for his lack of strength, his piano was something that he loved very much. Generally, if you really love something you wonââ¬â¢t harm it no matter how mad you are. Thirdly, there was only one thin line of blood right across his Adamââ¬â¢s Apple. As a rule, the material he used to commit suicide wouldnââ¬â¢t have caused that cut, that means that someone else murdered him with a different type of material. More importantly, Mr. Karazaiââ¬â¢s son was the only family he had left meaning that his son would be the person who ended up keeping Mr. Karazaiââ¬â¢s money. Mr. Karazaiââ¬â¢s son probably killed his father so he could keep all the money. According to the evidence I reviewed, I have concluded that Mr. Karazaiââ¬â¢s son has indeed murdered his father and will be question by authorities.
Thursday, November 28, 2019
0635 Name Eiyad KhairyGrade 8N Essays - Waves, Acoustics
0635 Name Eiyad KhairyGrade 8N Essays - Waves, Acoustics 0-635 Name: Grade 8(N) MYP Science Title: Sound Key concept: Relationships Related concepts: Relationships / Models / interaction Global contexts: Identities and relationships / Roles and role models Topic: The sound wave Statement of inquiry: Models can represent the structural and functional relationship between sound and energy. Inquiry questions: Factual: What is the sound? Conceptual: How do sound travel through mediums? Debatable: What are the applications based on echo? MYP Assessment Criteria B- Inquiring and designing C- Processing and evaluating Writing a lab report about The sound wave Due date is before Tuesday 17/3/2015 Theoretical background Waves transmit energy without transmitting matter. This means that waves can move energy (or information) from one place to another without moving any substance (stuff) from one place to another. The amount of energy which a wave depends on its amplitude. Longitudinal waves move through substance backwards and forwards. After the wave has gone, the substance is back where it started but energy has been carried by the wave from its origin (where it begins) to its destination (where it finishes). The sound wave is a longitudinal wave. It cant travel through a vacuum (nothing), when a longitudinal wave moves through a material, the particles of the material move backwards and forwards along the direction in which the wave is travelling. Below is a picture of a longitudinal wave travelling along a slinky. Rarefaction is the name given to the region where the slinky is pulled apart. Compression is the name given to the region where the slinky is pushed together. The wavelength can be measured as the distance between the centers of two compressions. Wavelength is given the symbol l (Greek lambda), and is measured in meters because it is a distance. Denoted by . Frequency is defined as "the number of complete cycles (complete waves or vibrations) in one second". Hertz is the unit of frequency (symbol Hz). Denoted by . The period of a wave is defined as "the time taken for one complete cycle or vibration". Denoted by T. The wave equation links between frequency and wavelength: Speed = frequency x wavelength v=f f= 1T= ntWhere: v is speed measuren in [M/s] f is frequency measured in [Hz]T is periodic time time needed to complete one cycle measured in [s] N is the number of vibrations T is total time of vibrations measured in [s] Aims: In this investigation you will be able to: Use slinky to calculate the frequency of a wave. Materials: Slinky Stopwatch Meter stick Task: Your task is to write a lab report about longitudinal waves. Procedure Stretch the slinky between two group members without making it too tight. Make sure the slinky is lying on the floor (as shown in figure 1 below) Create a longitudinal wave pulse by pushing the slinky forward parallel to it. The slinky should still be in a straight line and the wave pulse (squished up part) should travel to the other end of the slinky. Measure the distance that the wave travels between people (the length of the slinky) in meters and record this in table 1. The third person should time the wave through this distance, from one person to another. Enter this time into table 1. You will record the time it takes the longitudinal wave to travel from one person to another for a total of three separate times. These times will not be exactly the same, but should be close to each other. The fourth person should count the number of pulses pass through the slinky for each time. Average these times and enter the average in table 1. To average the time add them up and divide by their number. average time= time1+time2+time33Calculate the speed of this longitudinal wave using the wave equation: speedms=distance traveled (m)time (s)Record the speed of this longitudinal wave you calculated into table 1 in meters per second. Show your work and calculation in analysis part. Communicate scientific information effectively using scientific language correctly. Present all the information appropriately using symbolic and/or visual representation accurately according to the chosen application. Figure 1 Part 1: Introduction Problem statement: How does the amount of vibration affect the frequency? Hypothesis: If the amount of vibration increases then the frequency will increase. Explaining the hypothesis: The frequency will increase because it depends on the amount of vibration speed. Dependent Variable: Frequency Independent Variable: The amount of vibration Controlled variables: Time: (1 min) Equipment: Slinky Stopwatch Meter stick Procedure: I stretched the slinky between
Monday, November 25, 2019
Greek Idiots - Democracy and Voting - Myth vs Fact
Greek Idiots - Democracy and Voting - Myth vs Fact In ancient Greece, the inventors of democracy set up a law that required every person to vote, regardless of who they voted for. If anyone was found not voting, the person would be publicly marked and labeled an idiot, someone who thought their own personal needs trumped those of the society around them, and over time, the word idiot has evolved into todays usage. -Ã Isaac DeVille, Michigan State columnist It just isnt true that all Greeks or even all citizens of Athens were required to vote, and its not true on many levels. Only males (free and, originally, propertied; later, also born to two Athenian-born parents) could become citizens.Only citizens could vote.These potentially voting citizens were limited to those without a personal or inherited mark (atimia) against them.In addition, whats true about one period of democracy is not necessarily true of another. 1275a: 22-23: A citizen defined in simple terms is someone who can participate in judging [that is, serve as a juror in the court system] and in governing [that is, serve in public office, which here means not just magistracies but also serving in the assembly and on the council in systems of government that have these institutions]. Stoa Project Aristotle www.stoa.org/projects/demos/article_aristotle_democracy?page8greekEncodingUnicodeC Politics Male Athenian citizens actively participated, but voting was only a part of what was meant by democracy. Speaking well and being physically present in the communal life were crucial.The Athenian assembly, which held 6000 citizens, decided most of the issues.Citizen-orators persuaded their fellow citizen-voters.The voting itself could be conducted by a show of hands, as is seen Aristophanes comedy Ecclesiazousai, where Praxagora describes the voting in the Assembly:Its difficult; yet it must be done, and the arm shown naked to the shoulder in order to vote.Officials chose the winner based on a visual estimate of the majority of hands. They certainly werent counting exactly enough to make sure there were 6000 hands on 6000 discrete bodies. Sometimes more secretive ballots were used small, colored balls placed in urns. 6000 was not the entire citizen body, although it was a hefty portion.A body of 6000 citizens served as juries, meeting about half the days of the year, with each of the ten tribes providing its required share.A lottery selected the 400 or 500 men for the third governmenta l group, called the boule. Steven Kreis The Athenian Origins of Direct Democracy explains the idiot reference in the student newspaper: At Athens, a citizen who held no official position or who was not a habitual orator in the Assembly was branded as idiotai. This is a far cry from calling the non-voter an idiot. Idiotai is also used to distinguish the common people from the poor (penetes) and the more powerful (dynatoi). Idiotai is also used for unskilled worker. While we dont know what the population figures are for ancient Athens, and it changed over time, if there were say, 30,000 male citizens, more than a third of them were actively involved in politics at times. If we followed the Athenian example, who would feed, house, clothe, educate, and medicate the families of the politicians? Pay for time spent fulfilling the civic obligation was at first non-existent. Aristotle has several passages in his Politics explaining why. Here is one: 1308b: 31-33: It is of the greatest importance in all systems of government to have laws and the rest of governmental administration so arranged that magistrates cannot profit financially from their offices. There is a passage from a work ascribed to Aristotle in a section about Solon that probably led to the columnists idea. It comes from Constitution section 8: Further, [Solon] saw the state often engaged in internal disputes, while many of the citizens from sheer indifference accepted whatever might turn up, he made a law with express reference to such persons, enacting that any one who, in a time civil factions, did not take up arms with either party, should lose his rights as a citizen and cease to have any part in the state. Although not the last word that could be said on the issue, modern Americans are not like classical Athenians. We neither live our lives in public nor do we all want to be politicians (although neither did Socrates, even though he sat on the Athenian Boule). Requiring us to be penalized for failing to go to the polling booths andmake choices on the ballot once every 4 years because thats what they did in the birthplace of democracy misses the point of the ancient Greek democratic process. Further Reading on Greek Voting and Idiots The Tradition of the Athenian Democracy A. D. 1750-1990, Mogens Herman Hansen Greece Rome, 2nd Ser., Vol. 39, No. 1. (Apr., 1992), pp. 14-30.The Athenian Assembly in the Age of Demosthenes, Mogens Herman Hansen. Review author: Phillip Harding Phoenix, Vol. 44, No. 2. (Summer, 1990), pp. 199-200.The Ten Archontes of 579/8 at Athens, Thomas J. Figueira Hesperia, Vol. 53, No. 4. (Oct. - Dec., 1984), pp. 447-473.The Duration of a Meeting of the Athenian Ecclesia, Mogens Herman Hansen. Classical Philology, Vol. 74, No. 1. (Jan., 1979), pp. 43-49.Christopher W. Blackwell, The Assembly, in C.W. Blackwell, ed., DÃâmos: Classical Athenian Democracy (A. Mahoney and R. Scaife, edd., The Stoa: a consortium for electronic publication in the humanities [www.stoa.org]) edition of March 26, 2003. More of Democracy Then and Now Part 1: IntroductionPart 2: AristotlePart 3: ThucydidesPart 4: PlatoPart 5: AeschinesPart 6: IsocratesPart 7: HerodotusPart 8: Pseudo-XenophonPart 9: Q. Were All Ancient Greeks Required to Vote or Risk Being Labeled Idiots?
Thursday, November 21, 2019
The Advantages of Depression Essay Example | Topics and Well Written Essays - 750 words - 1
The Advantages of Depression - Essay Example When a person is unhappy about something on a subconscious level, they do not realize it consciously. They continue to get unhappier and more discontent, without realizing why. Then, as a defense to letting this condition continue, the mind goes into depression. Only when the patient addresses the problem (cause of depression) consciously, does the depression end (Seligman et al, 1988). Here, one can think of depression as the minds way of bringing attention to ignored problems in the mind. It sheds light on the problems which are keeping the person from becoming happy, and refuses to let the person live normally until the problem stands addressed (Lehrer, 2010). Thus, far from a nuisance, depression is a tool of the mind to bringing a person closer to happiness. Finally, this disease also provides the patient with an advantage as far as abilities is concerned. A rather unexplained fact related to depression is that it leads to an increase in creativity. Several artists and writers from both past and present have been reported to be patients of depression. According to Nancy Andreasen, a neuroscientist who has researched extensively about this characteristic of depression, this correlation is explained by the increased levels of persistence found in patients of depression. They are able to fully concentrate on their work, and persevere with the task. This leads to a boost in their creativity enjoyed by these patients of depression (Lehrer, 2010).
Wednesday, November 20, 2019
Apple vs. Samsung Essay Example | Topics and Well Written Essays - 250 words
Apple vs. Samsung - Essay Example Apple and Samsung are world leaders in smartphones and tablets, the two fastest growing consumer electronics market across the globe. For this reason, the success of Appleââ¬â¢s law suit could potentially have global ramifications even though the ruling only applies to the American market. A possible scenario that could play out is for Apple to pursue other competitors in the US ââ¬â with many analysts seeing the Android Operating System as the main target. However, given that we do not see Appleââ¬â¢s lawsuit succeeding in other jurisdictions, this would segment the global consumer electronics industry into the US and the rest of the world. This would isolate the US consumer electronics industry from global competition. This could be beneficial for the Apple in the short-run but in the long-run the lack of competition could eventually make the US consumer electronics industry to go the way of the US auto-industry. There are three questions that I see arising from this article. First, interaction design is a fundamental component of consumer electronics. Is it ethical to grant proprietary rights to fundamental components that advance the growth of the industry? Secondly, when looking at such patent-infringement battles is the effect on consumers weighed in or only the interests of corporations are taken into account? What is the greater good? Banks, T. (2012, August 28). Apple vs. Samsung - what does it mean for design? Design Week. Retrieved September 11, 2012, from
Monday, November 18, 2019
Biotechnology Essay Example | Topics and Well Written Essays - 2250 words
Biotechnology - Essay Example Recent technological advancements in the application of biotechnology have raised certain ethical concerns among people. Genetically engineered food has been a subject of hot debate for the past three decades. Genetically engineered food is an application of biotechnology in agriculture which has enabled us to design and create plants with the desired characteristics through genetic engineering. This idea has been rejected by some and praised by others. Both parties do realize how this technology could revolutionize the world but the idea of this revolution differs. The proponents and opponents of biotechnology and its application envision different futures. The idea of biotechnology is to aid human life but no one can guarantee whether it will be used to aid life or not. Scientists face such criticism everyday but this does not mean that they should stop doing their research. If they did so in the past then we may probably be living in miserable conditions. Technology is only a tool that has helped humanity survive through tough times. The crux of the matter is that the rewards of biotechnology do outweigh the risks associated with it. Biotechnology or Bioengineering has been accused of carrying potential threat but this does not mean that no reward comes with this threat. In fact Biotechnology does promises potential rewards whose proof can still be observed. Risks and threats have always accompanied technology but this in no way implies that one should give up on technology as I further stated that it is our moral obligation to provide our future generations with whatever we can to help them battle the problems of the world. This can in fact be termed as a compensation for using the resources of this planet for our present generation of people. Evidence of the fruits of Biotechnology has been most visible in the
Friday, November 15, 2019
The Importance of Being Earnest and Dr. Faustus | Comparison
The Importance of Being Earnest and Dr. Faustus | Comparison Deception and hypocrisy remained a challenge to social morality since ages and every great writer has taken into consideration this socio-ethical dilemma in his works and has depicted its various manifestations at various levels. Dr. Faustus by Christopher Marlowe and The Importance of Being Earnest by Oscar Wilde depict various manifestations of deceptions and hypocrisy i.e. self-deception by denial of realities, trickery to others, and self-consideration through various thematic expressions. Main characters in both plays suffer from moral illusions at one level and their unique characteristics make it easier for them to hide behind the mask of trickery and hypocrisy at another level. The most subtle form of deception is self-deception and protagonists of both plays suffer from acute self-deception by denying realities around or within them. Faustus seems to be obsessed with his own intelligence and this tragic flaw laps over with his pride and leads him toward self-deception. Dr. Faustus unlimited passion for absolute knowledge set an impetus toward hypocrisy and self-deception that ends with his tragic downfall. As a perfect epitome of renaissance man, he hankers after excessive power and considers knowledge as the only instrument available to him to get absolute power. His overambitious quest for knowledge forces him to make a deal with Satan. This deal refers to an intellectual myopic illusion, a form of acute self-deception, as he believes that a devilish character, who himself does not have absolute knowledge, will capacitate him with absolute knowledge. In Wildes play, despite the fact that both Jack and Algernon are Bunburyists, but at certain points in th e play, Wilde shows denial of this reality by these protagonists regarding the issue of homosexuality. They deny the fact and feel for heterosexuality. Algernon is entirely pleased to be a homosexual whereas Jack feels disgusting about it. Algernon says in this regard; Nothing will induce me to part with Bunbury, and if you ever get married, which seems to me extremely problematic, you will be very glad to know Bunbury. A man who marries without knowing Bunbury has a very tedious time of it. (Wilde, 1990, p. 7) Jack oppositely says; That is nonsense. If I marry a charming girl like Gwendolen, and she is the only girl I ever saw in my life that I would marry, I certainly wont want to know Bunbury. (Wilde, 1990, p.7) But his transformation is not known completely in the play. So he essentially remains a Banbury but denies this fact apparently. Furthermore, Jack creates an imaginary figure to escape from social liabilities and moral obligation. So Faustus in Dr. Faustus and Jack and Al gernon in The Importance of Being Earnest are unable to recognize and accept realities around and within them in the right perspective. Hypocrisy is another form of deception that these two plays incorporate in the plot as a thematic expression and manifest through misleading practices and fraudulencies of certain characters. Algernon, the major character in The Importance of Being Earnest elaborates this terminology of Bunburying as a sophisticated deception exercise that permit to conceal ones original personality and indulge in activities which society does not allow. Wilde has beautifully shown the subtle fraudulencies and trickeries of Ernest. Cecily Cardew assumes about Ernest that Ernest has a strong upright nature. He is the very soul of truth and honor. Disloyalty would be as impossible to him as deception. (Wilde, 1990, p. 36) So she negates any blemish of foul play about him. Jack not only lies about his name being Earnest but when inquired by Algernon about an inscription on his cigarette case from Cecily, he falsely claims she is his aunt before finally admitting that he is guardian to his adopted father s granddaughter. This leaves the reader to wonder if anything about Jacks or Earnests life is real at all, perhaps he has been lying for so long that he doesnt even know what the real truth is. Thats the reason that Cecily says in the end, A gross deception has been practiced on both of us.(Wilde, 1990, p. 39) Marlowe points out the religious hypocrisy by the deceitful practices of church members. When Faustus visits Pope for guidance and advice but finds his men raucous and hypocrite, he satirizes them for on their petty rituals and hypocritical practices. He says; How! Bell, book, and candle; candle book and bell, / Forward and backward, to curse Faustus to hell (Marlowe, 1990, p.44). But Marlowe also reveals that though Faustus castigates church men for their double standards, he himself is indulged in hypocrisy. His underlying objective to get more knowledge is different from what he propagates to others. He does not want to be a petty magician and his designs are grand and dang erous. So he acquires his knowledge by mere hypocrisy. Mephistopheles and Lucifer also deceive Faustus through their hypocritical practices. In Scene 5, Mephistopheles informs Faustus that after signing the pact with Lucifer he will be as great as Lucifer (Marlowe, 1990, p. 19) and his every desire will be fulfilled. But after signing the contract with his own blood, none of these promises come true. So Faustus is trapped to sign the contract by false promises that are a manifestation of hypocrisy on part of Mephistopheles and Lucifer. Third level of deception that Marlowe and Wilde take into account is self-love and self-consideration. Narcissm is considered a chief deception that hampers one attitude to look around and search for the best. Jack in Importance of Being Ernest, only has himself in mind when he claims to be Earnest, and goes to call on Cecily, In fact, now you mention the subject, I have been very bad in my own small way. (Wilde, 1990, p. 24). The tragedy of Faustus solely arises out of his self-centeredness and self-consideration. It was his love for his own self that compels him to acquire absolute knowledge in order to become eternal and the most powerful man on earth. This self-love is further augmented by his pride and arrogance. Diluted by this self-love, a great man as Faustus challenges the natural orders of things and this self-love finally brings his tragic downfall. Above-mentioned arguments and textual evidence from the plays clearly demonstrate that deception works through various means in these plays. These various forms and levels deception are illustrated effectively through characterisation and development of plot. Both Marlowe and Wilde have effectively used various thematic expressions of deceptions to bring out the moral illusions of characters and their weaknesses. References Marlowe, C., Dyce, A. (1990s). Dr. Faustus. [Montana]: Kessinger Publishing. Wilde, O. (1990). The importance of being earnest. New York: Dover Publications.
Wednesday, November 13, 2019
Comparison between Female Characters in Beowulf Essay -- Beowulf Compa
Comparison between Female Characters in Beowulf à à à à à Beowulf, the Old English epic tells the story of one brave hero and his battles against evil monsters. The poem deals with mostly masculine elements like fight descriptions, depictions of armor and long inspiring speeches. However, the women characters in the epic also have important roles and they are far from being superficial, as it may seem at first. There are several female figures in Beowulf; this paper will focus on three of them- queen Wealhtheow of the Danes, queen Hygd of the Geats and Grendel?s mother. These characters have many parallels between them but in a way some are the ?alter-ego? of the others. à à à à à Wealhtheow is the perfect hostess and devoted queen and wife. Her first appearance in the poem demonstrates her official duties as the queen: ?Wealhtheow came in, Hrotgar?s queen, observing the courtesies. Adorned in her gold, she graciously saluted the men in the hall, then handed the cup first to Hrotgar?So the Helming woman went on her rounds, queenly and dignified, decked out in rings, offering the goblet to all ranks, treating the household and the assembled troop (lines 612-623). As a queen, Wealhtheow has a role to fulfill and she does it with grace. She welcomes the guests; offers mead and creates a peaceful atmosphere in the mead-hall. The figure of Grendel?s mother is quite the opposite in this aspect- she is the ?anti- hostess? and far from being graceful. This creature does not greet the man who arrives to her dwelling; she fights Beowulf desperately and only a divine interference saves his life: ?It was hard-fought, a desperate affair that could have gone badly; if God had not helped me, the outcome would have been quick and fatal? (lines1657-1658). One can claim that these manners of Grendel?s mother are quite masculine. We find that she fights well and has the qualities of a great warrior if she was almost able to overcome Beowulf and she takes upon herself the manly duty of avenging her dead son. Beowulf himself says to Hrotgar that: ?It always better to avenge dear ones than to indulge in mourning? (lines 1384-1385). Taking vengeance for warrior?s death is noble but Grendel?s mother?s attentions are condemned by the poet ? she cannot be noble and she cannot act upon warrior?s code of honor; this notion comes from the fact that she is not really human and more impor... ...at queen does not trust her son to be a successful sovereign and she does not try to secure his future on the throne. Unlike Wealtheow and Grendel?s mother Hygd?s primary concern is to her people, not her son: ?There Hygd offered him throne and authority as lord of the ring-hoard: with Hygelac dead, she had no belief in her son?s ability to defend their homeland against foreign invaders? (lines 2369-2372). After a closer look in Beowulf one will find that the women roles in the poem are quite central and significant. They enrich the narrative by developing the plot and enlighten their men?s intentions. Nevertheless the women in the poem have their own will and power- political or physical. Thought some share similar qualities women characters are not patterned or superficial; these women are defined by dominant male figures but nonetheless they have their own significant features and depth. Works Sited: Anonymous. Beowulf. The Norton Anthology of English Literature. 7th Edition. Vol. I. (pp.32-99). Ed. Abrams, M.H., New York: W.W. Norton & Company, 2000. ?Germanic History and Culture?, Germanic Heritage Page, The Anglo-Saxon Domain www.anglo-saxon.demon.co.uk .
Subscribe to:
Comments (Atom)