Wednesday, August 21, 2019
RBG Colour Model Experiment
RBG Colour Model Experiment Introduction Color is a visual attribute of objects that results from the light they emit, transmit or reflect. [1] These colors give us the ability to appreciate things around us. With this, we can easily define or give meaning to the things we see almost every day. We can see these colors in paintings, surroundings, the food we eat, and almost everything, as almost everything has color. Electronic systems use different color models to represent data visually. [2] One of these color models is RGB color model. A color in RGB color model is expressed by how much of each red, green, blue is included [2], hence the acronym RGB. In this experiment, we lit the RGB LED with different colors in Arduino, with the use of RGB color model. Materials with Description DFRduino Uno R3 (1) The arduino circuit board. Jumper Cables M/M (4) Serves as the connector to different pins in the circuit. RGB LED (1) A diode that emits light and to be used as an output in the circuit. It provides different colors of light by setting its RGB (Red, Green, Blue) values. It consists of 3 anodes, one for each color in RGB, and one cathode. 220 ÃŽà © Resistor (3) An electric device that will control the flow of current through the circuit. Procedure (self-explained) Connect the components to the breadboard base on the tables below. Resistor Breadboard Start End A D9 G9 B D7 G7 C D6 G6 Table 1 Resistor Positions RGB LED Red Cathode(-) Green Blue Breadboard I9 I8 I7 I6 Table 2 RGB Led Position Jumper Wires Breadboard Arduino Start End 1 C6 DP 10 2 C7 DP 11 3 C9 DP 9 4 H8 GND Table 3 Jumper Wire Positions After plotting the components to the breadboard. Connect the USB cable to the computer and the circuit. Compile and upload the code. Circuit Diagram Code Code Analysis int redPin, greenPin, bluePin this code sets the pin numbers of each color from RGB LED to their respective pin slot in the Arduino. void setup(){à ¢Ã¢â ¬Ã ¦} a one-time initialization method. Set all redPin, greenPin, and bluePin as output by using pinMode(pin, pinType) built-in function. void loop(){à ¢Ã¢â ¬Ã ¦} a method that constantly iterates the statements inside the block. In this experiment, we created different colors, by generating random numbers from random(min, max) each color from red, green and blue. random(0, 255) a built-in function that generates random number from range 0 to 255. void colorRGB(int r, int g, int b){à ¢Ã¢â ¬Ã ¦} a user-defined method that accepts values of r, g, and b. This method is also responsible for assigning the values/colors for the pins of the RGB LED by using analogWrite(pin, value). When these colors are combined together, the RGB LED will create a different color based on the values of the RGB written by analogWrite(). constrain(value, min, max) a built-in function that checks whether value is in the range of min and max. If so, return the value. If value is greater than max, this function will return max. If value is less than min, this function will return min. This code is essential to check whether the value is less than 0 or greater than 255, as analogWrite can only accept values 0-255. Also, the color values for each color in RGB can only be 0 255. For example: R = 255,Ãâà G = 0, B = 255, this will create a violet color. delay(n); lets the circuit sleep or pause for n milliseconds. Comparison of Code vs. Hardware Output It is noticeable that the code controls and manages how will the hardware provide an output. It is also important that the pins used in the hardware should be the same in the code.Ãâà This experiment introduced a new kind of LED that can represent or display different colors. The RGB LED changes its color by using random number generation as part of the code, and setting those values to each color in RGB pins in the LED. Recommendation/Enhancement The experiment can be integrated in disco bars, to produce different colors of lights. This can be also used for medical purposes for people who may suffer color blindness. For example, an RGB LED, will produce colors, and the individual will describe the color he or she saw. A billboard composed of multiple RGB LEDs can be used to act like as pixels in a graphic image. [1] WordNet Search 3.1, [Online]. Available: http://wordnetweb.princeton.edu/perl/webwn?s=colorsub=Search+WordNeto2=o0=1o8=1o1=1o7=o5=o9=o6=o3=o4=h=. [2] RGB Color Model Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/RGB_color_model. [Accessed 9 January 2017].
Tuesday, August 20, 2019
Wireless Vulnerabilities Threats And Countermeasures Information Technology Essay
Wireless Vulnerabilities Threats And Countermeasures Information Technology Essay Introduction to Network Security maintains its focus on the network and its vulnerabilities, protocols, and security solutions. It includes network architecture, the functions of layers in a typical network, and network based attacks including header, protocol, and authentication attacks. Bottom-up approach, it provides understanding of the vulnerabilities and mechanisms of each layer of network security. In any stadium there is network security plan in order to control all the events occurred in the stadium like ticketing selling, consumable purchases, seating arrangement and others. By using the wireless technology and mobiles we can plan the top level network security in the plan, the steps taken in this are all the members in the wireless channel have one wireless mobile. From the mobiles all the members can give the information to channel that means it is a server. All the decisions taken by the empires are by the wireless only, the video channel also very much useful in controlling the stadium. Consider the cricket stadium Chinnaswamy, Cricket Stadium in Bangalore, INDIA. The boundary line of the stadium is marked by the rope and here the boundary line is called as the perimeter of the stadium having field diameter of 140 to 160 yards. Score board has to display scores and sometimes should work as a third empire for keen observation and all this setup should work with wireless technology because wired transmission cannot be implemented over there. This stadium with a seating capacity of 55,000. Features of the stadium: The entire stadium is equipped with the very sensitive digital cameras, short and long distance explosive detectors. Totally it have 29 closed circuit television cameras, in this 29 cameras five of them are very highly sophisticated which are having the 360 degree of vision and all these will covers all the corners of the stadium. Trained marshals will operate the 29 closed circuit television cameras (CCTV), nearly 20 trained marshals are there in the stadium. These marshals having the helmets which are with sensitive cameras and sensitive detectors which are capable for covering the explosives which are happened around of 300 meter, this is called as OSD(on-screen display) camera which in the helmet and it is directly connected to the CMS(central monitoring system) vehicle. This CMS vehicle is standing outside the stadium, so whatever the marshal see and do, each and every point of the stadium and things happening in the stadium are very clearly seen in the CMS (central monitoring s ystem) vehicle. The entire system works on SNMP(simple network management protocol). Total stadium can be seen in the CMS vehicle, and another important thing is that empires decisions for example take the out and not out decisions it can be displayed on the big digital screen. The runs taken by the both the teams will be displayed on the digital screen in stadium. At the heart of the modern stadium is a communications system capable of supporting the innovative new services and applications customers are looking for. Organizing and hosting events requires a complete communications foundation essential to satisfying the communication needs of fans, guests, corporate employees, service and security staff, event organizers, press and media. It is that to provide all the components needed to build a complete, converged, secure and reliable communications system. Security, communication and services are the main aspects at the stadiums now-a- days. The organizers and event managers should be able to satisfy the complete communications foundation essential to satisfying the communication needs of fans, guests, corporate employees, service and security staff, event organizers, press and media. And also the communication system which provides all the components needed to build a complete, secure and consistent communications system. Converged IP/Ethernet Core: Stadiums support the communications needs of events with much number of users. Moreover, the supporting infrastructure is shared by different groups with different needs including stadium corporate users, media and press and event promoters. It is important to the make the event successful with High-speed, consistent and secure communication which doesnt fails. With reliable, secure, high-performance, intelligent Ethernet connectivity the enterprise LANs can intelligently prioritize real-time business communications like voice, video and multimedia services. Voice communications: Voice communications are important in any environment and mainly in the stadiums. IP networks provide the strength and quality of service that voice service requires. Converging voice and data over IP maximizes network efficiency, streamlines the architecture, reduces capital and operating costs, and opens up new service opportunities. It would be secure for organizations of all sizes to use voice over IP (VoIP), with IP PBXs (Private Branch Exchange). Today the global markets have a complete variety of IP phones, including desktop phones with displays, rugged wireless handsets, and PC-based softphones. All of these access devices operate seamlessly across the range of IP-enabled platforms and applications. Mobility: The nature of the stadium environment is mobile. Staff move constantly on making the event successful and provide the security at the top level. For the users, it is essential to have the access to key information and communication tools and allows them to roam and remain in touch no matter where they are. In WLAN IP Telephony services, we have a large choice of mobile desktops and handsets. Voice calls can be placed from laptops or PDAs(Personal Digital Assistant) using soft phones and employees can be equipped with voice over WLAN handsets that support multiple functions extremely useful for stadium staff, such as text messaging, conferencing and a push-to-talk feature that allows groups of handsets to behave as walkie-talkies. With this, the good coverage can be assured in areas which are difficult to reach with public areas. Wireless Mesh Network extends the reach of Wireless LANs securely and cost-effectively for situations where cabling for the LAN network is not in place or too costly to deploy. Implementing new Technologies With a comprehensive communications infrastructure as the base, stadiums have the foundation on which to build an intelligent environment filled with new, media-rich applications and services capable of creating new revenue opportunities and improving the overall fan experience. Wireless ticketing kiosks: Premium seats for sporting events and concerts can be expensive. Stadiums can leverage wireless technology to implement standalone, mobile kiosks that attract fans to upgrade their existing tickets for an event onsite. Digital signage directs patrons to the kiosk during the event. The fan simply inserts his ticket, checks a map of available seats, uses a touch-screen to select the new seat and inserts his credit card to pay. The machine keeps the old ticket and provides the upgrade. The stadium fills the seats closer to the action and generates revenue that would have been lost. It creates a win-win for the guest, the team and the stadium. Stadium owners can use the same kiosk to encourage customers to buy tickets for future events while guests are onsite and in the mood to buy. The kiosk can advertise upcoming events and attract fans waiting to exit after watching a game or seeing a concert. The terminal shows a list of available events and allows users to follow the same simple steps to purchase a ticket. Additionally, stadium owners can use the kiosk to capture and collect valuable information about its customer base. The kiosk can advertise loyalty programs and contests that offer incentives for fans to provide personal data that helps the stadium better understand and communicate with its audience base. Public safety and security: With thousands of people attending major events at one time, public safety and security is critical. Stadiums can leverage the communications system to offer digital security options including digital video surveillance and RFID (Radio-Frequency Identification) tagging and tracking. For example, stadiums can improve security threat detection with high-resolution IP cameras that provide full surveillance of the crowd using pre-sets by section: operators can select a stadium section and automatically receive all video from that section in multiple views. Operations staff can set rules to govern detection of left bags, perimeter entry, threshold crossing and loitering receiving alarms if any of the rules are breached Stadiums can improve event response through video feeds and text alerts that are transmitted manually or automatically to remote PDAs, laptops or offsite responders. All responders can be linked together automatically via dedicated audio conferencing channel. RFID tags can be used to locate and dispatch the closest security personnel to an emergency situation, ensuring a timely response. ABOUT NETWORK SECURITY AND TO FIND THREATS Vulnerabilities, Threats and Countermeasures Wireless networking has many advantages. Network configuration and reconfiguration is easier, faster, and less expensive. But, wireless technology creates new threats and alters the existing information security risk profile. Wireless networking alters the risks associated with various threats to security, the security objectives remain the same as with wired networks, preserving confidentiality, ensuring integrity, and maintaining availability of the information and information systems. Wireless Networks present a host of issues for network managers. Unauthorized access points, broadcasted SSIDs, unknown stations, and spoofed MAC addresses are just a few of the problems addressed in WLAN troubleshooting. Wireless Vulnerabilities, Threats and Countermeasures The wireless networks consist of four basic components: The transmission of data using radio frequencies; Access points that provide a connection to the organizational network and/or the Client devices (laptops, PDAs) and Users. Each of these components provides an avenue for attack that can result in the compromise of one or more of the three fundamental security objectives of confidentiality, integrity, and availability. Wireless Network Attacks Malicious association Malicious associations are when wireless devices can be actively made by crackers to connect to a network through their cracking laptop instead of a access point (AP). These types of laptops are known as soft APs and are created when a cracker runs some software that makes his/her wireless network card look like a legitimate access point. Once the cracker has gained access, he/she can steal passwords, launch attacks on the wired network, or plant trojans. Since wireless networks operate at the Layer 2 level, Layer 3 protections such as network authentication and virtual private networks (VPNs) offer no barrier. Wireless 802.1x authentications do help with protection but are still vulnerable to cracking. The idea behind this type of attack may not be to break into a VPN or other security measures. Most likely the cracker is just trying to take over the client at the Layer 2 level. Ad-hoc networks Ad-hoc networks can pose a security threat. Ad-hoc networks are defined as peer-topeer networks between wireless computers that do not have an access point in between them. While these types of networks usually have little protection, encryption methods can be used to provide security. Identity theft (MAC spoofing) Identity theft (or MAC spoofing) occurs when a cracker is able to listen in on network traffic and identify the MAC address of a computer with network privileges. Most wireless systems allow some kind of MAC filtering to only allow authorized computers with specific MAC IDs to gain access and utilize the network. However, a number of programs exist that have network sniffing capabilities. Combine these programs with other software that allow a computer to pretend it has any MAC address that the cracker desires, and the cracker can easily get around that hurdle. Man-in-the-middle attacks A man-in-the-middle attacker entices computers to log into a computer which is set up as a soft AP (Access Point). Once this is done, the hacker connects to a real access point through another wireless card offering a steady flow of traffic through the transparent hacking computer to the real network. The hacker can then sniff the traffic. One type of man-in-the-middle attack relies on security faults in challenge and handshake protocols to execute a de-authentication attack. This attack forces AP connected computers to drop their connections and reconnect with the crackers soft AP. Man-in-the-middle attacks are enhanced by software such as LANjack and AirJack, which automate multiple steps of the process. What once required some skill can now be done by script kiddies. Hotspots are particularly vulnerable to any attack since there is little to no security on these networks. Denial of service A Denial-of-Service attack (DoS) occurs when an attacker continually bombards a targeted AP (Access Point) or network with bogus requests, premature successful connection messages, failure messages, and/or other commands. These cause legitimate users to not be able to get on the network and may even cause the network to crash. These attacks rely on the abuse of protocols such as the Extensible Authentication Protocol (EAP). Network injection In a network injection attack, a cracker can make use of access points that are exposed to non-filtered network traffic, specifically broadcasting network traffic such as Spanning Tree (802.1D), OSPF, RIP, and HSRP. The cracker injects bogus networking re-configuration commands that affect routers, switches, and intelligent hubs. A whole network can be brought down in this manner and require rebooting or even reprogramming of all intelligent networking devices. Signal-Hiding Techniques In order to intercept wireless transmissions, attackers first need to identify and locate wireless networks. There are, however, a number of steps that organizations can take to make it more difficult to locate their wireless access points. The easiest and least costly include the following: Turning offthe service set identifier (SSID) broadcasting by wireless access points, Assign cryptic names to SSIDs, Reducing signal strength to the lowest level that still provides requisite coverage or Locating wireless access points in the interior of the building, away from windows and exterior walls. More effective, but also more costly methods for reducing or hiding signals include: Using directional antennas to constrain signal emanations within desired areas of coverage or Using of signal emanation-shielding techniques, sometimes referred to as TEMPEST, 1 to block emanation of wireless signals. Encryption The best method for protecting the confidentiality of information transmitted over wireless networks is to encrypt all wireless traffic. This is especially important for organizations subject to regulations. Securing Wireless Access Points Insecure, poorly configured wireless access points can compromise confidentiality by allowing unauthorized access to the network. Use anti-virus and anti-spyware software, and a firewall Computers on a wireless network need the same protections as any computer connected to the Internet. Install anti-virus and anti-spyware software, and keep them up-to-date. If your firewall was shipped in the off mode, turn it on. Change your routers pre-set password for administration The manufacturer of your wireless router probably assigned it a standard default password that allows you to set up and operate the router. Hackers know these default passwords, so change it to something only you know. The longer the password, the tougher it is to crack. Allow only specific computers to access your wireless network Every computer that is able to communicate with a network is assigned its own unique Media Access Control (MAC) address. Wireless routers usually have a mechanism to allow only devices with particular MAC addresses access to the network. Some hackers have mimicked MAC addresses, so dont rely on this step alone. Training and Educating Users Notice that Figure 1 also includes users as the fourth basic component of wireless networking. As is the case with wired security, users are the key component to wireless networking security. Indeed, the importance of training and educating users about secure wireless behavior cannot be overstated. To be effective, user training and education needs to be repeated periodically. The Security Policy To maintain a secured wireless network security, we need to apply these policies, so that the wireless network can be protected by the major threats and vulnerabilities. Computer Acceptable Use. A general document covering all computer use by eventstaff, including desktop, mobile, home PCs, and servers. Password. A description of the requirements for password protecting computer systems, the rules for choosing passwords, and how the password policy is enforced. Email. This policy covers the use of email sent from any email address and received at any computer system. Web. A specification of what browsers may be used, how they should be configured, and any restrictions on which sites event staff can visit. Mobile Computing and Portable Storage. A description of who owns the mobile computing and portable storage on the network, how they are supported, and what specific devices (if any) are authorized for use on the network. Remote Access. A policy stating who can access what information from which locations under what circumstances. Internet. A description of your Internet-facing gateway configuration, stating what is allowed in and out, and why. Wireless. A specification stating how wireless access will be managed on the network and how access points will be plugged in, secured, and maintained; who is allowed to use them; and under what circumstances. Servers. A statement of the standards for servers, what services are enabled or disabled by default, and important distinctions between production, test, and development environments. Incident Response Plan. No policy is complete until it also specifies what to do when defenses fail: what is considered a security incident; who gets called; who is authorized to shut things down if needed; who is responsible for enforcing applicable local laws; who speaks for the company. Standards: Workstations: Approval for workstation connection must be obtained as part of the standard workstation installation process handled by Information Technology Services, or authorized departmental technical personnel. Other devices (including, but not limited to, network components such as hubs, routers, switches, wireless access points, printers and other communication devices): Approval to connect devices other than workstations must be expressly obtained from Information Technology Services/Network Services. Vendors/visitors can obtain a physical connection access to the University network through Information Technology Services on a per visit basis. This access will be granted for a specific period of time Mail servers may not be run outside of Information Technology Services. Guidelines: Accounts Definition and use of departmental accounts and shared accounts should be restricted as much as possible. Only those functions needed by the user should be made available through such accounts. Servers 1. SSL should be implemented on Web servers if account log-in is required. 2. Run intrusion detection system where appropriate 3. Store backups offsite on a monthly basis. 4. Install firewall system where appropriate 5. Application updates must be performed every 30 days. 6. Run file integrity checker such as Tripwire daily. 7. Periodically test backups for integrity. Passwords 1. should not use any words found in dictionary of any language 2. should not use any combination of letters of a users real name, username, initials or nickname 3. should not use any combination of a famous persons name 4. should not use any combination of a spouses, girlfriends, boyfriends, or childs name 5. should not use any personalized numbers Workstations 1. Turn off workstations overnight. 2. Work-related files should be stored on the Novell cluster in the staff members home directory or the departments work directory 3. Implement periodic backups 4. Logging: a. should be enabled to record: i. successful and unsuccessful login attempts. ii. system and application errors. CONCLUSION: We introduce the top level network security plan in the stadium to control the things happening. So by this we can create the safe atmosphere to the audience in the stadium. We can prevent the things inside the stadium only but out side the stadium we cant, so the government have to come forward and give the external security to the stadium. Because of the terrorism attacks the government has to be very careful in giving the security to the stadium. For this each and every person who entering into the stadium is first checked with bomb squad and also by the wireless detector. By this we can provide the safety to people and the players in the match.
Monday, August 19, 2019
The Relationship between Rhetoric and Social Conflict :: essays research papers
The Relationship between Rhetoric and Social Conflict In society there are daily occurrences that happen as a result of rhetoric, which then question and mold our individuality. How we react to these responses define us as a society and can then cause us to have a conflict socially. These occurrences challenge our perceptions allowing us to think independently about each issue. Without the linkage of rhetoric and conflict, we would have a difficult time justifying our understanding of these issues. A reaction to rhetoric can also characterize us from each other in a way that creates a singular identity. This individuality combined with the identities of others, make up our community and allow rhetoric and conflict to occur almost naturally. To further explain why rhetoric and conflict are so important we must understand the importance of this issue, in trying to relate everyday activities as examples of rhetoric and conflict. Our Society creates certain rhetorical ideologies, which are contained in social institutions, such as churches, communities, or clubs, in which conformity is a must. These ideologies bring people together to stand behind a common interest and fight for their own beliefs, morals, and values. It is when these social institutions collide with each other that social conflict is formed and problems arise. In order to understand the relationship between rhetoric and social conflict one must be able to define these terms adequately. Rhetoric is the ability to use words effectively in order to receive a response that is either positive or negative. To create a positive response, a person might appeal to the emotions of another who is sympathetic to the situation or who is currently involved with the same experience. They may use familiar experiences and memories to help the response take its shape. An example of this would be in the article ' The Cigarette as Representational Ideograph in the Debate over Environmental Tobacco Smoke'; by Mark Moore. Moore describes both sides of this controversy of smoker and antismoker rights, but when reading this article both sides are conformed to their own beliefs and support them quite well. 'Smokers discuss their rights as an American and their right to liberty, while anti-smoking activists talk about the hazards of second hand smoke discovered by scientific knowledge'; (Moore 48). The ideas of both sides make up an ideology, which is expressed over and over again through their justifications. Only a smoker can sympathize with a fellow smoker when explaining the right to be able to smoke in public.
Sunday, August 18, 2019
Macbeth: A Noble and Highly Respected Figure In Ducans Reign :: Macbeth essays
Macbeth: A Noble and Highly Respected Figure In Ducan's Reign Macbeth was a noble and highly respected figure in King Duncan's reign. He lived a brave and honest life, serving the King and his country against evil. The Tragedy of Macbeth occurred when the weird sisters met Macbeth for the first time. An evil mind took over Macbeth, and he was doomed to the witches prophesies until his death. Macbeth was a General of the King's army, and served the King with honor and dignity. After success in the battle against the Thane of Cawdor, which was Macbeth's final serving for King Duncan, Banquo and he met with the King. Banquo was commended, and "To make thee full of growing. - Noble Banquo" (Act 1 Scene 4); but Macbeth was given all the credit, and titled "My worthy Cawdor!" (Act 1 Scene 4), Thane of Cawdor for his service. It was during this scene, where Duncan announced Malcom as his future successor, that Macbeth's thoughts became evil obsessions. A power was taking over him, his own flaw from evil, brought about by the weird sisters. "Stars, hide your fires, Let not the light see my black and deep desires." (Act 1 Scene 4). Macbeth's flaw is highly influenced by his wife, Lady Macbeth, who has wicked thoughts, and persuades Macbeth into many actions he would not normally do. "Only look up clear: To alter favour ever is to fear. Leave all the rest to me" (Act 1 Scene 5) shows her strength over Macbeth. As Macbeth prepares to kill Duncan, he hallucinates, and many thoughts cross his mind, but when the bell sounds, "Hear it not, Duncan, for it is a knell That summons thee to heaven or to hell." (Act 2 Scene 2) and Macbeth acts promptly. After the murder Macbeth regrets his actions, but again Lady Macbeth is influential toward him, reminding his that "These deeds must not be thought After these ways; so, it will make us mad." (Act 2 Scene 2). Macbeth's true self again break through when he has false thoughts about his actions. "Had I but died an hour before this chance I had lived a blessed time; for, from this instant, There's nothing serious in mortality. All is but toys; renown and grace is dead, The wine of life is drawn, and the mere lees Is left this vault to brag of." (Act 2 Scene 4). All the confusion surrounding Macbeth has prompted him to make some errors. He did not place the daggers on the guards after the murders, and then before anybody was able to talk to the
Saturday, August 17, 2019
Ifugao
Ifugao Ifugao is a province of the Philippines in the Region of Luzon. It is located in a mountainous region characterized by rough landscape, river valleys and massive forests. Banaue Rice Terracesà are the main tourist attractions in the province. These terraces were artificially made by man and without the use of machinery. Level steps were provided so the natives can plant rice. During harvest time, the women are the ones incharge, while the men are incharge of cooking the food for the women after planting.The Ifugaoââ¬â¢s are known for their weaving crafts and basketry. These are tasks done only by the women. Traditionally, weaving is done for family needs, but it is also done for commercial purposes. The men are skilled wood carvers and metal workers. Wedding ceremonies are performed traditionally in which selected elders will carry out the ceremony to wed the new couple. This traditional wedding ceremony has also a lot of practices.But generally, the ceremony is being don e in the house of the bride in which the selected old people guided by an anointed elder priest, known as the Mumbaki, will butcher animals then sing the traditional wedding verses. After that, the old people will perform traditional dances in front of the newly-wed couple. Throughout the wedding, family members and relatives will join and perform native dances. The Ifugaoââ¬â¢s practice a number of rituals.Some of these rituals are Hingot, the ritual which announces the coming together of two families;à Amung, a sacrificial ritual wherein the gods and the family's ancestors are asked to make the body healthy, the mother well and strong, and the family wealthy;à Uya-uy, a ritual of feasting;à Ketema, a ritual thatââ¬â¢s supposed to identify the spirit who caused a certain sickness. Ayag; andà Kolot, a ritual for the first cutting of child's hair. They also practice rituals during planting and harvestation. In general, these rituals were prayers and requests to the gods .
Philosophy essay on sollicitudo rei socialis
A.à à à à à à à Summary of ââ¬Å"Sollicitudo rei socialisâ⬠John Paul II's message entitled ââ¬Å"Sollicitudo rei socialisâ⬠à speaks to the Catholic church's role in helping make better pressing social issues of the day, primarily poverty.à He breaks this topic down into six parts:à an Introduction, Originality of the encyclical Populorum Progressio, Survey of the Contemporary World, Authentic Human Development, A Theological Reading of Modern Problems, Some Particular Guidelines, and a Conclusion.In the Introduction, the Pope tells the reader that this piece was written to pay honor to Paul VI's encyclical ââ¬Å"Populorum Progressio,â⬠also called ââ¬Å"The Development of Peoples,â⬠which had been written twenty years earlier in 1967.à An encyclical is a letter to members and priests of the church written by the Pope.à In the ââ¬Å"Populorum Progressio,â⬠Paul VI says that unless justice and morality rule, the poor will neve r get the help they need.à Now twenty years later, Pope John Paul II sent a letter out to churches to get feedback on how best to celebrate the anniversary of the encyclical.à ââ¬Å"Sollicitudo rei socialisâ⬠are his findings.à He also wants to pay honor to the original document and to show the value of church teachings because of the ââ¬Å"continuity and renewalâ⬠of the ideas in the encyclical.In the Originality of the encyclical Populorum Progressio portion, John Paul II says that the encyclical is a how-to guide for the church to follow and it is based on the teachings of the second Vatican Ecumenical Council of 1965, which talks about poor people and what the church should do about ââ¬Å"the development and underdevelopment of peoples.â⬠à People's development is based in moral and educational solutions provided by the church.à He believes that development is a global issue.à Rich countries have a responsibility to poor countries to not be gre edy with resources, because poor countries do not have as much access to the things they need to live.à The 1967 document concludes by saying that ââ¬Å"Development is the new name for peace.â⬠à The logic behind this is that the poor want justice.à For them, justice is getting their fair share of the supplies needed to live, and if they do not, it leads to violence.In his ââ¬Å"Survey of the Contemporary World,â⬠à John Paul II cites that poverty still exists because the Northern Hemisphere has easy access to supplies, while the Southern Hemisphere has slow access, even though this is where most of the world's population lives.à Poverty is a result of a lack of educational opportunities, jobs, as well as economic and racial discrimination, all of which go along with underdevelopment.He believes that ââ¬Å"Authentic Human Developmentâ⬠needs to be ââ¬Å"guided by a moral understanding.â⬠à A person must be developed morally, not just economical ly, in order for the growth to be authentic.à The church has a responsibility to aid in human development.His ââ¬Å"Theological Reading of Modern Problemsâ⬠tells that even though people can develop through science and technology, it must be grounded in morality as taught by the church.à Certain ââ¬Å"Guidelinesâ⬠should be followed, so that the church can do its work and people are treated with dignity.à The poor should be treated with preference, but they also have to contribute to their own development.à John Paul II, in his ââ¬Å"Conclusion,â⬠states that the church, as part of its moral requirement, can work together to help the poor develop into more fully human beings.B.à ReflectionJohn Paul II's main point is the place of morality as taught by the church to help get rid of human poverty.à I would agree that what a person or country values is based in their morality, and this helps motivate a person or group to action.à I also agree that rich countries have an obligation to assist poor countries so that their citizens have enough food, clothing, shelter, health care and education to do more than just survive, but to thrive.à However, I do not think that the Catholic Church has the corner on the morality market, especially in light of all the child molestation charges against priests.à Also, the only woman who is not marginalized in the Catholic Church is Mary, which is a problem if you are trying to bring your ââ¬Å"moralityâ⬠to aà culture that may or may not have your sense of morality and may actually value women.How moral can a group be that considers women to be essentially chattel who should not have control over their own bodies, but instead should put their spiritual and health care in the hands of their husbands and child-molesting priests?à How moral is a group that demands that a woman who has been raped, even by a male member of her family, should be required to carry the embryo to ter m in order to remain moral?à The Pope himself may indeed be à a moral man, but there are several in his ââ¬Å"churchâ⬠who cannot say the same, and who provide a wayward compass to guide people who really want to help the poor.Work CitedPope John Paul II. Sollicitudo rei socialis. (Vatican City: Libreria Editrice Vaticana, 1986).URL:http://www.vatican.va/holy_father/john_paul_ii/encyclicals/documents/hf_jpii_enc _30121987_sollicitudo-rei-socialis_en.html à Accessed 23 May 2007.
Friday, August 16, 2019
The Effects of Mindfulness Based Stress Reduction
RESEARCH METHODOLOGY HMPYC80 ASSIGNMENT 02-03 RESEARCH PROPOSAL TITLE: THE EFFECTS OF MINDFULNESS BASED STRESS REDUCTION TRAINING ON ADOLESCENT SELF-AWARENESS AND THE REDUCTION OF ANXIETY, DEPRESSION AND STRESS. AUTHOR: 5888743 RESEARCH METHODOLOGY HMPYC80 ASSIGNMENT 02-03 RESEARCH PROPOSAL TITLE: THE EFFECTS OF MINDFULNESS BASED STRESS REDUCTION TRAINING ON ADOLESCENT SELF-AWARENESS AND THE REDUCTION OF ANXIETY, DEPRESSION AND STRESS. AUTHOR: 5888743 Mr P Smith The ANIKA Foundation 234 West Highland Drive Newport 2843 Australia 1 May 2011 Dear Sir, Re: Research Proposal: THE EFFECTS OF MINDFULNESS BASED STRESS REDUCTION TRAINING ON ADOLESCENT SELF-AWARENESS AND THE REDUCTION OF ANXIETY, DEPRESSION AND STRESS. I am currently studying Psychology Honourââ¬â¢s at the University of South Africa. I am a school counsellor at a private school in Sydney where I work with children from Year K through to year 12. I have a keen interest in Adolescent mental health and suicide prevention.The Department of Mental Health at the World Health Organisation states that: ââ¬Å"WHO figures clearly show that by 2030 depression will be the single biggest burden of care on our health care system, exceeding cardio vascular disease and obesityâ⬠. It is becoming increasingly more urgent to look at preventative strategies to reduce the number of young people presenting with depression, anxiety and stress. I understand that the ANIKA Foundation was set up in response to the tragic death by suicide of your daughter Anika.The purpose of foundation is to support and promote the prevention of anxiety and depression in young people. Mindfulness Based Stress Reduction training has been shown to develop the capacity to: â⬠¢Consciously act and respond with awareness and clarity rather than react out of a habitual pattern â⬠¢Bring greater concentration and focus to daily activities â⬠¢Monitor levels of stress and distress, and take effective steps to address them â⬠¢Positi vely take action to renew your energy ââ¬â physically, emotionally and mentally.It therefore seemed appropriate to contact you with information about my proposed research topic to see if you would be interested in this new area of prevention. I look forward to hearing from you soon Yours Sincerely 5888743 Psychology Honours student and school counsellor. RESEARCH METHODOLOGY HMPYC80 ASSIGNMENT 02-03 RESEARCH PROPOSAL TITLE: THE EFFECTS OF MINDFULNESS BASED STRESS REDUCTION TRAINING ON ADOLESCENT SELF-AWARENESS AND THE REDUCTION OF ANXIETY, DEPRESSION AND STRESS. AUTHOR: 5888743 IntroductionMy experience as a School Counsellor along with current research coming out of the World Health organization indicates that by 2030 depression will be the single biggest burden of care on our health care system, exceeding cardio vascular disease and obesity. It is becoming increasingly more urgent to look at preventative strategies to reduce the number of young people presenting with depressio n, anxiety and stress. Mindfulness Based Stress Reduction (MBSR) is part of an exciting new field in psychology that combines ancient wisdom with modern day knowledge. The associated field ofPositive Psychology looks not only at the elimination of negative mental states but also at ways in which we can understand how people grow and flourish. Mindfulness Based Stress Reduction training has been shown to develop the capacity to: â⬠¢Consciously act and respond with awareness and clarity rather than react out of a habitual pattern â⬠¢Bring greater concentration and focus to daily activities â⬠¢Monitor levels of stress and distress, and take effective steps to address them â⬠¢Positively take action to renew your energy ââ¬â physically, emotionally and mentally.MBSR strategies based on the ancient Buddhist practice of mindfulness and meditation, seek to give people the tools to develop self-awareness in order to be able to identify the different emotions that present themselves during our lifetime. And then respond to those emotions is a way that is constructive rather than destructive. The way that we think and feel about things profoundly affects the way we act in the world, so it is important to be able to recognize the feelings and thoughts that arise habitually in our lives. Research Problem A literature review indicates that MBSR has been researched quiet extensively in the medical field.The literature shows very promising results with researchers finding significant reductions in stress, anxiety and depression after participants completed MBSR training. 1,2,3, In another study, normal healthy working adults who participated in Mindfulness based stress reduction (MBSR) training, showed improvement in behavioural, psychological, and physiological outcomes measured. This study assessed the effects of a shortened (low-dose [ld]) work-site MBSR intervention (MBSR-ld) on indicators of stress in healthy working adults to determine if results sim ilar to those obtained in traditional MBSR could be demonstrated.Participants were randomized into MBSR-ld and wait-list control groups. Self-reported perceived stress, sleep quality, and mindfulness were measured at the beginning and end of the 6-week intervention. Salivary cortical was assessed weekly. Significant reductions in perceived stress (p = . 0025) and increases in mindfulness (p = . 0149) were obtained for only the MBSR-ld group (n = 22). Scores on the global measure of sleep improved for the MBSR-ld group (p = . 0018) as well as for the control group (p = . 0072; n = 20). There is however at this time no literature available on the effects of teaching MBSR to adolescents, in a school setting as part of the PDHPE curriculum. This research may unlock the door to an exciting field of preventative psychology in youth mental health. What we consider stressful or what causes us to feel ââ¬Ëmadââ¬â¢, ââ¬Ëbadââ¬â¢ or ââ¬Ësadââ¬â¢ varies from one person to anot her. But any negative state can have a profound effect on the way we function in our day-to-day lives. Left unacknowledged or untreated it can develop into Stress, Anxiety or Depression.Very simply one of the first impacts of practicing mindfulness can be the capacity to move out of an aroused, activated, stressed state into a calmer, reflective more regulated state. This relaxed state ââ¬â called the parasympathetic state shows in responses such as slowing down of the heart rate, increased expiration, relaxation of the muscles, increased digestive activity and recuperation and rest. Many of us spend time in our sympathetic branch of our nervous system that prepares us for active engagement. It is associated with emotions such as anger, rage and fear as well as joy, excitement and interest.This is commonly known as the fight or flight response, our hard wiring for survival. However ongoing and excessive fight/flight response that is not regulated or modulated can lead to increas ed cortisol levels creating stress and distress. By cultivating in the students an innate capacity to ââ¬Ëpay attentionââ¬â¢ on purpose, in the present moment in a non-judgmental way, we can hopefully decrease overall levels of stress, anxiety and depression. Research Design The study will include both qualitative and quantitative methods to assess the efficacy of the MBSR program.The study will include 42 year 9 students, aged 14 -15 years. They will participate in an 8 week program where they will learn techniques of mindfulness and meditation. The course will be taught in conjunction with the personal health and development curriculum (PDHPE). The quantitative part of the research includes two surveys. The surveys will be administered before the training begins, at the completion of the course and then again 6 months later. This methodology is useful as it quantifies variables by making them empirically observable, and makes replication and retesting plausible.Survey 1: The DASS (Depression, Anxiety and Stress Questionnaire) developed by Peter Lovibond from the University of New South Wales. The DASS is a set of three self-report scales designed to measure the negative emotional states of depression, anxiety and stress. The DASS was constructed not merely as another set of scales to measure conventionally defined emotional states, but to further the process of defining, understanding, and measuring the ubiquitous and clinically significant emotional states usually described as depression, anxiety and stress.The DASS should thus meet the requirements of both researchers and scientist-professional clinicians. 5 Survey 2: The Self-Assessment Questionnaire: The MAAS (Mindfulness Awareness Attention Scale) is a 15-item scale designed to assess a core characteristic of dispositional mindfulness, namely, open or receptive awareness of and attention to what is taking place in the present. The scale shows strong psychometric properties and has been validated w ith college, community, and cancer patient samples.Correlational, quasi-experimental, and laboratory studies have shown that the MAAS taps a unique quality of consciousness that is related to, and predictive of, a variety of self-regulation and well-being constructs. The measure takes 10 minutes or less to complete. 6 Both surveys will be administered electronically and the student response will be anonymous. Although the data gathered will be intra-personal in nature, the trends being assessed will be more general. The data will be analysed electronically and will give me and overall level of the participating studentââ¬â¢s self-awareness, depression, anxiety and stress.This will be compared to the surveys conducted at the end of the 8 weeks as well as those in 6 monthsââ¬â¢ time. The qualitative aspect of the research will be the weekly small discussion groups. As the students move through the training they will have opportunity to give feedback through semi structured inter views. The qualitative information gathered will give me evidence of trends and patterns emerging. I will rely primarily on interviews and observations. ââ¬Å"the analyses produced by qualitative researchers most often are narratives and are based on words used by informants to describe their life experiences. Royce, 2004. Pg 237) In terms of sampling, it would be ideal if I could have a control group in which I could randomly assign half of the group, however unless the control group could have the opportunity to participate in the training at a later stage, this would in fact be unethical and unfair. Given the constraints of a school curriculum, this would also be very difficult. If the initial results coming out of the pilot program were promising then it would be prudent to run the program again with a control group. This would enhance the reliability and validity of the initial results.Data Analysis The study will use qualitative and quantitative research methodology. Creswell (1998, pg 15) defines qualitative research as ââ¬Å"an inquiry process of understanding based on distinct methodological traditions of inquiry that explore a social or human problem. The researcher builds a complex holistic picture, analyses words, reports detailed views of informants and conducts the study in a natural setting. â⬠The small weekly discussion groups will give me an opportunity to provide detailed and dynamic feedback on both individual and group process.Terre Blanche, Kelly and Durrheim (2006, pg 273-274) describe this as interpretative research, interested in experiences, feelings and meaning. The interviews will be semi structured, and developed according to data collected from the previous week and current literature. All interviews will be transcribed. The intention behind the analysis of the transcripts will be to extract a common narrative There are no costs associated with my research at this time. Ethics and expected Outcomes The children will be give n permission slips and consent forms to take home to be signed by their parents.At all times the welfare of the children will be monitored and they will have access to the support of the school counsellor and the PDHPE staff. All participants will be given a letter explaining the idea behind the program. The online surveys will be anonymous and data transcribed from the semi structured interviews will be anonymous and made available to the students should they wish to see the transcripts. The students will be re-surveyed in 6 monthsââ¬â¢ time to assess whether the program has had sustainable effects. There are expected short term and long term outcomes for this research.In the short term we hope that the children will learn to meditate and make meditation and mindfulness part of their everyday routine. Obviously we hope they will also reach the goals they set for themselves on a physical level. In the long term we are hoping that the skill that they learn during this 8 week progr am will be the inoculation and thereby increased resilience that they will need for the upcoming stress associated with their HSC (Matric), and all of the other life stressors going forward. Literature Review 1.Impact of mindfulness-based stress reduction (MBSR) on sleep, mood, stress and fatigue symptoms in cancer outpatients: Linda E. Carlson and Sheila N. Garland 2. A qualitative study of self-perceived effects of mindfulness-based stress reduction (MBSR) in a psychosocial oncology setting: Michael J. Mackenzie1, Linda E. Carlson1,2,*, Marleny Munoz1, Michael Speca1,2 Article first published online 28 NOV 2006 3. Randomized controlled trial of mindfulness-based stress reduction (MBSR) for survivors of breast cancer: Cecile A. Lengacher1, Versie Johnson-Mallard1, Janice Post-White2, Manolete S. Moscoso1, Paul B.Jacobsen3, Thomas W. Klein4, Raymond H. Widen4,5, Shirley G. Fitzgerald1, Melissa M. Shelton1, Michelle Barta1, Matthew Goodman6, Charles E. Cox3,4, Kevin E. Kip1,* Article first published online: 20 FEB 2009ne: 28 NOV 2006 4. Effects of Low-Dose Mindfulness-Based Stress Reduction (MBSR-ld) on Working Adults: Maryanna D. Klatt, PhD. College of Medicine, The Ohio State University, Columbus, klatt. [emailà protected] eduJanet Buckworth, PhD. College of Education and Human Ecology, The Ohio State University, Columbus William B. Malarkey, MD. College of Medicine, the Ohio State University, Columbus Scales 5. Lovibond, S. H. Lovibond, P. F. (1995). Manual for the Depression Anxiety Stress Scales. (2nd. Ed. ) Sydney: Psychology Foundation. ISBN 7334-1423-0. Lovibond, P. F. & Lovibond, S. H. (1995). The structure of negative emotional states: Comparison of the Depression Anxiety Stress Scales (DASS) with the Beck Depression and Anxiety Inventories. Behaviour Research and Therapy, 33, 335-343. 6. Mindful Attention Awareness Scale (MAAS) Kirk Warren Brown, Ph. D. & Richard M. Ryan, Ph. D. References 1. Cresswell, J. W. (1998) Qualitative inquiry and research design: Choosing among 5 traditions. Thousand Oaks: Sage Publishers 2. Kelly, K. 2006) From encounter to text: collecting data in qualitative research. In Terre Blance, M. , & Durrheim,K. , Painter, D. (Eds), Research in Practise (Second Edition). Cape Town: University of Cape Town Press. 3. Mindfulness Based Stress Reduciton/Mindfulness Based Cognitive therapy Course Book. Open Ground Training and Consultancy. Sydney, Australia 4. Royse, D. (2004) Qualitative Research from Research Methods in Social Work, Fourth Edition, Brookes/Cole-Thomson Learning, Pacific Grove, CA, USA. 5. Terre Blance, M. , & Durrheim,K. , Painter, D. (Eds), Research in Practise (Second Edition). Cape Town: University of Cape Town Press.
Subscribe to:
Posts (Atom)