Thursday, October 31, 2019

Orthodontic Processes Essay Example | Topics and Well Written Essays - 1000 words

Orthodontic Processes - Essay Example While patient compliance could be a potential aid in this respect, the prospect of white spots as a consequence of enamel deminseralization has had severe consequences for patient compliance and hence overall dental care. In this respect it is necessary that future studies are directed towards development of treatment strategies which are not centred on patience complinace alone. Fluoride varnishes are an upcoming methodology that is increasingly being used to resolve this issue. This proposal shall aim to address this increasingly used method to promote existing orthodontic processes. It has been previously demonstarted that fluoride therapy may have some efficacy in reducing demineralization (O'reilly etal 1987) and indeed in having a protective effect against plaque formation (Ten Cate and Duyster 1983, Silverstone 1978). Furthermore a recent invitro study by Timothy Foley and Manish Aggarwal (2002) has further reestablished the role of protective role of fluoride against demineralization processes. Drawing from these studies it is possible to speculate that flouride varnish if applied on teeth might have some potential for attenuating the deminaralization process (Vivalidi et al Todd et al 1999). The in effect is the working hypothesis underlying this proposal. The primary objective of this study would be to examine whether flouride varnish applied on the teeth might reduce this deminaralization. Given that the fluroide application in the varnish protocol is essentially an anticipatory blocking procedure that does not necessitate patient compliance, it serves orthodontists to gain from the bond strength of composite resins and does not suffer from constraints of development of stagnation areas in the dental environment. Experimental design - Materials and Methods The experimental design is an attempt to study the efficay of flouride varnish (Cavity shield by Omni products) in an invitro setting in preventing/attenuating the demineralization process. The materials and methods that shall be used for this purpose is described below One hundred eighty extracted, caries-free, fully developed molars shall be were selected, cleaned, and stored in deionized water. Care shall be taken to ensure that the potential effect of intraoral topical fluoride on the molars selected for the study would be minimal (ensured by the limited time the teeth remain in the oral cavity). The teeth were polished with fluoride-free dental prophylactic paste to remove any fine debris, rinsed with deionized water, and randomly allocated to the following 2 test groups: group 1, control or vehicle group with no flouride group 2, treatment group with flouride varnish (Cavity shield by Omni products)applied on them . This study design can be shown as presented beneath; Fig 1. Flow diagram showing division of sub groups in the experiment. After allowing the varnish to dry for 5min, all teeth in both groups 1 and 2 were stored in separate beakers of a 200ml artificial saliva solution consisting of 20mmol/l NaHCO3, 3mmol/l NaH2PO4, and 1mmol/l CaCl2, at neutral pH for further processing during the duration of the experimental period. Further to that all teeth in each group shall be removed, rinsed

Tuesday, October 29, 2019

Thinkertoys Week 3 Essay Example | Topics and Well Written Essays - 500 words

Thinkertoys Week 3 - Essay Example eeping in view the methodology used by Michalko, it becomes quite easy to explore the problems at individual, collective and corporate levels, and finding out the solutions for these problems as well. Michalko focuses on complete assessment of a problem by examining each and every aspect of it, rather concentrating only one part of the problem, which, according to him, may put the solution of the problem at stake. The same is applied by analyzing one’s personal problems in respect of searching out a job. I have adopted the Phoenix checklist in order to put my questions and their possible answers on the basis of Michalko’s thinking strategy. The solution of a problem is extremely necessary due to the very reality that a problem creates difficulties for a person while thinking and analyzing, so it is very important to make plan to get rid of that problem. The solution of a problem helps the individuals proceed to some goals determined for making progress in life; it is th erefore comprehensive assessment of problem and determining of its all possible solutions is most required for individuals. I have the problem in finding out job as soon as I complete my degree from the university. The declining global economy is the ugliest hurdle on the way of the fresh graduates while penetrating into the job market. In addition, all the organizations demand previous experiences from the job-seekers, which is really a hard nut to crack for the fresh graduates. The analyses of business environment view recommendations and approach a must for entering the job market. Moreover, the rising unemployment at global level has created the proportion of competitors against every vacancy to a great extent. Further, since education has got popularity everywhere in the world, the percentage of educated people has also increased, but the job opportunities are far less than the percentage of educated people, which serves as a serious threat for getting an attractive job. All these points

Sunday, October 27, 2019

USB flash drives

USB flash drives The USB (Universal Serial Bus) Flash drives are small storage devices which can store large amount of data in the form of flash memory and are portable. They are available in different sizes varying from 256MB to 64GB. The history to when the USB pen drives first came in existence is quite controversial, however, it is said that the first commercially-available USB flash drive was called the ThumbDrive, it was produced by Trek Technology in the year 2000. Soon IBM came out with its own model known as the DiskOnKey. By 2002, there were several companies which entered the market producing a similar product and marketing it. Pen drives comparatively have a much larger size than a usual floppy disk, which has a maximum data capacity of 1.44MB, or a compact disk, which has a maximum capacity of 700MB. This invention was a vast transformation from the era of floppy disks, as people required a device that would have a larger memory and yet be portable. The previous technology could only be used to store small size data for a short period of time that is 3-5 years, while Pen drives can store much larger size data for at least 10 years and no special care is required unlike in the case of CDs. The latest pen drives consist of a built-in MP3 player and finger print scanners. They only concept of data storage seems to be common between both the technologies. This technology highly attracted consumers as it made large amount of data transfer possible, which would otherwise be very expensive to carry out. This invention can be classified to be a discrete change from the traditionally used floppy drives or compact disks. This is because it was completely transformed by size, shape and its features. Alternatively, since it still belongs to the segment of device for storing memory, it may also be considered a gradual change. Its uniqueness and the fact that it has been further developed and integrated with appliances, like music players and cameras; make it a more discrete change. In the recent years many firms have entered the industry and started supplying the product, there have been gradual changes made to the initial design. The intense competition in the industry is mainly based upon the amount of features provided by each competitor at the lowest rate possible. This is a clear contrast to its initial stage where the degree of competition was low with only a few firms supplying. With the degree of competition increasing in the industry the level of uncertainty has always been high as the companies and the businesses are unaware of what is next? However, the recent upgrades made to the design show comparatively a smaller change in the initial design. It can be said that the product has probably reached the highest point in its growth stage or is entering the maturity phase and thus further developments need to be done for it to survive. The level of uncertainty seems to be declining with the progression in the industry. When speaking of Economic contribution, pen drives have not made any contributions to the economy as such. However, they have had a positive impact on the society as mentioned above, they made large data transfer possible at cheaper rates. The invention of USB flash drives has affected many stakeholders (with respect to IBM); Stakeholders are those group of people who are affected either directly or indirectly by an organisations actions (business dictionary). The ones most affected would be competitors, consumers, suppliers, mangers and shareholders. The competitors are stakeholders directly interested in the decisions made by its rival, IBM. Pen drive was a new advanced product which almost replaced the previous technology thus attracting the consumers to it, who later switched from companies supplying floppy disks and compact disks to IBM, thereby reducing the competitors market share. The competitors then had to incur huge research and development costs and produce a product at least equivalent to IBM in order to retain their market share. The invention also affected the suppliers of IBM. As the technology got older, cost reduction was essential for IBM in order to survive the cut-throat competition. Hence, the sup pliers would have to be efficient enough to supply at reasonable rates. Consumers were amongst the highly affected stakeholders, they are the ones who tryout new products and provide feedback to the companies. They are high risk takers as they initially entered an unknown market as this kind of technology was an entire new concept. Pen drives are no doubt smaller and more compact when compared to compact disks and floppy drives. By compact we mean that they are physically smaller than the latter and are capable of storing larger amount of data. When compared to CDs they are also scratch proof, making them more portable. Latest designs have reduced the size further, as small that it can be easily carried in a wallet. Also some are available with cameras and MP3 players built in them. This factor also shows that it is not resistant to innovation, further improvements and modifications are being done to develop the product further. The development will attract consumers who are more technology savvy; it could also be done to overcome the drawbacks it currently suffers. Over the years the invention has innovated a number of time, however there are drawbacks to this kind of technology also. Despite the fact that the storage capacities have improved over the years not a lot has been done to improve the security of storing information. Many businesses supply their employees with pen drives for them to access work from almost anywhere, thus security is a major issue as important data could be misplaced, if pen drive is misplaced. There is no technique available to track the device or to retain or erase the information on it. Also these devices are not compatible with some operating systems thereby not proving to be efficient enough for the consumers. It can alternatively be argued as they are compatible with most of the commonly used operating systems like Microsoft Windows XP, Mac OS X, etc. A lot of information is stored on a drive and it can be used on almost all the computers, the more it is used on different systems the higher are the chances for i t to contain a virus. This means that if a computer contains virus and a pen drive is attached to it, unless it is write-protected it is very easy for a virus to copy itself on a pen drive and attack other computers. This again reduces security of information as some anti viruses often delete the virus affected file, therefore essential information could be lost. The technology may be getting better each day but the new releases and latest pen drives are very expensive. This can also be considered to be a disadvantage as the consumers are unable to buy it and by the time they do a better version of it is available. As far as personal experience says, pen drives have a slower transfer rate when compared to hard disks. However, the size factor nullifies the impact as pen drives are much smaller and portable. It could also be one of the future development possibilities for the businesses to make it even more sleek and stylish. They could enhance its security by probably adding an auto-lock code to it, so if it is in wrong hands it would probably lock itself and be of no use. They could also work on the transfer rate and increase the storage capacity to around 1 tetra byte. References http://www.buzzle.com/articles/usb-flash-drives.html http://www.ehow.co.uk/about_5484089_invented-usb-flash-drive.html?cr=1 http://www.businessdictionary.com/definition/stakeholder.html

Friday, October 25, 2019

The Impact of Friends :: personal reflections

Every individual holds the key to their own future. We are told to follow our hearts and all your dreams for success will come true. We believe, you can make your future whatever you want it to be, no matter what you do. The truth is that success takes an enormous amount of determination and dedication. There are key things we need to look out for in order to be able to be successful. From your friends at school to how your carry yourself, it all makes a reputation for yourself. The successful people are the ones that understand how to balance it. This is why successful people are looked up to, and it all started out with the people they associated themselves with everyday from elementary school to now and even in the future. The question is, can friends affect your success? Your friends are constantly present in your life, more than your family. Most people, spend most of their time surrounded by friends instead of family this, is not always a bad thing but, has become normal. This is very true, especially for teenagers, who spent five days a week, 7 hours or more per day at school. Not including all the extra activities like sports, clubs and church that teenagers like myself are involved in. I believe people usually end up acting like the people they hang around with. â€Å"Friends play a big role in determining who you are and how you dress and talk and act†. (Compton 1 of 2 Peer pressure) My grandfather always used to say, â€Å"Show me your friends, and I’ll tell you who you are†. Drs. Davis, Jenkins and, Hunt also say this in their book, The Pact, â€Å"Friends play a big role in determining who you are and how you dress and talk and act†. (Compton 1 of 2 Peer pressure) . Although, it’s helpful to â⠂¬Å"Friends play a big role in determining who you are and how you dress and talk and act†. (Compton 1 of 2 Peer pressure) . When you are constantly surrounded by people with the same goals as you, and are going through the same problems it feels normal to involve yourself in what they are doing, because you feel like you are in the same â€Å"boat†. This can impact your success positively or negatively.

Thursday, October 24, 2019

Sex Education at School level

To subjugate a nation or a country destroy its literature, its history and above all its culture. This is what the English men do to tighten the bonds of slavery on India. And we Indians are making merry over the ruins of our ancient culture and civilization.Our Rishis who were scholars, thinkers, preachers, philosophers and warriors as well had divided human life into four periods. According to them average expectance of life in India was 100 years. First twenty five years period was meant for physical, literary and spiritual education, second thirty five years i.e. up to the age of sixty years were meant for family life then Vanprasth and finally sanyas. For the first twenty five years one and the foremost and compulsory principle was â€Å"Brhamcharya† meaning self restraint over sexual feelings.A Brahmchari who was primarily a student, a vidyarthi and a pupil of the Guru would never think in terms of sex. He was taught not to distinguish between male and female. To him all females were either mothers or sisters. He was forced to believe that breasts of a lady are but a loath of flesh and fat, a sort of deformity not a center for attraction. And with this type of education we have the proud privilege of having great personalities like Swami Ram Kishna Paramhans, Swami Vivekanda, Swami Ram Terth, Subhash Chand Bose, Swami Dayanand, Jagat guru Shankracharya not in distant past while great men like Bhishma Pitamah of prehistoric days.Even today we have a number of leaders both male and female who have followed the sacred path of Brahamcharya and are outstanding personalities in every field of life. The names of our president A. P. T. Abdul Kalam and Atal Behari Vajpayee ex. Prime minister may be cited as examples. Now under the influence of western civilization there is a talk of imparting sex education at school level. A simple question to the advocates of sex education?Sex in not a characteristic of human beings only. It is found practically in all liv ing animals, birds, insects and even in plant kingdom. Who teaches sex to cow or a buffalo or a donkey or a bird or an insect. Sex is a natural instinct and needs no lesion, no teaching and no demonstration. Sex in animal and plant kingdom is not rampant. It is controlled by nature. But sex in human has to be controlled by self restrain, by teachings and creating an atmosphere adverse to the feelings of sex i.e. following the path of Brahmcharya.Premarital  sex is a crime. Bigamy is prohibited by law as well as by society and also by religion. After all what is the purpose of sex education? Under guise of AIDS the advocates of sex education plead for its necessity. But when sex is prohibited no doubt but if you at all indulge then there are safety measures therefore. It is just like telling a thief that committing theft is illegal but in case you do it, adopt safe ways. One thing more. There is growing trend of co-education at school level. Just imagine a female unmarried teacher teaching lesion on sex to a class consisting of boys and girls or a male teacher doing the same job in his class. How would the advocates of sex education face such a situation? Is it at all advisable or practicable? Hence we should stick to our cultural traditions and should provide such education as would arouse in them a feeling of an urge for moral traditions of India culture.Lessons highlighting the importance of morality should be including in text books of English and Hindi literature as also in curriculum of subjects like History and Civics. An independent discipline of moral ethics may be given to the students in the prayer meetings and the students must be given & chances express their feelings and expose their learning. Physical training must also be introduced as compulsory subject and fruitful training of YOGA may be imparted to the students. YOGA may also be made compulsory for scouts and N.CC. Cadets. It is a time that we arise to the occasion and save our children fr om the malicious feelings of sex and infuse in them the sprit of self restraint so that the idea of sex may not enter into their mind’s horizon. Therein lies the salvation of our society and the country at large.

Wednesday, October 23, 2019

!0 Mary Street Short Analysis

10 Mary Street Analysis 10 Mary Street is a poem by Peter Skrzynecki, appearing in Migrant Chronicle. The poem discusses family, connection to place and the impacts of Peter’s own migrant experience. Skrzynecki details richly impassioned recounts told in snippets of symbolism, imagery and throwbacks to the pre-war European environment Skrzynecki’s family belonged in. * The first stanza depicts the habitual routine of Skrzynecki’s family, as indicated by the use of the phrase â€Å"Each morning† in the third line. This helps evoke a clear sense of normal practice and routine in the lives of the Skrzynecki family.Additionally through the use of industrial imagery; â€Å"rusty bucket†, â€Å"bridge†, â€Å"factory† the audience can see a sense of comfort and connection to their humble surrounds. * The second stanza presents the strong connection that Peter’s parents share with their garden. But while Skrzynecki’s parents tak e fulfilment in nurturing and fostering the garden (Tended roses and camellias/ Like adopted children), Skrzynecki himself didn’t hold the same values as his parents (I’d ravage the backyard garden/ Like a hungry bird).This contrasting use of simile accurately depicts the sort of cultural background Skrzynecki feels he doesn’t belong to. * The third stanza discusses the connection to the 10 Mary Street address that his family holds. The use of personification in the first line; â€Å"The house stands† highlights the human value of the house and establishes a strong sense of belonging to the house. Additionally, the use of Cumulative listing lines in 13-17 helps to reinforce the family’s strong connection to their European heritage. The final stanza presents a contrasting view of belonging whereby Peter feels his family â€Å"became citizens of the soil/ That was feeding us† and indicates a sense of comfort and acceptance of the Australian wa y of life. The last 3 lines: â€Å"Inheritors of a key/ That’ll open no house/ When this one is pulled down. † Re-establishes what the house symbolised for them and the notion that the sort of connection 10 Mary Street had to their new lives in Australia will be a challenge to recreate.

Tuesday, October 22, 2019

Take this quiz to find out if youre working too hard

Take this quiz to find out if youre working too hard Early mornings, late nights, and about 6 cups of coffee in between all of it†¦ Does that mean you are being over worked? Over working can take a toll on your health both mentally and physically. It is  hard to find a balance between work and your personal life since we have technology in the palm of our hands. But as they say, hard work pays off†¦right? But how do you know when it’s time to take a step back and take some time for yourself. Take this quiz and find out if you’re great at your work-life balance.  Ã‚  Ã‚  Source [Playbuzz]

Monday, October 21, 2019

6000 Processor Architecture

Analysis of the RISC System/6000 Processor Architecture Free Online Research Papers Analysis of the RISC System/6000 Processor Architecture As far as Reduced Instruction Set Computer (RISC) systems go, IBM has played an enormous role in both their development and success. It was IBM who pioneered the path to RISC architecture and was the creator of the first RISC system, the 801, which led directly to the creation of the RS/6000. If it had not been for the groundbreaking work done at IBM’s Thomas J. Watson Research Center in the mid 1970’s, RISC architecture as we know it today, would simply not exist. RISC architecture was a major breakthrough in the world of computing, and perhaps, one of the greatest innovations to be developed in computer science in the second half of the 20th century. It allowed for the design of CPUs with a simpler set of instructions, with a simpler set of goals. The main concept behind RISC architecture was to make the instructions simpler in order to make the cycles per instruction decrease, which would inversely result in an increase in machine efficiency. Before RISC architecture, and quite possibly the inspiration that led to discovery of RISC, researchers began to notice that the majority of the orthogonal addressing modes-an aspect of the instruction set architecture that define how machine language instructions identify the operand of each instruction-were being completely ignored.1 What they also discovered was that this was decreasing the level of performance between the processor and main memory. The decrease in performance was also a result of the increasing use of compilers to create programs, as opposed to simply writing them in assembly language, which was common practice up until this point. To solve this problem, researchers came up with the idea of making the instructions in the instruction set architecture as simple and, therefore, as fast as possible. This concept eventually evolved into RISC, in which the goal was to create instructions so simple that each one could be executed in a single clock cycle.2 IBM’s drive toward RISC architecture can be attributed to many factors. The main catalyst for this advance in CPU architecture, however, was the increasing problem researchers were noticing with computer performance. Processors, even before the birth of RISC, were becoming faster at an exponential rate, while the advances in memory access were much less dramatic. This increased the need for researchers to find different methods to boost performance and overcome the gap that existed between the processor and memory. The goal IBM had for the original RS/6000, released in February 1990, was to develop a method to conduct very complex calculations necessary for scientific and engineering research. At the time, the supercomputers responsible for carrying out these massive calculations were extremely expensive. IBM’s main goal in the superscalar RS/6000 was to increase the performance of the CPU, while making the price of the unit more affordable. The main functional units of the RS/6000 will be covered in the paper. The branch processor of the RS/6000 is a bit different from the implementation of other comparable processors. The branch processor unit in the RS/6000 can handle one branch every cycle, like most other comparable processors. Additionally, it uses branch prediction to predict that any unresolved conditional branches will not be taken. What the branch processor does next is where it really differs from other comparable processors. The branch unit fetches both the branch-not-taken as well as the branch-taken path into the instruction buffers.4 However, it only dispatches the branch-not-taken path for execution. It is not until after the condition branch has been resolved that the instructions from the incorrect path are flushed from the instruction buffers. At this point, if the instructions have already begun to be executed, they are cancelled from their respective functional unit. The benefit of the branch unit’s method of branch prediction is that, at worst, the miss-prediction penalty is a mere 3 cycles.5 To add to the benefit, this penalty can be eliminated if, between the comparison and the branch, there are independent instructions. Another advantage in how the branch processor handles operations is the ability of the unit to restore state if it encounters an exception by maintaining a Program Counter stack. This method allows exceptions to be handled without any interruption in performance. Adding to the uniqueness and quality of the branch processor is the fact that it implements a special branch-and-count instruction that, in turn, decrements a counter register and then conditionally branches on the result, all in a single cycle.6 The Data Cache in the RS/6000 is a four way set associative cache with 64KB of total memory, allowing each memory address to have a maximum of four locations in the cache where it can be stored.7 The D-cache has a line size of 128 bytes and is split up into four separate D-cache units of equal size, leaving each unit with a total of 16 KB of memory.8 The D-cache communicates with main memory using a 4-word interface, the Floating Point unit using a 2-word interface, the Fixed Point unit using a 1-word interface, and the I-cache unit using a 2-word interface. One of the unique features of the D-cache is that it utilizes a store-back buffer which is also 128 bytes wide.9 This allows for better performance due to the fact that it cuts down on the traffic over the memory bus. As a result of the use of the store-back buffer, data that is stored in the D-cache does need to be sent directly to main memory. Instead, the data is only written to memory when a miss in the cache is replace d. This allows for the flexibility of leaving missed lines on the buffer while the new line enters the cache, so that you need not write the missed line to memory before a new line is brought in. Adding to the advantage of this implementation is the fact that the D-cache is not kept busy during the store-back process.10 What makes this process available at no cost to the efficiency of the D-cache and therefore, the performance of the processor, is through the method by which the line is loaded into the store-back buffer. The D-cache is able to implement this feature by loading the line in a parallel fashion into the store-back buffer, which is all done over a total period of two cycles.11 The other main feature of the D-cache is its use of cache-reload buffers to store, from memory, a line that contains a miss. What this means is that the processor need not wait for the entire line to be grabbed from main memory before it can access the cache arrays. Similar to the store-back buffer, the cache-reload buffer does not tie up the cache, so there is no performance penalty that must be paid to load the cache-reload buffer.12 A standard configuration of the main memory within a RS/6000 consists of two separate memory cards, although the system can hold up to eight. Each memory card can output two words of data to the D-cache due to a four way interleaved design.13 This means that the system must have at least two memory cards in order to accommodate the four word interface with the D-cache. The standard configuration of the RS/6000, with 2 memory cards can store up to four instructions and sixteen words of data. The four way interleaving design is implemented by two data-multiplexing chips and one control chip. The RS/6000 can hold from two to eight memory cards, with each ranging between 8MB and 32MB of total memory. This allows the RS/6000 to utilize anywhere from 16MB to 256MB of total memory. This total can be doubled, however, using the 4MB DRAM that are supported by the chips memory cards increasing the total memory on each card to 64MB, which in turn would allow for a total memory of a half a Gigabyte.14 The instruction cache in the RS/6000 is a two way set associative 8KB cache with a total line size of 64 bytes, 16 instructions.15 It delivers four instructions per cycle to dispatch, while continuously re-aligning them so that the farthest instruction to the left is valid.16 The I-cache is responsible for dispatching instructions to their respective units. The dispatcher selects, from the available instructions, the first branch, condition, and two fixed or floating point instructions. The branch unit, along with the condition unit, executes its instruction immediately after it receives them from the dispatcher. The two fixed or floating point instructions, however, are sent to the instruction buffers to await execution.17 Actually, in the RS/6000 processor, the fixed and floating point units are not at all affected by the result of a branch instruction.18 In most cases, the fixed and floating point units receive an uninterrupted stream of instructions resulting in a zero cyc le branch.19 The unique dispatch logic of the RS/6000 actually allows the fifth instruction in the I-cache to be executed by the branch unit. This allows the branch unit to completely overlap the fixed and floating point units in a situation such as a loop where there are an equal number of fixed and floating point instructions to be executed.20 All of the fixed point instructions in the RS/6000 processor are decoded and executed by the Fixed Point Unit. The Fixed Point Unit also decodes and executes floating point instructions of the load and store types due to the fact that these types of floating point instructions are actually just fixed point operations. Because of its control over load and store floating point instructions, the Fixed Point Unit fuels the movement of data between the Floating Point Unit and the D-cache. The Fixed Point Unit has undergone little change from the RS/6000’s RISC predecessor, the 801. The Fixed Point Unit contains the Arithmetic Logic Unit to handle the instructions involving arithmetic that are sent to the Fixed Point Unit. It also allows load and store instructions to overlap by executing independent instructions. This feature is made possible through the use of register tagging. The Fixed Point Unit (FXU) utilizes 32-32 bit registers a feature that remains the same from the original 801. Almost all instructions carried out by the FXU are completed within one cycle. One of the changes in the FXU from the original 801 is that it features a fixed point multiply and divide unit to handle multiplication and division. Due to the specialized multiply and divide unit, instructions involving multiplication take from 3 to 5 cycles. In contrast, any given divide instruction will take from 19 to 20 cycles, hindering the multiply/divide unit a bit.21 To handle address translation, data locking and page protection, the FXU contains a 128 entry two way set associative Data-Translation Look-aside Buffer (D-TLB). Additionally, page table look-ups for the Instruction-Translation Look-aside Buffer (I-TLB) and D-TLB reloads are performed by the FXU. The FXU also contains D-cache directories and controls; and, therefore, any address generation or D-cache controls for either fixed or floating point load/store operations are also performed by the FXU.22 The main reas on that the FXU handles address generation is to be able to accommodate the newly implemented multiply-add instructions that are executed by the Fixed Point Unit. In order for the multiply-add instructions to be worthwhile, data must be exchanged between the Floating Point Unit by a method that is not slower that the multiply-add execution time.23 Due to its unique implementation, in order to allow the processor the ability to wait for the right time to write an instruction into the D-cache, the data and address of one fixed point store instruction can be held up in the store buffers within the FXU. This feature means that both the FXU and the Fixed Point Unit (FPU) will receive their data in a timelier manner by allowing fixed and floating point load instructions to pass up the fixed point store instructions that were ahead of them in line.24 One of the biggest accomplishments in the RS/6000 architecture is its intuitive implementation of the Floating Point Unit. The Fixed Point Unit (FPU) in the RS/6000 contains 32-64 bit registers and has, in addition to these main registers, six rename registers for register renaming, and two divide registers to accommodate for floating point divide instructions. The FPU is a fully pipelined unit which allows one instruction to begin its execution at the start of every cycle. One of the most advantageous features brought upon by its unique implementation is that every instruction, except for divide types, has a result latency of only two cycles in the FPU.25 The FPU handles all of the multiply, divide, add, and subtract operations involving floating point instructions. Additionally, it computes a standard set of move, negate, and absolute-value operations.26 It will generate one double precision result for every cycle regardless of the various types of instructions in the buffer. This means that data held in the floating point registers is always represented in double-precision format.27 One of the highlights of the RS/6000’s FPU is its ability to execute a unique multiply-add instruction. What makes this feature key is the fact that these instructions, of the (A x B) + C type, are executed with the same delay as a single multiply or add instruction. The multiply-add instruction increases the performance of the RS/6000 exponentially by combining two instructions into one which reduces the number of instructions that need to be executed in a given program. This is made apparent in scientific and graphical applications that rely heavily on matrix operations that can utilize the multiply-add instruction. This instruction is also more accurate than in previous implementations of the instruction. This is due to the fact that the result of the multiply is not rounded before the addition takes place. Therefore, no accuracy is lost during the multipl y-add operations. In the FPU, the two word interface with the D-cache unit provides the required amount of transferability for every floating point instruction. Another prime feature of the FPU is its ability to fully overlap load and store instructions with the execution of arithmetic operations. It is able to perform these overlapping executions due to the use of register renaming. This function allows floating point loads to be executed independently of floating point arithmetic operations, enabling the FXU to perform floating point loads without having to wait for previous floating point arithmetic operations to be completed.28 In the RS/6000, input/output operations are handled through an I/O channel controller which undertakes the task of moving data to and from the main system memory of the computer (i.e. disk).29 The I/O channel controller creates a Micro Channel interface, which is a bus architecture that defines how peripheral devices and internal components communicate across the CPU’s expansion bus. The I/O unit incorporates a two word interface between itself and the system memory via a two word interface with the SIO bus. The Micro Channel interface establishes a one word address bus and a one word data bus out of the two word interface to the SIO.30 The I/O controller architecture focuses on better performance and error handling in the RS/6000. The I/O controller’s main task is to handle the exchange of information between the system memory and the Micro Channel interface. The processor can transfer data to and from the Micro Channel interface through the use of I/O load and s tore operations. On the other hand, the Micro Channel interface handles data transfer with the system memory through the use of DMA (Direct Memory Access) channels.31 DMA controllers transfer data from system memory directly to the Micro Channel interface without bogging down the processor. A feature of the I/O unit that provides extensive data security is the use of address protection mechanisms which provide secure exchange of information within all data transfers. The units I/O channel controller supports up to 15 DMA channels for improved performance over the original 801 architecture. A notable feature of the Micro Channel interface is the streaming data function. This feature enables more than one packet of data to be sent over the SIO bus within a single bus envelope. The Micro Channel architecture accomplishes this task by sending a starting address followed by a single block of data that contains multiple separate packs of data. This is an extremely formidable attri bute of the I/O unit creating a powerful performance boost due to the fact that it can double bandwidth on large transfers of data.32 The RS/6000 is a fully pipelined processor with several stages that execute in parallel across multiple functional units to handle the execution of various instructions. The first stage in the pipeline of the RS/6000 is the instruction fetch (IF) cycle. In this stage, four instructions are fetched from the cache arrays within the I-cache and placed into the instruction buffers. The second stage in the pipeline is the Disp/BRE cycle, in which a total of four instructions are analyzed for dispatching. Also in this stage, the branch and condition instructions are executed, the target addresses for the branch instructions are generated, and the two fixed point or floating point instructions are sent to their respective units to await execution. The third stage in the pipeline is the FXD cycle. In this stage, the FXU decodes the instructions stored in its instruction buffer and obtains the operands from the register file. The next stage is the FXE cycle where the FXU executes its instructions. In this stage the D-TLB’s and D-cache directories are searched for load and store instructions. The fifth stage in the pipeline is the C cycle wherein, the D-cache arrays are accessed.34 The WB cycle, which is the next stage in the pipeline, is responsible for writing fixed point instruction results to the register file. The PD cycle is the next stage in the pipeline, and where the FPU pre-decodes its instructions. Following the PD cycle is the Remap stage. In this stage the floating point instruction registers are mapped to the physical registers. In the next stage, the FPD cycle, the FPU actually decodes its instructions. The next two stages, the FPE1 cycle and the FPE2 cycle, are where multiply-add instructions are executed. The last stage in the pipeline is the FPWB cycle. In this stage, the results from floating point operations, except for load/store types, are written to the register file.35 Going through a cycle-by-cycle analysis of the pipeline, we start off with cycle 1, where the first four instructions are fetched from the I-cache. In cycle 2, the instructions are analyzed for dispatch, branch and condition instructions are executed, target addresses are generated, and the fixed point and floating point instructions are sent to their respective units to be executed. Also in this cycle, the next four instructions in line are fetched from the I-cache. The third cycle sends the next two fixed point or floating point instructions to their respective units, while the FXU is decoding the first floating point instruction and the FPU is pre-decoding its first instruction. Also in this cycle, the FXU will execute the floating point load instruction and the FPU will send the first two instructions to the PD stage for renaming.36 Additionally, another four instructions are fetched from the I-cache. In the third cycle, however, the four instructions fetched from the I-cac he include the BCT-a special loop-closing branch instruction-followed by the next three instructions in line. In the fourth cycle, the FXU will generate the address for the first floating point load instruction. The third instruction pair is dispatched to the FXU and FPU respectively. The FPU will rename the load instruction and the multiply-add. Also, the second fixed point or floating point instruction pair is in the FXD and FPD cycles. In the fourth cycle the address of the BCT is also generated. In cycle 5 the next four instructions are fetched from the I-cache, while the fourth pair of fixed point or floating point instructions are sent to their respective functional units. In this cycle the BCT is executed while the first FMA (floating point multiply-add) instruction is being processed in FPD. Meanwhile, the first floating point load is accessing the D-cache and at the end of this cycle, the FMA instruction will enter the FPE1 stage. In cycle 6, the second floating po int load instruction will access the D-cache while the second FMA instruction will be decoded by the FPU. Also in this cycle, the FPU is generating the address for the first store instruction, which will be placed in the store buffer at the end of the cycle.37 The advantage that the RS/6000 architecture gives to the performance of the pipeline is that the loop-closing branch instruction does not affect the performance of the pipeline whatsoever. In fact, the FXU and FPU operate completely independent of the Branch instructions. This allows the floating pipeline to remain busy throughout the different stages, allowing for two floating point results in every cycle.38 The RS/6000 has many architectural advantages over other comparable processors. Perhaps the biggest advantage of this processor is that of its Floating Point Unit. The FPU in the RS/6000 increases its performance greatly due to features such as the multiply-add instruction, register renaming, and its lightning fast two cycle pipeline. Another aspect that makes the RS/6000 desirable over other architectures is its simplicity in design. The computer designers at IBM left its organization open to mold to the constant advancement in processor architecture. An equally important advantage that the RS/6000 processor puts forward is its ability to process zero cycle branches which cut down on execution time and processor load immensely. Lastly, the fact that the processor has very fast exception handling and recovery is a huge advantage to the system. The disadvantages of the RS/6000, although not as many in number as the advantages of the system, can prove to be a performance bottleneck in some cases. The biggest disadvantage of the system is its inability to accommodate out-of-order execution. The processor does process out-of-order operations, but only involving accesses to the D-cache. Needless to say, it would mean better performance overall if the system was able to execute instructions out-of-order. However, the cost of being able to perform such a feat with the RS/6000 may be more cumbersome than advantageous. In order to implement out-of-order execution in the processor it would require more flexibility in the area of register renaming and an increased amount of logic, which, in the long run, may not be worth the added performance. Research Papers on Analysis of the RISC System/6000 Processor ArchitectureOpen Architechture a white paperIncorporating Risk and Uncertainty Factor in CapitalBionic Assembly System: A New Concept of SelfThe Project Managment Office SystemAnalysis of Ebay Expanding into AsiaResearch Process Part OneDefinition of Export QuotasStandardized TestingInfluences of Socio-Economic Status of Married MalesThe Hockey Game

Sunday, October 20, 2019

Analyzing The General Public s Use Of The Internet Essay -- Addiction,

Voluntary questionnaires such as the Compulsive Internet Use Scale (CIUS) that uses a 14 question Likert scale that accesses substances and pathological addiction symptoms geared toward internet compulsion. The Wolfling, Muller and Beutel’s assessment for Internet and Computer Game Addiction Scale (AICA-S) was initial used in clinical settings that become a self-reporting questionnaire. This study measures Internet usage by the age, applications visited, and frequency. (Kuss, Shorter, Rooij, Griffiths, Schoenmakers, 2013 ). Other research methods of testing have been done by patients seeking help with other pathological compulsive disorders. One such study that was used was the Barratt Impulsiveness Scale – 11 (BIS-11) was developed to measure personality and behaviors in impulsivity. Other tests such as the Go-Stop impulsivity paradigm is used to help with the classification of Internet addiction and the severity. This is a type of study that will use go and stop pro mpts and evaluations of people’s reaction to the prompts. The Young’s Internet Addiction test is another test that uses a ... ... middle of paper ... ...isorders with the ability to hide their true identity. The people who also do find that these attractions on the internet are also putting the family’s at risk. The compulsive gambler is putting his family at risk by financial drawbacks, as the person with an Internet porn addiction is isolating his real emotions away from his loved ones. Both of these addictions are treatable through clinical counseling, family counseling, individual counseling and group therapies. Conclusions of the a study that was conducted by Gunuc (2015) concluded that when people are withdrawing themselves from normal family functions and spending a large amounts of time on-line doing various things such as gaming, gambling, and social networking. There should be some form monitoring and evaluation of behavioral patterns that could prevent them from developing future addictions (Gunuc, 2015 )

Friday, October 18, 2019

Should Iran be allow to have it's own nuclear power Research Paper

Should Iran be allow to have it's own nuclear power - Research Paper Example America’s double standards in terms of foreign policies towards Israel and Muslim world are causing big concerns in the Islamic world. Many people believe that Israel already have nuclear arsenal and hence there is no point in criticising Iran’s efforts to acquire nuclear power. Many others are of the view that allowing Iran to acquire nuclear power may intensify the problems in the Middle East. This paper analyses the arguments in favour and against allowing Iran to become a nuclear power. Opponents of Iran's nuclear program often argue that Iran should opt for the more economically efficient electricity from natural gas-fired power plants. Such arguments are also not valid. A recent study by two MIT professors indicated that the cost of producing electricity from gas (and oil) is comparable with what it costs to generate it using nuclear reactors — not to mention the adverse effects of carbon emissions or the need to preserve Iran's gas reserves to position Ira n in 20 or 30 years as one of the main suppliers of gas to Europe and Asia (Sahimi et al.). It is a fact that the available fossil fuels stocks in this world are sufficient enough for 30 or 40 more years. Industries are developing rapidly and the automobile uses are increasing every day. Under such circumstances, it is necessary for all the countries to look for alternate energy sources. Iran publicly says that they are trying to develop nuclear technology to meet their energy needs. It is a fact that energy crisis is a big problem in most of the countries. Since the fossil fuel is exhausting rapidly because of the increased exploitation, it is necessary find out alternate energy sources. Many countries turned their attention towards nuclear power to solve their energy crisis. For example, India is establishing a series of nuclear power stations across their territories to solve energy crisis. Under such circumstances, disallowing Iran from acquiring nuclear power cannot be justifie d. At the same time, many reports have shown that Iran is trying to develop nuclear arsenal rather than nuclear power stations in the name of energy crisis. In other words, Iran is trying to utilize nuclear power for destructive purposes rather than constructive purposes. Heated public rhetoric has filled the newspapers and radio broadcasts since Summer, 2003, warning that Iran is nearly ready to produce nuclear weapons and that, if she were ever to actually produce those weapons, she would be an unacceptable risk to her neighbours and to Israel through direct military confrontation. Further, Iran is said to be ready to supply global terrorists with nuclear weapons, thus posing a risk to the United States, to Great Britain, and to the European Union (Nuclear Armed Iran Vs. America – Whom Should The World Fear?). If Iran is trying to develop nuclear arsenal for destructive purposes, then they should be prevented from doing so. It should be noted that the destructive power of n uclear arsenal is unimaginable. Nagasaki and Hiroshima have shown us the destructive power of nuclear weapons. The damages caused by the nuclear weapons in Nagasaki and Hiroshima are negligible compared to the capabilities of modern nuclear weapons. Under such circumstances, UN like global agencies is trying to prevent countries from developing nuclear arsenal. A war between two nuclear powers may

Culture aspect on human organ donation Research Paper

Culture aspect on human organ donation - Research Paper Example While there are no legal hurdles during the process of organ donation, there is a lot of skepticism among the potential donors. In countries like India and China, the main religions talk about the concept of rebirth and reincarnations. Hence, religious followers have developed a fear about donating the body parts after death (Woo, 1992). According to Daar (2000), in Islamic countries, the religion prevents the separation of organs from the body after death. However, a deep dive into the cultural traditions of these nations indicates that religion and culture are not actually against organ donation (Ogbonmwan, 2010). This study aims to identify the reasons that prevent people from organ donation and will try to find out if culture is one of the dominant factors that go behind the decision. The study is based on review of literature as well as the research undertaken on the topic of impact of culture on organ donation. The study will highlight the various insights through the review of literature and research about the way in which culture plays a role in making an impact on organ donation. Organ Donation, Culture and Religion The cultural aspect of organ donation is deeply influenced by the way in which culture influences religion. Hence, in most cases, the religious practices or beliefs have transpired as cultural beliefs. Here is a brief summary of what some of the major religious practices talk about the concept of organ donation. Islam and Organ Donation According to Islam, violating the human body is a forbidden concept but, at the same time, the concept of altruism forms a basic tenet of Islam. Hence, helping in saving the life is regarded as a noble concept. Therefore, based on this principle, many Muslim Law bodes have passed religious rulings that organ transplantation is entirely approved in Islam, such as by the UK Muslim Law body (Golmakani, 2005). According to Golmakani, the Islamic Jurisprudence Council of the Government of Saudi Arabia had approve d both live as well as cadaver organ donation in 1988. Countries like Pakistan, Egypt and Iran had also passed similar rulings (Einollahi, 2008). As per the research done by Einollahi in 2008, he felt that scholars approved of organ donation and even Islamic laws were passed in approval. However, even then many followers are not comfortable with the idea of organ donation, especially when it comes to the procedure of deceased organ donation. Einollahi’s research shows that among all the kidney donations carried out in Iran, only 13% were deceased donation. In Turkey, Kuwait and the Kingdom of Saudi Arabia, this figure was less than 25%. Hence, there is still some skepticism based on religion about organ donation. In addition, there is also some difference of opinion between the Indo-Asian Muslim scholars and the Arab scholars, where the Indo-Asian Muslim scholars are not much in favor of organ donation (Rady and Verheijde, 2009). Part of this concern could arrive from the nor ms for burial which states that the body should be buried within 24 hours, where as lengthy organ retrieval procedures may delay the norm (Gatrad, 1994). Therefore, while Islam as a religion does not have any prohibitions against Islam, followers are still apprehensive about the entire procedure. Christianity and Organ Donation Christianity as a religion endorses organ transplantation. The various branches of Christianity such as Anglican,

Pennicillin process introduction Essay Example | Topics and Well Written Essays - 500 words

Pennicillin process introduction - Essay Example The process of purification of a product especially in a chemical producing plant involves a number of options, and examples of some options which may be involved where a product must be made very pure include:- Some down streaming operations seen in penicillin production chart are not involved in the actual production of penicillin. ( Biwer, Griffith, & Cooney, 2005).For instance, Neutralization is not involved at any stage in this production plant. This is because it will cause decrease in enzyme concentration which will lower the level of penicillin production. In conclusion, a consideration put in the following areas of weakness:-inadequate analytical techniques, simplistic models with assumptions, variance in signals and performance, inefficiencies in use of information, inefficient learning and financial constrains can lead to quality production of penicillin (Biwer, Griffith, & Cooney,

Thursday, October 17, 2019

What motivated people to use recreational drugs in the 1960 Essay

What motivated people to use recreational drugs in the 1960 - Essay Example The 1960s is known by many as the period when the youth rebelled against the government and strived to attain harmony, love, and peace (Iversen 210). The 1960s was also a period when numerous young people experimented with different kinds of drugs. This essay tries to answer this research question: what motivated people to use recreational drugs in the 1960s? Recreational drug is defined as any substance â€Å"taken on an occasional basis for enjoyment, especially when socializing† (Earleywine 54). Recreational drugs include a broad array of hallucinogenic and narcotic substances. The term also includes heroin, cocaine, phencyclidine (PCP), tetrahydrocannabinol (THC), amphetamines, barbiturates, alcohol, and caffeine. The use of recreational drugs by the youth was strongly associated with the rebellion and dissent experienced by the people of the 1960s (Iversen 210): The most profound example of the ability of marijuana to raise mass social consciousness occurred during the Vi etnam War era, on both the home front and the battle front.... Drug rehabilitation centers were established in the 1960s to provide assistance to drug addicts and to control the supply of recreational drugs. The Use of Recreational Drugs in the 1960s Two hallucinogenic drugs were at the core of the 1960s’ counterculture movement: LSD and cannabis. Cannabis is a plant grown in the American colonies for its fiber. Several Indian communities used the plant’s dried leaves with tobacco as a pain reliever (Conlin 940). Cannabis became a recreational drug due to two occurrences. First, a momentary fad for anything Turkish resulted in the establishment of hashish pubs, where people experienced the joy of ecstasy. Almost simultaneously, New Mexico and Texas inhabitants saw Mexicans using cannabis for its mind-altering effects. The use of cannabis as a recreational drug reached New Orleans, where clients of the city’s posh bordellos learned it from African-American singers who were at the time engaged in creating jazz. White singers, fascinated to jazz, began to use the terms ‘pot’ and ‘weed’ during the 1920s. Among the white people, using marijuana stayed practically a tradition for musicians until beatniks—the Beat generation of the 1960s—learned about it from the jazz clubs they visited (Conlin 940). The 1960s’ hippies learned marijuana use from the beatniks and began spreading the word about the hallucinogenic benefits of the drug. LSD has a shorter history. It was produced by Albert Hoffman in 1938, who was trying to create a new drug for headache. Hoffman described his experience with using LSD as â€Å"a kind of drunkenness which was not unpleasant and which was characterized by extreme activity of imagination†¦ an uninterrupted

Embrace the attributes of the diversity wk8 Essay

Embrace the attributes of the diversity wk8 - Essay Example In an organization, levels of conflict are common when team members do not commit themselves in an organization process. When the organization’s management limits finances to support diversity programs, especially in women management, there will be an increased likelihood that levels of conflict may come into existence (Cox & Beale, 1997). The management can understand that the limits in the input and output resources of the company are negatively affected by the diminished consumer demand. Intergroup and intragroup levels of conflict will be considered in this discussion. An intergroup conflict refers to the disagreement among groups of teams while intragroup conflict is the disagreements that occur among the members within an organization (Hellriegel & Slocum, 2007). Women in management can experience an intergroup and intragroup conflict with teams of management, and request an organization meeting to address various problems, such as an absence of trust and the limits in funds allocation to diversity programs (Cox & Beale, 1997). Women can respond in a negative manner to conflicts with late work completion and absenteeism. There will be limited communication between the women in management and managers who refuse to support diversity programs by disapproving the management goals (Cox & Beale, 1997). However, it can be possible for women in management to work with the management in conflict to encourage and support diversity programs, which can increase the revenue of the company (Cox & Beale, 1997). Therefore, the increased revenue can support diversity programs and lead to the retention of women in

Wednesday, October 16, 2019

Korean American-Q2A Article Example | Topics and Well Written Essays - 500 words

Korean American-Q2A - Article Example Social capital just as the name suggests refers to the value of the social network in a society. Such features local churches, entrepreneurship and ethnic networks played an integral role in facilitating the settlement of Korean immigrants in the United States. Such forms of social capital cushioned the first-generation immigrants with vital resources thereby enabling them to take their children to school. Most of such families are in the middle class. However, the systematic weakening of the social capital is a vital feature responsible for the disparity in the Korean youth education. Such social networks weakened thereby leaving the modern day Korean American youths vulnerable to such social vices as racism that continue to hamper their attempt to seek education. Schools in America strive to provide a number of the basic resources. However, the number of Korean American students that drop out of high school continues to rise. Korean American children who live in poor and isolated neighborhoods continue to drop out of schools owing to the vulnerability they feel while in the schools. The schools do not provide the students with adequate support services that make settling in such schools difficult for them. Socio-economic background is yet another equally important factor that influences the receipt of education services in the country. Most of the post-1965, Korean immigrants lacked effective social capital. This exposed them to the economic forces of the country. Most of such families live in poverty and in isolated neighborhoods where they cannot access any formidable social network. Their socio-economic state makes it difficult for the youth to pursue education as most of them drop school due to the harsh social environment and the eviden t lack of resources. Such youths resort to drug abuse as most of them join the illegal trade of drugs. In retrospect,

Embrace the attributes of the diversity wk8 Essay

Embrace the attributes of the diversity wk8 - Essay Example In an organization, levels of conflict are common when team members do not commit themselves in an organization process. When the organization’s management limits finances to support diversity programs, especially in women management, there will be an increased likelihood that levels of conflict may come into existence (Cox & Beale, 1997). The management can understand that the limits in the input and output resources of the company are negatively affected by the diminished consumer demand. Intergroup and intragroup levels of conflict will be considered in this discussion. An intergroup conflict refers to the disagreement among groups of teams while intragroup conflict is the disagreements that occur among the members within an organization (Hellriegel & Slocum, 2007). Women in management can experience an intergroup and intragroup conflict with teams of management, and request an organization meeting to address various problems, such as an absence of trust and the limits in funds allocation to diversity programs (Cox & Beale, 1997). Women can respond in a negative manner to conflicts with late work completion and absenteeism. There will be limited communication between the women in management and managers who refuse to support diversity programs by disapproving the management goals (Cox & Beale, 1997). However, it can be possible for women in management to work with the management in conflict to encourage and support diversity programs, which can increase the revenue of the company (Cox & Beale, 1997). Therefore, the increased revenue can support diversity programs and lead to the retention of women in

Tuesday, October 15, 2019

Explain the Impact of the Stanford Prison Experiment on Psychology and Behaviour Essay Example for Free

Explain the Impact of the Stanford Prison Experiment on Psychology and Behaviour Essay The Stanford prison experiment ,led by professor Philip Zimbardo, was aimed at seeing the effect on people on becoming prisoners or prison guards. The idea was to see what happens to people when they are put in relatively ‘evil’ places. Do the people themselves become evil or is there no net effect? The results indicated that in fact people adapt to their role exceptionally well. It was observed that the prison guards became overly tyrannical to the level of sadism. In consequence the prisoners were seen to be under severe stress to the extent that they became crazy or depressed. 24 volunteers were selected that had no psychological problems, health issues or any past crime accounts. They were brought to a mock prison set up in the basement of the Stanford university’s psychology building where they were randomly assigned to be prisoners or guards. 3 prisoners each were given rooms that they had to live in for 24 hours of the day and the guards were given 8 hour shifts to work in. The study was observed upon using cameras and microphones. They study was supposed to last for 14 days but had to be halted after 6 days due to extreme unethical practices in the prison. The Stanford prison experiment showed us that human beings alter to the situation they are put in. The guards won total control over the prisoners who blindly followed orders. All of this in just 5 days of experimental conditions. Zimbardo said that the prisoners had internalised their roles and thus continued to participate in the experiment on their own will. One example of this is when they introduced themselves to the priest with their serial number rather than their real name. Another example would be of the prison consultant who took on the role of an autocratic head of the parole board. After the experiment was over he was said to be disgusted at the person he had become. In essence there were two groups created among the volunteers, therefore, according to social identity theory ,people in the in-group would exhibit in-group favouritism and a sense of discrimination of the out-group. This can explain the unanimity between the guards themselves and their certain dislike towards the inmates. To further build on this ,the idea of the prison guards being a group may evoke the feeling of anonymity, which would allow the guards to be more free and aggressive as they could shake off responsibility for their actions. This is called deindividuation theory. It may be a cause of the violence occurred on the prisoners by the guards as there is a diffusion of responsibility. The Self-fulfilling prophecy states that when a person is given a label we often live up to that expectation. In the same way ,as the volunteers were given labels, they tried to live up to that expectation and thus acted in the way they thought they should. Furthermore it can be said that the volunteers had set stereotypes on the idea of a prison guard and prisoner. It can be assumed that these stereotypes illustrated the prison guards to be strong and authoritative. It could also be an illusionary correlation made by them through watching films or through media (which means that they attribute the behaviour of the prison guards to their disposition rather than situation :FAE). The theory of cognitive dissonance can also be used to understand why the prisoners and guards acted this way. They had to alter their mind-set(attitudes) to match with their behaviours so that there was no tension in their self identity. The situation put the prisoners in certain set roles that they tried to live up to and thus they changed their behaviour. This experiment along with Milligram’s shock experiment demonstrates the fundamental attribution error which says that there is a overestimation of dispositional factors and under-estimation of situational factors when we attribute. It changed the way we looked at psychology in a socio-cultural aspect. This experiment has helped us understand how good people do bad things such as the torture of Iraqi prisoners in the Abu Gharib prison, which was a real life example of the same results obtained by Zimabardo. It was also used to investigate matters such as prison riots and abuse of juveniles in many prisons. Young adults are also known to be power hungry. Their lust for power might have changed the way they would have normally behaved. The prisoners were made powerless and thus started to behave in such a way. They became depressed ,helpless and unstable. Thus it can be said that power also affected their behaviour. In relation to gender I believe that there would not have been much difference in the experiment as people, male or female, tend to have similar schematic processing when it comes to social perceptions of a certain group or individuals. If conducted with only females it is more likely that there would have been lesser violence as it has been researched that testosterone, which is much more predominating in males, is a cause of sexual arousal and aggression. Culture would not affect the behaviour as everybody needs some power in their life and if power is stolen from us we tend to become unstable. Lastly, it can be argued that all the volunteers of the experiment were college students. These students are more likely to be aggressive, as they would have higher testosterone levels compared to older guards in regular prisons. The volunteers were mostly white males who were on average ,financially stable, which when compared to regular prisoners would not equate well as people in prisons are usually financially unstable. It goes without saying that this experiment was extremely unethical. It did harmed the volunteers both physically and mentally as they were put under severe stress as well as physical torture. Their consent forms were not complete as it id not involve the details of the experiment. The volunteers did not know what they were getting themselves into , for example strip searched which is a violation itself. They were also ,without prior knowledge ,arrested. Zimbardo himself became the super-intendant and did not abide by his role as a psychologist ,which should have been the case to have an unbiased study. The experiment had no controls and thus is therefore severely criticised. Therefore the validity and ethics of this experiment, relating to its method are questioned. In conclusion, the experiment was a path breaking exercise that opened our eyes to show us the vulnerability of our race in terms of conformity and how we adapt to our situations especially when it comes to the fight for power.

Monday, October 14, 2019

Autonomy in elderly care: A literature review

Autonomy in elderly care: A literature review Introduction Older persons in history have been regarded as dependent because of the physical body changes that come with growing older. These physical changes greatly affect the normal functioning and the effectiveness with which they operate and hence the need for external support both at the physical and social levels (Agich, 2003). As the physical energy wanes, so does the level of activity not only to support themselves physically but also on a wider scale. It is these very changes that bring to light the issues of care and dependence of older persons on caregivers and/or family support. However and important to note, like in the rest of other social groups, older persons are a heterogeneous group in terms of gender, race, culture, class and otherwise (Bond and Corner, 2004) and therefore, there needs vary accordingly. Further, as Bond and Cabrero (113: 2007) point out, mental and physical incapacity and disability which lead to dependence are common stereotypes of human ageing. Older people in care or not have been seen as frail and therefore unable to make decisions, communicate, and engage in meaningful relationships with their surrounding environment. As a result, their autonomy in care has been compromised. Jacob (1999) cited in Townsend (2009) compounds it further that professionals and families of older people as well consciously and unconsciously bear discriminatory assumptions about them. To this end, this paper explores autonomy of older people in care in depth, evaluates existing social work practice and suggests strategies to ensure both caregivers and service users promote an interdependence that would help in reinforcing control and respect for service users. Collopy (1988) defines autonomy as a set of notions that promote freedom, self-determination, independence that is signifying control and the power to make decisions by the individual. From a medical view point once one is admitted into care they are not well and therefore cannot cope on their own let alone make decisions. Because of this, they are viewed as patients who are incapacitated and therefore have to depend on caregivers. However, one wonders whether all older persons are incapacitated on all fronts. Even when they are fragile, do the Caregivers have sufficient expertise to socialize and communicate with them? These and other questions remain largely unanswered. This view therefore tends to ignore the strengths and abilities of the older persons. Like Runciman cited in Bond and Corner (2004) explains, in understanding social status, it is more meaningful to study individuals from their perspective and values so as correct judgments are made about them. Like all other social groups, older people too would be better understood from the view point of their everyday experiences at an individual level other than having to impose what we think is best for them. This would imply that understanding older persons’ desires means a lot to them rather than assuming that we know all they need. Understanding of Autonomy and Care for Older Persons Contextually Autonomy as a concept connotes a different set of meanings depending on the setting or context. It is defined differently in a sense that it means different things to different users and therefore taking one meaning or usage would very much complicate its very usage at the different cultural and societal levels on the whole (Agich, 2003). The fact that it spells out different meanings and qualities, in care for older persons too, would be quite a challenge for both the service users and the Caregivers themselves. Autonomy as a cultural ideal under the guise of freedom of choice especially in the western context is very much viewed as a necessary feature for any individual. In regard to United States for example, freedom is seen as a basic of life and therefore without which, is deprivation of an individual of a basic right (Agich, 2003). It is important to note that this freedom starts at birth throughout life and therefore including in old age, whether in care or not. In care too, w ithout the liberty for one to advance their choices would be seen as degrading by the service user and therefore subservient to the caregiver (Agich, 2003). However this raises the question of what might happen when the service user is suffering from a severe cognitive impairment? This clearly indicates the challenge of according full autonomy to service users. On the other hand in countries like South Africa where the elderly are seen as very important assets within their communities, it is argued that freedom begins with avoiding taking elders away from their very communities to institutionalized care (Lombard and Kruger, 2009). Institutionalized care would be seen as denying older persons an environment they consider natural and fulfilling. This entails an environment which allows them to share their older age with their kith and kin; who in this case know them better and therefore interdependence remains natural. Further, this kind of setting allows for respect and control of older persons based on cultural values. Even when older persons are mentally incapacitated, the family caregiver will know what they have always desired that is, their favorite food, dressings, entertainment and the like. This in a sense allows for older persons freedom in a manner that is fulfilling in this kind of context. However, it cannot go without mention th at this kind of setting requires strong family structures that allow for time and financial capacity from the family members to take care of the elderly. With the spread of neo-liberalism that promotes capitalism and individualism, some of these especially extended family systems have broken down hence rendering older persons susceptible to dependence on hired caregivers in a family setting or institutional care (Lombard and Kruger, 2009). Evaluation of Existing Social Work Practice and Care Provision for Older People Inasmuch as the intentions of care for older persons are seen as good, the outcomes of both institutionalized and family care are not always pleasant (Talerico, 2004). When service users are put into care, the assumption is that it is for the wellbeing of the service users because they are being given help physically, socially and otherwise. This in many a case does not always happen because of the very nature of how older person are perceived in the eyes of the caregivers. The societal perceptions of older persons delude caregivers of the capacities and strengths that service users possess. As Townsend (2006) theorizes it, these very perceptions give birth to the ideas of ‘structured dependence’ for older persons. For example a situation where the state deliberately introduces structures and policies like compulsory institutional care for older persons that are very much underpinned by the very disempowering and biased perceptions held strongly by society. Caregivers base their understanding of service users on the very notions they grow up with which in many cases misguides their treatment of older persons (Jacobs, 1999 cited in Townsend, 2003). In which case, service users find themselves in a difficult situation that is, cannot voice their concerns either because the surrounding environment is not supportive enough or for fear of retaliation from the caregivers (Townsend, 2006). In an investigation conducted in the United Kingdom by ‘Help the Aged International’ (2002), older persons in long-term care have suffered a series of blows partly due to the lack of quality assurance on part of the institutions and also a lack of competence from the caregivers on how to communicate with service users to deliver the required services (Townsend, 2006). A classic example in this investigation highlights a woman who was suffering from Alzheimer’s disease; she was dying of dehydration but no one could tell and she finally pas sed on. This is clearly an indication of lack of expertise on part of the Caregivers and as well an indicator of many others who are in the same or even worse-off situation. The fact that they could not communicate with her, they decided to take matters in their own hands; clears indicates of how dependence on Caregiver can get messy especially when there is a lacking in skills or quality assurance by the caregivers whether in institutional or family setting. On the other hand, very few studies explore the experience of older persons’ autonomy in care, whether in institutionalized or family in the developing world. Nonetheless, in a study conducted in South Africa, there is an indication of a shift in policy of primarily taking away older persons from institutionalized care to community based care with a view of keeping them closer to their kith and kin (Lombard and Kruger, 2009). However, due to issues of neo-liberalism which advance capitalism and individualism, this leaves older persons in family care at even greater risk as would-be caregivers opt for work and hire caregivers who despite the cultural attachment with these older persons, are little known to the service users. Despite being in family settings, little is known whether the hired caregivers promote values of preferences and control of older persons. This puts the issues of meaningful relationships and interdependence in question for the older person in this kind of setting. As cited by Zubi and Conolly (2013), as well in cases where the institutional care exists, there are cases of understaffing and under funding of care activities for older persons. As a result, this raises the levels of fatigue and emotional exhaustion which leads to compromise in the quality of care. This is a clear depiction that with burnout of caregivers, self-determination of service users is not anything that would be given priority. Further, in a study conducted by Leece and peace (2009), in which an attempt to understand what autonomy and independence of service users in care meant to caregivers, majority of them concluded that a service user had to be in a position to do everything on their own. Considering the wider and contextual understanding of autonomy; for example in terms of decision making and positive relationships, this is an indicator of how caregivers unconsciously take service users for granted in care and hence a need for evaluation of social care practice. It is important to note that inasmuch as some service user are not in a position to make decisions on their own, Talerico (2003) stresses that caregivers have taken no initiative in trying to understand how to communicate with them so as to create an environment of interdependence; that is understanding their daily activities, abilities, values and histories. All this would go a long way in shaping the caregiver’s approach to interdepen dence in care (Agich, 2003). Strategies to Improve Older Persons’ Autonomy in Care As stressed by Talerico (2004), care settings are congregated environment in which the most important thing is maximizing health and support. She adds that these very goals defeat the very purpose of autonomy because as oppose to individual choices generalist care is promoted. It should be noted however that this can raise ethical questions because service users are different and therefore their needs vary. As fronted by Leece and Peace (2009), establishment of personalized care for services users would go a long way in addressing this. This means that caregivers give a special attention to individual to not only understand their histories, values and choices but establishing effective skills of communicating with them on the whole. Even older persons with cognitive difficulties can communicate (Agich, 2003). Therefore, Caregivers must be equipped with these skills to give more meaning to care for older persons. From the earlier discussion of caregivers who understood autonomy of older persons in care as only being able to perform tasks independently, it is very clear that communities of practice are very important. These mainly refer to a multidisciplinary approach to working with older persons in care. This emphasizes working with different professionals who work together to determine what’s best for service users (wenger et al cited in May, 2009). As nurses focus on the medical component, social workers focus on their values and preferences and policy makers advance policies that promote older people’s necessities at all levels. This promotes a better understanding older person whether in care or not. As well, this implies better working relationship not only among professionals but also with service users who are engaged at different levels. Further, this in a sense, promotes interdependence among them as dependence is phased out. In addition to promoting a better understan ding older persons, specialist skills training would be important for the effective intervention of professionals at different levels. This explains the case for being able to communicate, identify their strengths and abilities and the like. Advocacy for the rights of older people would serve to bring their issues to the forefront (HelpAge International, 2010). Historically and socially, older people have been looked at from a medical view point as frail and therefore unable to perform task let alone making their own decisions. This is clearly a sweeping generalization that does not fit the bracket of all older persons. But because this has been the case for a long time, it has come to be accepted and upheld. This line of thought therefore very much underpins the policies and activities that are geared towards older people where they are seen as ‘dependent’ as oppose to partners in working. Therefore, in deconstructing this line of thought, advocacy through community dialogue and raising aware awareness of older persons’ issues autonomy in care among which, would go a long way rectifying the age-old negative connotations about ageing. As communities accept to dialogue and become aware of the reality o f old age, policies and agendas will begin to come up. In the long run this shapes the societal outlook of older persons at every single level. HelpAge International (2010) highlights how Tanzanian older women have been branded witches by their societies. As a result, this explains the kind of nasty treatment that they have been accorded whether in care or not. But by dialoguing with communities, the trend is changing for the better. Important to note is that advocacy would not directly promote autonomy in care for older persons but rather it goes a long way in pushing for older persons’ concerns high on the agenda. With the guidance of social workers, this in the short run would guide social policy and in the long run challenge and change societal outlook of ageism. Conclusion In a nutshell, if older persons are to gain control over their lives in care, then there needs to be a re-conceptualization of caring for older people; â€Å"where caregivers become supporters and advocates but not custodians and guardians as it were† (Nolan et al, 2001). As oppose to older persons being passive recipients of care, they become active participants who have some sort of control over their life while in care. This very much promotes interdependence between service users and caregivers. Concretely, as advanced by Rogers (1974), an individual-centered approach to caring, where the service user is placed at the centre of activities, would help caregivers in identifying the specific strengths and abilities of service users and therefore creating better working relationships which in the end promote interdependence and an acceptable level of control of service users. References Agich G. J. (2003) Dependence and Autonomy in Old age: An Ethical framework for Long-term Care, 2nd Edition, Cambridge: Cambridge University press. Bond, J and Cabrero, G.R. (2007) Ageing in Society: European perspectives on Gerontology 3rd Edition, London: Sage publications Bond, J and Corner, L. (2004) Quality of life and Older people, 1st edition, McGraw Hill: Open University Press Fine, M. and Glendinning, C. (2005) ‘Dependence, independence or inter-dependence? Revisiting the concepts of ‘care’ and ‘dependency’. Ageing and Society, 25, 601-21, available online at http://eprints.whiterose.ac.uk/1653/1/dependency.pdf [accessed 2 January 2014] HelpAge International (2010) Women’s rights in Tanzania. [Online] Available from http://www.helpage.org/what-we-do/rights/womens-rights-in-tanzania/ [Accessed 3 January 2014]. Katz, P.R., R.L. Kane, Mezey, and D. Mathy (Eds.). 1995. Quality Care in Geriatric Settings: Focus on Ethical Issues. New York: Springer. Leece, J and Peace, S (2010) Developing New Understandings of Independence and Autonomy in the Personalized Relationship. British Journal of Social work, 40, 1847–1865. Lombard, A. Kruger, E. (2009) older persons, the case of South Africa. Ageing International, 34: 119 – 135, available from http://web.ebscohost.com.proxy.library.lincoln.ac.uk/ehost/pdfviewer/pdfviewer?sid=0294ee3e-afec-4dad-882a-3b6fd4656d61%40sessionmgr4001vid=2hid=4204 [Accessed 1 January 2014] May, L. A. (2009) Communities of practice in Health and Social Care. 2nd edition, Sussex: Wiley-Blackwell Nolan, M., Davies, S., and Grant, G. (2001) Working with older people and their families. Open University Press: McGraw Hill Education Rogers, C. (1974) On Becoming a Person: A therapist’s view of psychotherapy. London: Constable. Talerico, K. (2004) Honoring Resident Autonomy in Long-Term Care Special Considerations. Journal of Psychosocial Nursing, 42, (1) Townsend, P. (2006)‘Policies for the aged in the 21st century: more ‘structured dependency’ or the realization of human rights?’Ageing and Society, 26 (02): 161 – 179 Zubi, Y. and Conolly, P. (2013) Recollected experiences of first hospitalization for acute psychosis among persons diagnosed with schizophrenia in South Africa. South African Journal of Psychiatry, 19 (3), p81-85. Little Red Riding Hood: Angela Carter Little Red Riding Hood: Angela Carter All fairy tales, both old and new that exist today can be said to have a long history that lies beneath them. However, some aspects of the fairy-tale history are somewhat hard to trace because its only the literary forms that can obviously survive. Furthermore, what we do know is that the majority of them have been around and retold for many years. Most, if not all of the famous fairy tales that we know have been adapted into various new versions as products of new challenging ideas around the society in which we live. Bonner states that fairy tales are the usual subjects of adaptation because of their massive appeal to both adults and children worldwide.  [1]  The story Little Red Riding Hood arguably offers a very interesting and challenging tale for enhancements through the application of the chosen contemporary theories in literary criticism that some critics have noticed throughout the years of its existence. Furthermore, in this essay I intend to compare Perraults version o f Little Red Riding Hood with Angela Carters version Company of Wolves. Little Red Riding Hood, Little Red Cap or simply Red Riding Hood is a European fairy-tale about a young innocent girl and a wolf. The tale was first published by Charles Perrault in 1697, which in fact was an adaptation of an older tale still. Thus, Perraults version ever since has been adapted and criticised throughout its history. Zipes holds the genre is relevant to contemporary culture as it holds issues that exist within gender and its society.  [2]   Perraults version was named Little Red Riding Hood. The red hood is seen as a popular symbol in Europe and North America. In the 19th century young daughters of wealthy families were painted in red caps or hoods. Erich Fromm considers the hood to symbolise menstruation and the approaching puberty that lingers upon the young person that wears it.  [3]   Perraults version can be described as a much more descriptive fairytale than many others. It begins with once upon a time  [4]  which the traditional way to start a fairy-tale and also gives the image of timelessness throughout the tale. This relates to the narration and the structure within the fairy-tale of which certainly precedes the middle classs existence within. It portrays the image of the little girl being highly attractive the prettiest creature who was ever seen.  [5]  She is also said to be extremely naÃÆ' ¯ve, the poor child who did not know it was dangerous to stay and hear the wolf talk.  [6]  This shows her innocence and that she isnt aware of the bad happenings in the outside world due to her controlled life at home and within her society, this relates to Trimmers view that both children and childrens tales should be kept away from such happenings within society that are out of the norm.  [7]   In Perraults version of the tale the little girls mother simply instructs her to take some food for her grandmother: never mentioning danger or anything that she should avoid on her journey, thus showing how safe society was perceived throughout the time. Tater argues it resembles a somewhat cautious tale to society, a wakeup call.  [8]   Moreover, the existence of the wolf within the tale gives the audience an image of a villain being portrayed. The wolf is seen as a popular image of danger in fairy tales as it is seen in this and other stories such as The Three Little Pigs. It is an obvious predator that exists within the forest and thus relates to a natural choice for the story rather than witches etc. it can also be portrayed as a metaphor for a sexually predatory man. He is of course the only male gender within the tale thus is portrayed as a powerful and strong figure, seen in the phrase gaffer wolf  [9]  personifying the wolf as the boss within the tale. He shows a strong influence upon the naÃÆ' ¯ve country girl as he persuades her to divert from the safe path in which she was on after foolishly telling him exactly where she was going. This clearly portrays to the audience a somewhat clear contrast between the village and its surrounding in which the girl lives, which is seen as safe and the dangers tha t are withheld in the wide world past what the little girl is used to. Hence, holding a strong morality message throughout the fairytale, warning people to stick to what they know. Tater identifies the tale as a place to work through people thoughts and anxieties about sexuality, gender and sometimes violence.  [10]  When Little Red Riding Hood makes it to the house, she has no sense of anything wrong and states What big arms you have!  [11]  Exclamation can be argued to be the favourite story element for tales, being seen as a story building tool that creates the anticipation and horror for the reader as they know that she isnt talking to her grandmother. Warner considers her initial failure to distinguish the wolf from her grandma as a crucial element within the story, as it creates the tension before the horrific ending of the fairy-tale. Furthermore, critics that exist such as Freud argue that there is evidence of underlying sexual motivations and tensions, evidence of this is the Hungry wolf simply not just eating the poor old grandmother, but he fell upon the good woman.  [12]  Feminist critics portray this as an image of rape and sexual tension. In addition, before he sadly digests the young girl he invites her to bed, come and lie down with me.  [13]  This can be seen as another sexual connotation within the tale, and also a disturbing image for its older audience. Thus being an innocent, clueless little girl she climbs into bed with him. Therefore by disobeying her mothers instructions and talking to strangers Freud dramatically insinuates that this struggle can only lead to her death which is the exact fate of Little Red Riding Hood, as he ate her up too.  [14]  The terrifying ending makes the tale seems more realistic leading to the moral at the end of the story of not talking to strangers and stay ing to paths in life you are familiar with; Bettelheim says it deliberately threatens the child with its anxiety producing ending.  [15]   Moreover, the tale of Little Red Riding Hood has been seen to undergo adaptation in relation to society of the time. Hence, in comparison to Perraults version, The Company of Wolves by Angela Carter. This can be found in her selection of short stories within Bloody Chamber. Throughout the short story Carter retells the famous fairytale in a somewhat gothic light. It is said to convey the completeness of corruption and unconventional ideas of sexuality and an ability to defend one using characteristics which are usually conveyed through a male such as slyness and confidence.  [16]  However, unlike the Perraults version, it takes place in a mountainous country on Christmas Eve in the dead of winter. Thus, in comparison to Perrault there are no flowers or sunshine present for the little girl to get distracted by on her walk to Grandma. Angela spends the first part of the story telling the reader terrifying folk tales of wolfs and werewolves that bombard society and proceed to do ruthless and evil deeds that live to kill. Clearly it adapts with the time within the story when food would be scarce and these creatures are said to lack the ability to listen to reason.  [17]  They are portrayed as forest assassins, grey members of a nightmare.  [18]  They were feared so great that children carried knifes around with them, seen as different to the original Little Red Riding Hood who isnt even warned of the dangers that she could encounter on her journey. In Carters version, the wolves are disguised as men and have to become naked to become a werewolf within the tale, If you spy a naked man in the forest run as if the devil were after you.  [19]  Moreover this can be seen to link to Perraults version, as it holds the notion of sexual tension and desires and involves the wolf as a sexual predator, a symbol of bo th danger and desire. However, Carters version holds a twist within the tale in that the young girl is able to triumph, by adapting her new found sexual desires and power and thus, gives in to notions of somewhat carnal desire, unlike Perraults characters that are seen to be weak and unable to fend for themselves. Furthermore, similar to Perraults version we see Little Red Riding Hood again to be all innocent as she is described as an unbroken egg, a sealed vessel  [20]  and also beautiful with pale skin and dark hair. In addition, as before she is taking food to her sick grandmother; however we see a sense of time and self-defence within this tale as she takes a large knife for her 2 hour trip,  [21]  and we are told its Christmas Eve again portraying that sense of time and place. However, due to her naivety and the way she has been brought up se doesnt think she is in danger as she is too loved to ever feel scared.  [22]  She is portrayed as the most beautiful and young girl in the family thus they want to keep her young. However, the difference between this girl and Perraults version is that she has a notion of menstruation and sexual readiness about her evidence of this is, the childs cheeks are an emblematic and scarlet white.  [23]  This portrays the young girl as being o n the verge of puberty and menstruation, thus adding to the idea of her vulnerability. This is further shown when she bumps into the wolf in the forest who is in fact a hunter and finds him immediately attractive. Compared to Perraults version of events Little Red Riding Hood makes friends with this stranger and foolishly lets him carry her basket which has her knife in. After a long walk, and when she has told him were she is going, he bribes her with a kiss for the winner of whoever gets to grandmas house first. Liking this idea she agrees and allows him to leave with her basket, this gives the image of bargaining with the notion of seduction. Unlike before little red riding hood shows her adolescence and sticks to the path shes on. However, she walks slowly to ensure he gets his kiss again showing her sexuality and desires. The wolf arrives at the grandmothers house as a completely different person that we have just witnessed before; he is chewing meat of his catch like a savage. Carter then links in the sexual connotations as he strips naked revealing a naked, hairy, lie covered body,  [24]  and his nipples that are as red as poison fruit.  [25]  He then devours her. However disgusting this image, it is portrayed as somewhat attractive and sexually arousing. The grandmother within the tale is old and feeble as in Perraults version also, however, she lives alone with her dog and bible. In the past she has lived her life as a devoted Christian and wife. She throws the bible at him showing some self-defence which the original grandmother doesnt even attempt in Perraults version, sadly though this isnt enough to help her against the wolf that is upon her. He then disposes all evidence and waits for the girl to arrive. Unlike the little girl in Perraults version upon her arrival in Carters short story she immediately realises that something isnt right and senses danger in grandmothers house, fear does her no good so she refuses to be afraid.  [26]  When she arrives there are uses of the same rhymes within the Perraults version, thus showing connections within the adapted version. However, in this tale the girl sees the wolf as strange, unknown creature and thus gives him his owed kiss and starts to undress herself. It is argued by Bettelheim that we can see Little Red Riding Hood wear her desires and sexuality literally on her sleeve. This is seen through her cape, as it portrays a sexual readiness and again symbolising menstruation and blood that she will shed when she loses her virginity. She shows a somewhat sexual power that allows her to intoxicate the lustful creature, small breasts gleamed as if snow had entered the room.  [27]  Evidently, the seduction gets reversed and we see the p ower shift as the girl becomes the sexual creature within the tale. This can be seen as the reason why grandma and the original little red riding hood didnt survive, she was old and lacked wit and tactfulness, Little Red Riding hood refuses to be weak and vulnerable as she survives and sacrifices her virginity to save her life, showing that self-defence that the original girl didnt have. She comments on the wolves teeth as in the original but when the wolf says all the better to eat you with  [28]  instead of screaming and having her fate decided, she laughs and says im nobodys meat  [29]  , Bacchilega interprets this meaning as acting out sexual desires offering her flesh not meat, hence sacrificing her body to him sexually then burning her cape in order to become one of the werewolves herself and adapt to his kind. The cottage is then surrounded by wolves howling a marriage song and the girl engages in a marriage ceremony conducted by the choir. Thus feminists state that s he does not call upon god or scream or get eaten. She freely exercises her own sexual power, trusting her own nature.  [30]  This then leads to sleeps in grannys bed, between the paws of her tender wolf.  [31]  A disturbing image towards its audience. It is also interesting to see that Carter uses a werewolf instead of a wolf that is used in Perraults version. Timmer states that this produces a moral message to its audience, whether that be children or adults that people should not judge others, people arent always what they seem.  [32]  Thus using a half wolf half human villain within the story allows us to identify with the wolf as people and maybe realise that we all have a little beast in us at some point. In conclusion, one of the many adapted versions of Perraults implies that sexuality is not something within our society that should be something we loath, fear or runaway from and a bad end, which we see within the Perraults version comes only form those in servile situations. Through Carter, we see the young girl take the power into her own hands and use it without fear or shame in order to survive unscathed unlike Perraults version, what ends in tragedy from both the grandma and Little Red Riding Hood. However, both versions are heavily criticised by many, especially feminists as they say it is full on female liberation that implies the view to the reader that nothing else in the world will save you against such horror and the only way to survive is through temptation, desire and the ability to fight fire with fire.