Thursday, October 31, 2019

Critically assess the strengths and weaknesses of the different models Essay

Critically assess the strengths and weaknesses of the different models of Strategic Human Resource Management - Essay Example Personnel Management involved hiring the best employees, keeping employees productive, monitoring employees in their operations, payment, motivation and development of employees (Biz Bite Consulting Group, 2011). Personnel management was mainly focusebd on ensuring that workers made to provide the best results and this was done in a very isolated manner that was independent of central organizational goals and objectives (Becker and Gerhart, 1996: Thomson, 1999). This meant that employee matters were simply grouped under this aspect of the business and it enabled the business to remain in control of affairs in organisations. Also, personnel management involved a unit that ensured that employee matters were dealt with and employee challenges were revolved. It existed as a necessary unit but not a vital component that was manipulated by management to meet the overall goal of the organisation. Strategic human resource management, on the other hand, evolved to blend personnel management w ith the goals of the organisation (Thomson, 1999). In other words, the personnel management unit is designed and ran in such a way that it contributes directly to the long-term organisational plan and goals (Galbraith and Nathanson, 1978). This integration meant that the strategy of the organisation was integrated into the personnel department and this department was ran to meet organisational strategic goals. In linking the old personnel management unit of a business to the strategic units and levels of businesses, there are four main methods and approaches that are used to link the two systems. They are: 1. Universalistic Approach 2. Contingency Approach 3. Resource-based Approach and 4. Institutionalist Approach Each of these four approaches to strategic human resource management comes with various strengths and weaknesses. This paper examines each of the approaches and undertakes a critical analysis of all of them. This will involve an examination of the main theory that underli nes the approach and an assessment of the merits and demerits of each approach. Universalistic Approach to Strategic Human Resource Management. The universalistic approach assumes that there is one best way of carrying carrying out the human resource management function strategically (Pfeffer, 1998). In other words, the management spend time to crystallize a system of managing people that they consider to be foolproof and appropriate to the organisation in all circumstances. The best way of doing human resource management becomes a universal set of rules that are used to run the human resource management unit as a strategic business unit that works to meet strategic goals of the organisation. There are three yardsticks that are used in defining the 'best way'. These yardsticks come up as a result of the need to define what is best and what will eventually become the universally accepted human resource management system. The first yardstick is a commitment based system which involves the choice of a strategic human resource management system that helps employees to become more committed (Guest, 1987). This way, the basis for choosing a system of implementation is to find out what best enhances employee commitment. The second yardstick is the concern for employee motivated system (Wood, 1999). I doing this, what is defined as the best human resource management system is judged by how sensitive it is to the needs of employees. The third model is quite opposite to the second model. This is a concern for work model. In other words, the universalistic approach is based on the ability of an HRM model to make employees provide the highest level of outcome and results for the

Tuesday, October 29, 2019

As people grow older, they need to renegotiate their sense of identity and belonging Essay Example for Free

As people grow older, they need to renegotiate their sense of identity and belonging Essay Everyone has struggled with their identity and belonging during a chapter of their life. There comes a time when our opinions and beliefs begin to differentiate from those around us. During this time, some people may discover where they belong, whereas many others do not. It is not solely one stage of our lives when we are confronted with an identity crisis, but a continuous challenge throughout our lives as we encounter new experiences that will alter our thoughts, emotions and perspective on ourselves. Most of us are following the â€Å"norms†, society expectations but deep down inside, we desire for freedom. Society only gives us a narrow time, a â€Å"window†, between school and marriage to be whomever we want without the judgement of society. This window is the only time that we can have a †good time† like getting drunk, travel, stay out late, do silly things yet nobody would criticise. However, since the window is pretty narrow, many people tends to stretch it so they can fully enjoy themselves. For school-leavers like us, we would like to taste that sense of freedom as soon as possible and as long as possible. Not many of us would actually thinking about settling down at this moment since we are young. Out there in the world, many interesting new things are inviting us to try and take on the challenges. We are like Bubba, young and energetic, new to the world and society doesn’t expect much of us yet. However, human beings are not eternally immutable, we change ourselves, our identity and sense of belonging gradually. There’s certainly a time when we feel so lonely, distanced and disconnected even though there’s a crowd of people around, people that we know. That’s when we should think to ourselves, who am I really and where do I belong? After enjoying freedom for so long, we could be bored and lost because we are living without a purpose, a plan for the future. We would begin to yearn for a lifelong companionship, fulltime commitment from someone, we can’t stand being alone for the rest of our lives in some vague, unstable relationships that can break at any moment. We need something new and more exciting than what we already experienced. A solitary is an unfulfilling life to us, we want love, affections and devotion so that our lives can be fulfilled. As we grow older, we would stop being immature, selfish and solo as part of our â€Å"growing up†. Though we would like to stretch our â€Å"window†, society does expect us to grow after certain age. We are expected to reproduce ourselves by having a family, taking up the responsibilities, pass on our beliefs to the younger generation. Reproduction is that we can start all over again, that’s why life is a cycle, repetitively, and many would follow. In each and every one of us, the biological urge or clock would start to alarm as we grow older. Desire for a family with children would naturally come for most people, then they would seek to settle down. Nancy had enough of the lay-off, after sixteen years without any assurance, she had renegotiated with herself to discontinue. She wanted to have a family, a stable relationship, since Barney couldn’t give her that, she left and married to start a family life. She was not young any more but it was not too late, at least she realised that the lay-off wasn’t working for her and she found a solution that she was comfortable with. However, there’re a few people who think differently. They are afraid of losing their freedom as they are lost in their own fantasy that they are young and free forever. Marriage certainly limits one’s freedom that to some people, it’s a chain, an imprisonment for life that they don’t ever want to be bind in. They love their liberty even though they are aging, they don’t have a slight idea of changing their lifestyle. They don’t want to grow up even if they are growing old. In society’s eye, they are the odd ones, the ones that defy the â€Å"norms†, the bad omens. Olive is the representative of these people, she detest matrimony and any permanent attachment. However, she ignored reality of her aging and the repetitive of the lay-off was wearing everybody out. The freshness, excitements and funs were gone long ago but she turned a blind eye to it, believing it would last forever. Only if she renegotiate with herself earlier, reality wouldn’t struck her as hard and she would understand why Roo proposed to her. At some point in life, we must reconsider of our sense of identity and belonging so that its suit our situations. We are not ever-changing but we can’t be the same forever, we need to change gradually to adapt to the changing world just like how the Earth revolves around the sun. It spins but we don’t feel it. People change overtime but we don’t really see unless it’s a dramatic change. As we grow older, we encounter more crises which influence our sense of identity and belonging. We would be wiser than before as we learn from our mistakes.

Sunday, October 27, 2019

Digital Encoding Technique Of Scrambling Computer Science Essay

Digital Encoding Technique Of Scrambling Computer Science Essay Scrambling is a digital encoding technique that is used in modern data communication schemes and can principally provide aid in retrieving information from received data enhancing synchronization between the transmitter and the receiver. In digital systems it is common to encounter long sequences of 1s and 0s making it difficult for the receiver to retrieve timing information [01]. As a result, the input device randomizes data but the receiver fails to obtain them in their consistent countenance. Adaptive equalization, clock recovery and variations of received data are difficulties that can be eliminated if the bit sequence is randomized and that is a procedure that a scrambling device can guarantee. Scrambling techniques can be divided into two classes; additive scrambling and multiplicative scrambling. In the first case scramblers tend to use modulo-2 addition in order to transform the input data stream and attain synchronization of both ends by using a sync-word. A specific pattern is placed at the beginning of each frame thats being sent and can be decrypted only by the receiver [googlebook]. On the other hand, multiplicative scramblers are named that way because they implement a multiplication between the input signal and the scrambler transfer function. This class of scrambling is also referred as self-synchronizing scrambling because they dont need a sync-word for synchronization [googlebook]. Scramblers are used in a variation of applications. In security systems for example, they can encrypt data and send them into a channel sequence with safety. That way they cant be intercepted on the way to the receiver and can be decrypted by the descrambler installed at the terminal. The main purpose of scrambling devices in data communication systems is to make sure that information from data that has been received from a terminal include timing material that aid the synchronization of both ends such as two modems [01]. 2. Understanding scrambling Accuracy in data communications is highly considerable as otherwise could lead to data loss. For example, a huge network malfunction could take place considering modems scramblers in the infrastructure of a countrys stock market were data must be represented live. This failure could be catastrophic considering the fact that data is being transmitted and received from all over the world. Thus, an errorless communication system is essential with quite accurate timing devices appended to it. This could be easily feasible if communication networks were simply constructed but at present numerous devices are being attached and large data sets are being processed in complex communication grids making it difficult to achieve or even approach the objective of punctual contact. 2.1 Additive (Synchronous) scrambler Data scrambling basically uses fixed binary sequences that mostly resemble a random signal. Feedback generates and provides shift registers with these sequences that afterwards are being exploited by modulo 2 adders. Shift register consists of flip-flops which are placed in a specific order in which they receive the bits and gradually forward them to the next flip-flop in a cascade formation [DTS]. Feedback connections in some stages include taps in which the tapped signals are added modulo 2 and fed back to the first flip-flop. In figure 1 flip-flops 2 and 5 are mod-2 added, flip-flops 1 and 2 are shift to 2 and 3 until they gradually land at flip-flop 4 and 5 and mod-2 output reverts back to flip-flop 1. The result of this shift register will go through thirty-one different states and then it will repeat this process of incoming bits from scratch. This outcome sequence might look fortuitous at first sight but taking under consideration the shift register, length and taps one can pe rceive the exact bits of the fed sequence [DTS]. Following, a simple example of the scramblers operation is comprehensively explained. Paradigm copes with an additive scrambler were an input bit sequence is exploited to fit the modulo 2 logic addition of a pseudorandom sequence. As shown in figure 1 a sequence is granted from a pseudo-random sequence generator and is composed of a 5-bit non zero seed. This sequence of bits (s1) is brought to the scrambler which are summed modulo 2 of locations 2 and 5 in the shift register.. Before the data transmission begins, bits are shifted up one stage as follows: 5 shifts to channel, 4 shifts to 5, 3 shifts to 4, 2 shifts to 3 and 1 shifts to 2. After this procedure takes place, sequences next bit is imported and this process is repeated. When data transmition (s2) arrives the descrambler, bits are summed in to modulo 2 sums at the stages of 2 and 5, just like the values given in the in the primary phase of scrambling. The first bit of the incoming sequence results from this sum and the contents at the registry are shifted up one stage as follows: 5 shifts to receiver, 4 shifts to 5, 3 shifts to 4, 2 shifts to 3 and 1 shifts to 2. This procedure is then repeated. Looking up to the beginning of the paradigm, it should be mentioned that scramblers structure is identical to the one that descrambles the data of the outgoing frame. Therefore, any optimization of the scramblers circuit must be implemented on both ways in order to carry out an accurate scrambling and descrambling action [02]. Suppose that the channel hasnt enticed any bit errors a successful scramble and descramble is being performed regarding that s1 = s2. Going even deeper with the scramblers action, a moreover examination of the example above should take place considering the circuits application. The basic characteristic of scrambling is the use of Galois Theory on polynomials which finds implementation in the afore mentioned example in the following equation: s2 = 1 + D2s2 + D5s2 (1) Where D is a unit delay operator representing the delaying sequence by one bit. Thus, D2s2 and D5s2 refer to the equivalent bits of the scrambled sequenced that is transmitted into the channel as represented in figure 1 and the binary X-OR operator taking place between them. Taking all terms of s2 in one side of the equality the following equation is obtained: [1 + D2 + D5] s2 = s1 (2) or, regarding the transfer process: s2 = [ 1 / (1 + D2 + D5 )] s1 (3) As for the descramblers equation approach, it is reflected as follows: s3 = [1 + D2 + D5] s2 (4) All the above circuits in depth approximation can be generally represented form the following equations: s2 = F(D)s1 (5) and s3 = G(D)s2 (6) which, in the scrambling and descrambling pair procedure are used as: F(D)G(D) = 1 (7) Thus, any receiving or transmitting connected shift registers that indulges Equation 7 are proper for use as a scrambler and descrambler pair. Furthermore, it is now clear that data can be scrambled for many reasons but in order for a terminal to receive these data and modify them into a distinctive countenance a descrambling device is necessary. Descrambling is the inverse of scrambling and its purpose is to restore the signals data state as they were originally supplied to the coupled scrambler [descrambler]. Descrambling is accomplished through using the exact algorithms that were implemented at the initial scrambled signal. Any other use of algorithms at the descrambler doesnt cohere to the complete scrambling and descrambling procedure. 2.2 Multicapitave (Self-synchronizing) scrambler Self-synchronizing scrambling operation acts in two modes. First mode is called start-up and copes with data which are placed to a coupled scrambler and descrambler. This specific seed of information is similarly stored on both ends. After a predestined time interstice, the first mode is terminated and the second one initiates a procedure were information that is stored on both end devices is used to form key signals [03]. This technique deals successfully with randomizing bits by using a logic addition of delayed digits from the source sequence. While in this steady-state mode, errors cannot affect the data as they are already loaded in the devices before the descrambling initiates. Figure 2 represents an indiscriminate scrambler and descrambler that contains M stages and output is given by the following equation: in which + (X-OR) and ÃŽÂ £ denote modulo addition. Shift register of the descrambler receives the M error-free scrambled bits and initiates decoding after affirming that they are identical to the ones transmitted by the receiver [DTS]. Descramblers decoding equation is familiar to the one of scramblers and favors the following: Figure 2 Block diagram of Self-Synchronizing Scrambler and Descrambler [DTS]. Guided scrambling In data communication systems where scrambling contains bit stream transmissions, an improved method of self-synchronizing technique can be applied. Guided scrambling is accepted to be an extension of multicapitave scrambling and its basic principle is based on a refined encoding technique which provides an enhanced transmission [06]. Analytically, this method exploits the drawback of a single source bit affecting many other quotient bits. For example [06], if 01001010001001010100101 is the source sequence, the scrambled should be: 01000000001000000100000 which is an unbalanced sequence presenting only a few alterations. The most significant bit of this sequence is 0 but if an altered quotient required this bit to be 1 the new sequence would be: 11010110010111000010111 This sequence, with the alteration of only one bit, carried in the modulo-2 scission process, plainly depicts better transmission attributes. Guided scrambling is widely implemented in fiber optics communications and assures balanced, efficient transmission with high transition density. 3. Data scrambling in the employment of security Since the amount of digitalized content increases rapidly, data protection becomes a great issue to deal with, as important as encoding techniques implemented to achieve desirable security [MIS]. Scrambling is greatly well-known and effective security technique as its applied on most communication forms [AMIP]. Encryption is the formal name of the scrambling process which applies the function that alters the scope of data in order to be protected before transmitted [SC]. Modern encryption involves algorithms that are based on complex mathematical functions making difficult or in some cases impossible to reverse the scrambled data. Confidentiality is clearly the need that encryption is called to fulfill. However, integrity is also a great issue that data encryption successfully faces. For a long time it has been believed that the feature where one can copy and distribute content freely is advantageous but apart from reading data one can easily change them in a meaningful manner [AMIP]. Furthermore, data scrambling and encryption are fundamental components of protocols that enable the provision of security while executing a system, network or communication task [SC]. 4. Implementation of scramblers in 56kbps V.92 modems V.92 modems are almost extinguished since broadband internet has been solidly established all over the world, but its quite interesting to investigate the implementation of the scrambling and descrambling technique on this device because this is where it was elevated. Wherever GSTN and PSTN are the only communication networks infrastructure, this type of modem is the state of the art. Data rates of a V.92 modem are 56kbps for downstream when in use from server to client connection and 48kbps for upstream when in use from client to server. Term modem emanates from the words modulation and demodulation which basically refer to the main process executed by this specific device: turning to account of the analog signal carried by telecommunication network for data transmission and elaboration. Scrambler in this case guarantees sufficient transitions in the transmitted data for clock extraction and avoids a continuous stream of ones and zeros using an algorithm to alter the data sequence [DCCN]. In order for a modem to perform a one to one mapping between bits and encoding procedure of another modem device it must also be equipped with a descrambler. Data communications very often transmit idle characters, particularly when paired modems make no use of the transmission medium for a relatively long period [DCCN]. Initiating a data transmission again could evoke a data blast with repeating errors presented at the beginning of data. This error occurs because clock phases pattern is quite sensitive but can be overcome from scramblers ability to randomize data before their transmission [DCCN]. Figure 3 Scrambler block diagram [MATLAB] A scramblers block diagram is characteristically represented in Figure 3. As mentioned before, all adders perform a modulo-2 addition and switches in the schematic are defined by the implementing polynomial. In the case of a 56kbps modem the polynomial in use is: y(x) = 1 + x-18 + x-23 which reflects a self-synchronizing scrambling procedure yet bearing a feature of creating the handshake between the terminals. If transmission in the communication network is errorless then the descrambler will be able to translate the signal using the same polynomial contrarily. 5. Application of Matlab to simulate a 56kbps modems scrambler Matlabs Simulink toolbox can fulfill the potential of simulating a scrambler with all the adjustments required. Figure 4 enacts a full scrambling procedure from the signal generation to the scrambling feature and after that to the scope function. Figure 4 Scrambler simulation on Simulink Going deeper in this scheme analysis, a signal generator is situated at the beginning of the diagram. Bernoulis Binary Generator is using a distribution to produce a sequence of random 0s and 1s. In addition to that, a probability of P is applied to produce 0s and 1-P for 1s. The scrambler feature is using a scheme like the one represented in Figure 3 for its fundamental use and utilizes all polynomials capabilities. For example if the polynomial is y(x) = 1 + x-6 + x-8 then the data to be imported are: p = [1 0 0 0 0 0 1 0 1] and p = [0 -6 -8] [MATLAB]. Last, but not least, the scope widget where conclusive measurements can be extracted from all the previous signal processing. The most common test to be implemented in this simulating scheme would consider time and the input value of P. Particularly, P configures the quantity of 0s and 1s that will shape the outgoing stream of the binary generator. Speed of the user on the other hand in comparison with the real speed of the 56kbps modem is quite low, resulting a long stream of idle status or 0s. In the subsequent examination P will be given the value of 0.9 in order to have maximum possibilities for this stream to appear. Using the spectrum analyzer from Matlabs Simulink the following results of Figure 5 appeared.

Friday, October 25, 2019

Disneys Whitewashing of Pocahontas Essay -- Movie, Film 2014

In 1995, Disney produced a romanticized version of relationships between early Native Americans and Europeans in the film, Pocahontas. It is controversial whether this movie was intended to enlighten children about the beginning of America in a story-like manner, or a way to conceal a dark past and brainwash future generations with this illusion of a happy beginning to the United States of America. In order to make the Pocahontas and John Smith love myth suitable for children, it is understandable that Disney needed to alter the story. However, Disney's version of the Pocahontas myth is not only altered for the sake of violence, racial content, and ethnic content, it is also altered to be more appealing to Americans and to agree with their beliefs and culture. The film's purpose is controversial because there is a strong support for the European settlers and a lack of Native American culture shown. In addition, the little Native American culture that is shown, is not shown accurately. As a result, children across the nation are learning a distorted early American history through Pocahontas and sugar-coated songs taught in grammar school that share the same message. The most significant factor that a historical movie for children should have as opposed to an entertaining movie, is historical accuracy. This way, the film will be educational and will not give the audience false information to soak in. If the purpose of Pocahontas is in fact to educate, the film can be misconstrued as a brainwashing mechanism to hide the violence between two cultures because it gives a false interpretation of the Europeans and Native Americans's relationship. The reason for leaving the physical violence out of the... ... whether European and Native American, went through in order to gain a civil interaction with one another. By preparing American youth with the United States history that does not have gaps, they will be better prepared to comprehend when these topics are discussed more thoroughly in their higher levels of education. Works Cited Borthaiser, NÃ ³ra (2008). A Whole New World [Electronic Version]. Americana: E-journal of American Studies in Hungary, 4, 5-5. Dundes, Lauren (2001). Disney's Modern Heroine Pocahontas: Revealing Age-Old Gender Stereotypes and Role Discontinuity Under a Facade of Liberation [Electronic Version]. Giamo, Michael. Pocahontas. Disney, 1995. Film. Smith, John. From The Generall Historie of Virginia, New-England, and the Summer Isles. The Bedford Anthology of American Literature. Bedford: Boston, 2008: P. 110-119.

Thursday, October 24, 2019

Oleana as a Tragedy

Oleana presents many definitive traits that could categorise it as a tragedy. The most prominent is the presence of a ‘harnartia', executed by John. Harnartia is Greek terminology that translates literally to â€Å"missing the mark†, and was often used to depict the ‘Hero's fatal flaw. In the case of Oleana, it could be argued that John committed the fatal error' of breaching the lawful gap between teacher and student by â€Å"placing his arm around† Carol while trying to soothe her.This sentimental reaction is generally condoned by the audience, despite the legal implications, as the motional reasoning behind it temporarily clouds the unprofessional elements. Ultimately these actions result in a string of misfortune. Tragedies also have a reputation for elating the audience, and encouraging conflicting emotions for the characters. Such is arguably achieved, as Carol is portrayed as a youthful woman whom is insecure in her own academic abilities and correspo ndingly becomes a victim to John's crass, arrogant attitude as is shown by an extreme amount of ellipsis and interruptions in their earlier interactions.She is also strained by that of her own group' whom convince her to liberate the dramatic allegations that guarantied John's downfall. However, she is also represented as vindictive and headstrong, as is shown by her dialogue in the last act wherein she attempts to blackmail John into rebuking his book: â€Å"If you would like me to speak to the tenure committee, here is my list. You are a free person, you decide. John is firstly depicted as a brash and slightly aloof man with good intentions, but as the story develops, these quirks lose their initial romance and his character appears intrusive and pompous, due to his esquipedalian qualities. He dominates the conversation and ushers Carol repeatedly; an action which is generally regarded as being extremely derogatory and advocates the belief that his elder status gives him a right to be condescending.Even disregarding the fact that they are of opposite sexes, it is strenuous to reach a conclusive, untainted resolve, and thus the desired effect is achieved. It is common in tragedies to have a ‘reversal' of fortune; this could be aligned with John's looming loss of power, Job, home, and, effectively, life, due to Carol's persecution. A great deal of his loss is arguably down to John's insolent action of belittling the resonance of a higher power; in this case the Tenure Committee.He believes that they will revoke the statement, and thus foolishly provides Carol with more opportunities to amplify damning evidence. This is an unmistakable trait in variations of Tragedies, generally tagged ‘hubris', wherein the equilibrium is only achieved after the hero suffers for their imprudence towards the Gods. Lastly, a key feature in any play is the chorus; a seemingly detached group, whom gather to inflict Judgements and muse over the ighteousness of the chara cter's actions throughout.The most relevant comparison to this in Oleana is the presence of the telephone, and the confliction and distraction it brings. This ongoing chaos could possibly be interpreted as foreshadowing for the misfortune that John was fated to experience, or the general tone of condemnation regarding John's various inappropriate actions towards Carol. In conclusion, there are many connections that can be made between a typical tragedy production and Oleana, and it would be completely valid to place Oleana in that genre. Oleana as a Tragedy By saraelnairree

Tuesday, October 22, 2019

Free Essays on Plato - Philosopher King

Much of Plato’s reasoning for philosopher-rulers centres around his belief that society should be rational and just. It would be important to note that ‘justice’ as referred to by Plato in his work and by other philosophers at the time, does not directly compare with the modern meaning. ‘Justice’ as it was then, was more what today we would call ‘righteousness’ or ‘goodness’. The aims of this essay are to examine the reasons behind Plato’s beliefs and the extent to which they are justifiable for the modern day as well as for ancient Greece. Much of Plato’s work is written in the form of dialogues, with Socrates, Plato’s tutor, cast as the main character. It is sometimes not clear, â€Å"where Socrates finishes and Plato begins†. However, concerning the subject of philosopher-rulers, I believe this distinction is not necessary. References to Socrates, especially regarding Republic, can be taken as Plato’s beliefs expressed through the character of Socrates and not the man himself. It is also important to note at this time, that the poleis (singular polis), or city-states, were nothing like the modern day ‘city’. The closest modern comparison would be the nation-state and not the city. This essay will first see Republic as a discussion of justice. Plato’s conclusion of justice led him to differentiate individuals’ souls into three parts that he relates directly to the polis. This will be examined along with some of the criticisms offered. Following from this, Plato’s ‘theory of forms’, its basis and conclusions as well as its distinction from Aristotle’s views, will be discussed. Once Plato’s theoretical basis is laid down, the structure he applies to his state will also be considered. This uses the ‘three-parted soul’ as a framework, the polis being split into three ‘tiers’ with philosopher-rulers at the top. Reasoning, practicality and criticisms of this are all discussed. The... Free Essays on Plato - Philosopher King Free Essays on Plato - Philosopher King Much of Plato’s reasoning for philosopher-rulers centres around his belief that society should be rational and just. It would be important to note that ‘justice’ as referred to by Plato in his work and by other philosophers at the time, does not directly compare with the modern meaning. ‘Justice’ as it was then, was more what today we would call ‘righteousness’ or ‘goodness’. The aims of this essay are to examine the reasons behind Plato’s beliefs and the extent to which they are justifiable for the modern day as well as for ancient Greece. Much of Plato’s work is written in the form of dialogues, with Socrates, Plato’s tutor, cast as the main character. It is sometimes not clear, â€Å"where Socrates finishes and Plato begins†. However, concerning the subject of philosopher-rulers, I believe this distinction is not necessary. References to Socrates, especially regarding Republic, can be taken as Plato’s beliefs expressed through the character of Socrates and not the man himself. It is also important to note at this time, that the poleis (singular polis), or city-states, were nothing like the modern day ‘city’. The closest modern comparison would be the nation-state and not the city. This essay will first see Republic as a discussion of justice. Plato’s conclusion of justice led him to differentiate individuals’ souls into three parts that he relates directly to the polis. This will be examined along with some of the criticisms offered. Following from this, Plato’s ‘theory of forms’, its basis and conclusions as well as its distinction from Aristotle’s views, will be discussed. Once Plato’s theoretical basis is laid down, the structure he applies to his state will also be considered. This uses the ‘three-parted soul’ as a framework, the polis being split into three ‘tiers’ with philosopher-rulers at the top. Reasoning, practicality and criticisms of this are all discussed. The...

Monday, October 21, 2019

Reasons Why U.S. Maintains Dependence on Foreign Oil Import (2005)

Reasons Why U.S. Maintains Dependence on Foreign Oil Import (2005) In 2005, the United State imports about 60 percent of its oil from foreign countries, and this rate is still continuing to grow. Some experts predict that by the time 2020, the U.S. oil import rate will excess 70 percent or even more. Look back to the history, the U.S. imported only 42 percent oil of its consumption in 1980, and in 2000, this number has risen to 52 percent (Feldstein). That means the oil imported rate is not only just growing, but also might grow faster and faster when the oil demands is increasing. The rate is increased by almost 20 percent in 20 years even tough the government wants to reduce the U.S. dependence on foreign oil import even since 1970s. Today, most of the world's oil reserves are located in the Mid-east countries; most of these resources are controlled by the OPEC members. And the U.S imports big amount of oil form OPEC, such as Saudi Arabia.English: Kingdom Centre, Riyadh, Saudi Arabia. Tak...In addition, not only U.S., but also other big countries in the world, such as Japan and Spain, these countries are also increasing their oil import from OPEC. In a public opinion survey, many people point out that they are afraid the future price of oil might become a "serious threat to the nation's economy and jobs, as well as to its standard of living, the environment, and their national security"(SUN DAY Campaign). Lots of people argue that the dependence of the foreign oil import is bad for American economy. The government in the United Stated always wants to be more independently on its domestic oil production. However, although President George Bush says that hydrogen power will lead the U.S. to energy independence, in fact, from the information upon, we knew that the oil import rate will not...