Thursday, March 26, 2020
Sibling Influence Advantages and Disadvantages Essays -
Sibling Influence Advantages and Disadvantages Luther Hazley Upper Iowa University 4/ 27 /2017 Sibling Influence Siblings : m ost of us have them. We grow up together, we fight together, we team up against other siblings together and most of all we love each other. The family structure and the characteristics of each sibling plays an important role on each sibling's relationship. Even though siblings are reared together in the same household, they are different and it is these differences that have the greatest impact on sibling relationships. If you think back to when you were growing up, you and your siblings were very close. It did not matter what the situation was, yo u were one. But as you gre w up , you slowly start ed taking on d ifferent ideas, thoughts, beliefs and personalities . Some would say the individual's social environment or the quality of parenting, which has the great est impact on each sibling . The sibling's environment, which has both positive and negative influences, also have advantages and disadvantages, w hich influences each siblings past, present and future well-being. Most social learning theories suggest that, in addition to learning through their own behaviors and actions, individuals form different ideas about life and learn new behaviors through the observation of others . According to Bandura (1977) , there are several necessary conditions for learning from observation and subsequent imitation. First, a model must possess qualities that attract attention; one of the most important determinants of whether a model will attract another person's attention is the frequency of contact with the model. Because youth spend so much time with their siblings (e.g., McHale and Crouter, 1996), sisters and brothers are potentially very salient models. Bandura also suggested that models will attract an individual's attention if they possess attractive qualities, including power and nurturance . Now there are advantages and disadvantages of being siblings. Some disadvantages I saw were my aunt's children when they w ere growing up. The first born child was very creative and smart while the eldest sibling ten ded to be more focused on family loyalty and traditional achievements. The se two siblings was m ore obedient and responsible than the other siblings. Because they were more obedient, I believe they were this way because my aunt spent more time with them. My mother's sister raised six children. The first was a boy who did a lot of cleaning, cooking and outside work around the house . T he next child was a girl who was bossy and could be very aggressive at times to the other young er girls in the family. The n ext sibling was smart and could figure out what the two oldest siblings where up to all the time. I noticed that the middle child would call the older two siblings dumb because she was shrewd. The remaining three other siblings were left to defend for themselves all the time . Because they were the middle siblings, they were often pick ed on by the older and youngest siblings. An example would be, m ost of the time the youngest sister would cry to her parents about something the other siblings had done, just to get them in trouble. According to psychologist and the New York University adjunct professor (Ben Dattner ), t he first born are achievement - oriented and eager to please parents . Some of the disadvantages of being a younger sibling would consist of always being compared to how the older sibling s act or think. It's hard to live up to the older sibling , especially if the older siblings were good in school. Teachers and coaches compare the younger sibling to the older ones by IQ or athletics. Another disadvantages are the younger sibling s are forced to do thing earlier in life in order to keep up with older siblings . The older siblings are complain s that younger sibling s are always getting a break. One last disadvantage is that the young er siblings always get the hand-me downs. Some advantages of sibling influences would be that older siblings are able to mentor their younger siblings. There are instances when the younger
Friday, March 6, 2020
What is Geography
What is Geography Free Online Research Papers What geography is: Geography is about countries and lands. We study about countries all over the world. There are three kind of geographical descriptions. These are human geography, physical geography and environmental geography. All about Latitude and Longitude: Longitude and latitude is a system of lines used to find the location of any place, on the surface of the earth. Lines of latitude run in an east-west direction. Lines of longitude run in a north-south direction. The prime meridian is the imaginary line which goes across the earth. The meridian runs from the north pole to the south pole. The prime meridian runs through the Greenwich Observatory in London. There are 5 lines of latitude running through the earth. The Artic Circle, the Tropic of Cancer , the Tropic of Capricorn , the Antarctic Circle , and finally the most important one is the Equator. About maps and grid references: A map shows you the world. There are different kinds of maps. On a map different things are coloured in so you know whatââ¬â¢s what. On a map you can see where you are if youââ¬â¢re lost. Here are some examples of different kinds of maps: World Maps Park Maps Europe Map School Maps Country Maps Shopping Center Maps County Maps Tourist Maps Settlement maps GPS Navigation System Grid references help you find any place on a map. There are two kinds of grid references. Normal grid references and six figure grid references. The imaginary lines are shown on the maps so you can find stuff. The little squares on the map are numbered , so in the index whatever the places number is you can find it very easily. On most of the maps there is a scale about the length of the roads. There are also lots of keys what let you know about shops and things. This is how you use grid references and maps. Things about settlements: A settlement is where people live. It could be a hamlet, village, town or city. Settlements are built on different sites. A site is the land where the settlement is built on. In a settlement there are lots of dwellings, but it depends how big the settlement is. A dwelling is where people live (House or flat). Before you choose a settlement you have to look at the factors of the settlement. There are good factors and poor factors. If you choose a settlement it shouldnââ¬â¢t have many poor factors, because it would have many faults while you live there. The way settlements grow: All the settlements have grown a lot since the older times. More people come to the area and settle down to live. The people can come for work and all sorts of stuff. Lots of people make families and have children and so on, and so onâ⬠¦Ã¢â¬ ¦ The settlement hierarchy shows you how many settlements there are. Here is an example for one: The settlement hierarchy shows you how many types of settlements there are and how many of them. The bigger the settlement is the less there is. Research Papers on What is GeographyAssess the importance of Nationalism 1815-1850 EuropeAppeasement Policy Towards the Outbreak of World War 2PETSTEL analysis of IndiaThe Effects of Illegal Immigration19 Century Society: A Deeply Divided EraWhere Wild and West MeetCanaanite Influence on the Early Israelite ReligionNever Been Kicked Out of a Place This NicePersonal Experience with Teen PregnancyResearch Process Part One
Wednesday, February 19, 2020
What benefits will your college education provide you in your personal Essay
What benefits will your college education provide you in your personal and professional lives - Essay Example college education for my personal life will include development of good peer relationships, increase in self-confidence, awareness of various social issues, development of a good personality, awareness of different types of professional fields of life, and increased opportunities to perform recreational activities. The most important benefit, which I believe to come out of college education for my personal life, will be the development of new relationships with the people studying with me in the college. The benefits of college education for my professional life will include increased job opportunities, good salary package, career evolution, opportunity to excel in professional life, improvement in decision-making skills, ability to raise opinions based on knowledge, and increase in self-confidence. The most important benefit, which I believe to come out of college education for my professional life, will be the increased number of job
Tuesday, February 4, 2020
Is extreme obedience necessary for society Essay
Is extreme obedience necessary for society - Essay Example Extreme obedience leads to compliance of social norms in society. It ensures that people follow the set rules in society, thus promoting law and order in the society. Such obedience makes it easy for authority bodies to exert laws, which promote co-existence in the society. The obedience also makes it possible to establish hierarchies in organizations as there must be people at the top of an organization, as well as subordinates for organizations to function effectively. The Milgrim experiment provides a case that depicts compliance to extreme obedience. The experiment involved a research aimed at studying the effects of punishment on learning. The subjects of the experiment were given the role of a teacher, and were meant to make another subject learn a list of word pairs (McLeod, 1). They were then to give the learner an electric shock, and increase the shock level every time the learner made a mistake. Two thirds of the teachers used in the experiment administered the highest level of the electric shock, despite the learner complaining of pain. This experiment showed that authority figures have capacity to exert extreme obedience on their subjects. The teachers were commanded by an authority to administer high levels of pain, and most of them acted in response to the commands, thus administering the highest level of the electric shock. However, one third of the research subjects did not administer the highest level of the electric shock, which means that not everybody follows the given orders strictly. The Zimbardo jail role-play involved the use of students to play the role of prisoners and guards (Zimbardo 1). Those who took up the role of guards acted in extreme brutality, while those in the role of prisoners acted in complete obedience to the guards. This showed that people, and in this case the prisoners tend to obey orders given by authority figures. Extreme obedience helps in ensuring that rules are
Monday, January 27, 2020
Secure Data Retrieval Based on Hybrid Encryption
Secure Data Retrieval Based on Hybrid Encryption SECURE DATA RETRIEVAL BASED ON HYBRID ENCRYPTION FOR DISRUPTION-TOLERANT NETWORK Kollipara Durgesh, Dr.P. Sriramya I. ABSTRACT Military network is one of the most important network in any country but this network mostly suffers from intermittent network connectivity because of the hostile region and the battlefield. To solve the network problem faced by the military network we use Disruption-tolerant network (DTN) technologies which is widely becoming the successful solution. This technology allows the people to communicate with each other to access the confidential data even in the worst network by storing the data in the storage node. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Two types of encryption are used for the security. The two algorithms are Advanced Encryption Standard (AES) and Java Simplified Encryption (Jasypt). These two algorithms are combined to provide the secure data which is even more difficult to decrypt the confidential data by unauthorized people. In this paper, we propose a secur e data retrieval scheme by generating a new secret key each time when the user sends a secure data to the destination, this proposed method enhances the security of the confidential data. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant network. Keywords: Disruption-tolerant network (DTN), Advanced Encryption Standard (AES), Java Simplified Encryption (Jasypt), secure data retrieval II. INTRODUCTION In most of the military network it is very difficult for the soldiers and majors to communicate with each other because of theà difficult network environment and even if there is no proper to end-to-end connection between the sender and the receiver. Disruption-tolerant network (DTN) are widely used in the networks were there is no proper end-to-end connection between the sender and the receiver. In this paper we choose DTN to communicate between the soldiers and the others. Initially, if the end-to-end connection is missing between the source and destination pair the data from the source node has to wait until the network is recovered in the intermediate node which can be easily hacked by the third party user hence to solve this critical problem we use storage node which is introduced in the Disruption-tolerant network where in only the authorized users can access the respective data. Most military data are said to very confidential and hence we use confidential access control methods that are cryptographically enforced. Here we provide different access services for different users that is the admin decides in who access the data based on the respective designation of the users. The registration of the user is completed only if the admin accepts and verifies the usersââ¬â¢ account to be valid but if the user is not authorized he will not be allowed to access the data in spite of the registration. For example if the ââ¬Å"user 1â⬠sends a data to the ââ¬Å"user 2â⬠the data will be encrypted by combining two algorithms such as AES and Jasypt and the resulted data will be encrypted and stored in the storage node where even if there is no end-to-end connection between the source and the destination pair the data will be secured in the storage which can be accessed by the respective authorized person. 111. ALGORITHM A. Advanced Encryption Standard (AES) The Advanced Encryption Standard (AES) algorithm is used in this paper to provide secure data retrieval scheme. AES algorithm is chosen to be used in this paper because it is said to be more secured which supports most of the secure retrieval scheme. This algorithm is considered to be more secured because it is more widely used by the U.S. government to protect classified information and is implemented in hardware and software throughout the world to encrypt secure and confidential data. AES comprises three block ciphers, AES-128, AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of 128à bitsà using cryptographic keys of 128-, 192- and 256-bits, respectively. (Rijndael was designed to handle additional block sizes and key lengths, but the functionality was not adopted in AES.) Symmetric or secret-key ciphers use the same key for encrypting and decrypting, so both the sender and the receiver must know and use the sameà secret key. All key lengths are deemed sufficient to protect classified information up to the Secret level with Top Secret information requiring either 192- or 256-bit key lengths. There are 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys a round consists of several processing steps that include substitution, transposition and mixing of the inputà plain textà and transform it into the final output ofà cipher text. Various researchers have published attacks against reduced-round versions of the Advanced Encryption Standard, and a research paper published in 2011 demonstrated that using a technique called a biclique attack could recover AES keys faster than a brute-force attack by a factor of between three and five, depending on the cipher version. Even this attack, though, does not threaten the practical use of AES due to its high computational complexity. In this paper AES is used along with the DTN technologies because of the many security and privacy challenges. Since some users may change their associated attributes at some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each attribute is necessary in order to make systems secure. For example, if a user joins or leaves an attribute group, the associated attribute key should be changed and redistributed to all the other members in the group. B. Java Simplified Encryption (Jasypt) The other algorithm used in this paper is Java Simplified Encryption (Jasypt), it is chosen for the hybrid encryption for a full secured mode to provide secure data retrieval of confidential data. This algorithm is combined with the AES algorithm to provide hybrid encryption. The final challenge in this paper is to provide a new secret key each time a user sends a secret data to the receiver. The secret key generated is unique and it generates a new key each time, which is even more secured for the secure data retrieval. The admin plays a vital role here to manage the overall source and destination pair but the admin is not authorized to access the information because the secret key is generated automatically which is sent to the receiverââ¬â¢s personal account which is not managed by the admin. Fig 1. Architecture of secure data retrieval in Disruption Tolerant Network (DTN) IV. EXISTING SYSTEM The existing system comprises a concept of attribute-based encryption (ABE) is a promising approach that fulfills the requirements for secure data retrieval in DTNs. ABE features a mechanism that enables an access control over encrypted data using access policies and ascribed attributes among private keys and ciphertexts. Especially, ciphertext-policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy. The problem of applying the ABE to DTNs introduces several security and privacy challenges. Since some users may change their associated attributes at some point (for example, moving their region), or some private keys might be compromised, key revocation (or update) for each attribute is necessary in order to make systems secure. However, this issue is even more difficult, especially in ABE systems, since each attribute is conceivably shared by multiple users (henceforth, we refer to such a collection of users as an attribute group). V. PROPOSED SYSTEM In the proposed system we use hybrid encryption by combining two algorithms and hence we enhance the security of confidential data. Here the admin keeps in track of all the users account hence even if the attribute of the particular user is changed, the admin makes the notification of the changes. Thus, the disadvantages of the existing system is solved. Unauthorized users who do not have enough credentials satisfying the access policy should be deterred from accessing the plain data in the storage node. In addition, unauthorized access from the storage node or key authorities should be also prevented. If multiple users collude, they may be able to decrypt a ciphertext by combining their attributes even if each of the users cannot decrypt the ciphertext alone. VI. MODULES Key Authorities module The key generation module generates secret key where the hybrid encryption occurs using AES and Jasypt algorithm. This key generation is very efficient because it combines the two encryption and produces the secret code. In this paper to increase the security of the military network, the secret key generated by the hybrid encryption is sent to the users personal email id, so that even the admin who manages the entire network will not be able to access the confidential data. Storage node module In the storage node module, the data from the sender is stored even when there is no stable network between the sender and the receiver since, we use Disruption Tolerant Network (DTN). The storage node consists of the encrypted data where only the corresponding receiver can access the respective data. To access the data from the storage node the receiver has to specify the secret code which is generated by the hybrid encryption and is secretly mailed to the receiver. Sender module The sender module is the one who holds the confidential data and wishes to store them into the external data storage node for ease of sharing or for reliable delivery to users in the extreme networking environments. A sender is responsible for defining (attribute based) access policy and enforcing it on its own data by encrypting the data under the policy before storing it to the storage node. Fig 2. Hybrid Encryption of secret message User Module This the last module which tends to access the confidential data from the sender which is stored in the storage node. The receiver has to provide the correct secret key which will be sent to his corresponding mail id. If a user possesses a set of attributes satisfying the access policy of the encrypted data defined by the sender, and is not revoked in any of the attributes, then he will be able to decrypt the cipher text and obtain the data. VII. CONCLUSION DTN technologies are becoming successful which allows for the communication between devices which do not have stable network and hence this can be more efficiently used in the military network. AES and Jasypt are scalable cryptographic solution to the access control and secure data retrieval. In this paper we proposed efficient data retrieval method using hybrid encryption by combining two algorithms. The encrypted data is then stored in the storage node which can be accessed only by the corresponding user by providing the respective secret key. In addition admin monitors all the attributes of the users which allows fine-grained key revocation for each attribute group. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network. VIII. REFERENCES [1] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, ââ¬Å"Maxprop: Routing for vehicle-based disruption tolerant networks,â⬠in Proc. IEEE INFOCOM, 2006, pp. 1ââ¬â11. [2] M. Chuah andP.Yang,ââ¬Å"Nodedensity-basedadaptiveroutingscheme for disruption tolerant networks,â⬠in Proc. IEEE MILCOM, 2006, pp. 1ââ¬â6. [3] M. M. B. Tariq, M. Ammar, and E. Zequra, ââ¬Å"Mesage ferry route design for sparse ad hoc networks with mobile nodes,â⬠in Proc. ACM MobiHoc, 2006, pp. 37ââ¬â48. [4] S.Roy and M.Chuah,ââ¬Å"Secure data retrieval based on cipher text policy attribute-based encryption (CP-ABE) system for the DTNs,â⬠Lehigh CSE Tech. Rep., 2009. [5] M. Chuah and P. Yang, ââ¬Å"Performance evaluation of content-based information retrieval schemes for DTNs,â⬠in Proc. IEEE MILCOM, 2007, pp. 1ââ¬â7. [6] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, ââ¬Å"Plutus: Scalable secure file sharing on untrusted storage,â⬠in Proc. Conf. File Storage Technol., 2003, pp. 29ââ¬â42. [7] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, ââ¬Å"Mediated ciphertext-policy attribute-based encryption and its application,â⬠in Proc.WISA, 2009, LNCS 5932, pp. 309ââ¬â323. [8] N. Chen, M. Gerla, D. Huang, and X. Hong, ââ¬Å"Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,â⬠in Proc. Ad Hoc Netw. Workshop, 2010, pp. 1ââ¬â8. [9] D. Huang and M. Verma, ââ¬Å"ASPE: Attribute-based secure policy enforcementà in vehicular adho cnetworks,â⬠AdHocNetw.,vol.7,no.8, pp. 1526ââ¬â1535, 2009. [10]A.LewkoandB.Waters,ââ¬Å"Decentralizing attribute-based encryption,â⬠Cryptology ePrint Archive: Rep. 2010/351, 2010. [11] A. Sahai and B. Waters, ââ¬Å"Fuzzy identity-based encryption,â⬠in Proc. Eurocrypt, 2005, pp. 457ââ¬â473. [12] V. Goyal, O. Pandey, A. Sahai, and B. Waters, ââ¬Å"Attribute-based encryption for fine-grained access control of encrypted data,â⬠in Proc.ACMConf.Comput.Commun.Security,2006,pp.89ââ¬â98. [13] J. Bethencourt, A. Sahai, and B. Waters, ââ¬Å"Ciphertext-policy attributebased encryption,â⬠in Proc. IEEE Symp. Security Privacy, 2007, pp. 321ââ¬â334. [14] R. Ostrovsky, A. Sahai, and B. Waters, ââ¬Å"Attribute-based encryption with non-monotonic access structures,â⬠in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 195ââ¬â203. [15] S. Yu, C. Wang, K. Ren, and W. Lou, ââ¬Å"Attribute based data sharing with attribute revocation,â⬠in Proc.ASIACCS,2010,pp.261ââ¬â270. [16] A. Boldyreva, V. Goyal, and V. Kumar, ââ¬Å"Identity-based encryption with efficient revocation,â⬠inProc.ACMConf.Comput.Commun.Security, 2008, pp. 417ââ¬â426. [17]M.Pirretti,P.Traynor,P.McDaniel,andB.Waters,ââ¬Å"Secure attribute based systems,â⬠inProc.ACMConf.Comput.Commun.Security,2006, pp. 99ââ¬â112. [18]S.RafaeliandD.Hutchison,ââ¬Å"A survey of key management for secure group communication,â⬠Comput. Surv., vol. 35, no. 3, pp. 309ââ¬â329, 2003. [19] S. Mittra, ââ¬Å"Iolus: A framework for scalable secure multicasting,â⬠in Proc. ACM SIGCOMM, 1997, pp. 277ââ¬â288. [20] P.Golle, J.Staddon, M. Gagne,and P. Rasmussen,ââ¬Å"A content-driven access control system,â⬠in Proc. Symp. Identity Trust Internet, 2008, pp. 26ââ¬â35. [21] L.Cheungand C.Newport,ââ¬Å"Provably secure cipher text policy ABE,â⬠inProc.ACMConf.Comput.Commun.Security,2007,pp.456ââ¬â465. [22] V.Goyal, A.Jain,O.Pandey, and A.Sahai,ââ¬Å"Bounded cipher text policy attribute-based encryption,â⬠inProc.ICALP,2008,pp.579ââ¬â591.
Saturday, January 18, 2020
How Does Medieval Literature Exhibit the Roles of Men and Women Essay
How Does Medieval Literature Exhibit the Roles of Men and Women Introduction à à à à à à à à à à à The medieval literature is full of stories of the perilous adventures and the valorous heroes. Many sections of the medieval literature are ironic and usually comprise a message. The characters in the medieval literature are frequently kings, knight, or Queens, such as in the Chaucerââ¬â¢s, Sir Gawain, the Canterbury tales, and the Greek knight. Majority of the supporting characters in these tales are in one-dimensional and defined by their roles and tasks in the society. However, the main characters in the medieval literature exhibit the sign of independence and are not exclusively defined by the societyââ¬â¢s expectations. à à à à à à à à à à à In the Knight, the medieval realms never appeared to be surprise whether women are nobles or peasants, they were not only confined to household duties such as cooking, sewing, spinning and weaving but also hunted food and fought in battles. In the wife bathââ¬â¢s tale, a knight the major character raped a woman .From this it shows that the women rights were not valued and any one in top authority could violate these rights without any of the consequences for Knight violated the right willingly (Chaucer, 119). à à à à à à à à à à à In addition, the women were not valued much to men; there was no equality of women to women. This is well illustrated when the immortal Knight, must do everything he can to find out what women want in their lives, orders from the queen. When he meet old woman after he had travelled almost everywhere, the woman responds to the question that all they want is to be equal to men. In another incident is evident that women are not esteemed or rather not much repudiated .Another Knight often insults the woman who agreed to marry. He calls her ugly and evil, he berates her in every imaginable way. He does not appreciate her stature appreciate her stature and blemish the reputation of all women (Chaucer, 136). à à à à à à à à à à à Sir Garran exhibits the position men should hold on the society, According to him, men should be there to respond to the challenges facing the women. He faces critics from other Knights when he says that each should be unique in the way that they respond to the challenges and in the way, they perceive their roles in the society .In addition, he says that they must preserve their integrity and reputation. When one of Knight insults the woman married, Sir Garwan responds that should not happen to knights (Bennett, 121). à à à à à à à à à à à As the role of women is portrayed in the tale, the vulnerable and Assertion of the wife of Bath community was very different in Chaucerââ¬â¢s time; the women were suppressed and the men dominated the society. The destructive and manipulative nature of the women was much emphasized by men. Just like eve in the bible, the women were blamed for the failure/downfall of a man. Through the Bath of wife, Chaucer tries to investigate the hardship of the self-realization in a woman in the restricted environment. Alison, the wife of bath, symbolizes antifeminism searches and stereotypes for peace and happiness in a patriarchal community. Unluckily, Alison is never in harmony with who she actually is as woman (Chaucer, 105). Chaucerââ¬â¢s uses a series of satires to ultimately illustrates that under her apparently certain appearance; there conceal the soul of a defenseless, lost woman. In Green Knight and Sir Gawain, Sir Gawain is as well a kni ght. He is from King Arthurââ¬â¢s Knights of Round Table, a very important at that time. The Knights were anticipated to be brave, honest, and chivalrous. After the Green Knight proposes and enters his dispute, Sir Gawain is courageous enough, as the knight could be, to intensify to the challenge. à à à à à à à à à à à As we see from these tales, men are portrayed to be courageous, honest, and hardworking. The men in the society dominate the women. These show the lowed position of women in the society. They are discriminated, and viewed to have negative effect in the society. The man decides the roles of their women and has power of them. à à à à à à à à à à à The control and dominance in the wife of Chaucer is the Wife Bath story. Alison, the main character recognizes dominance of his husband as the major purpose of her story and life. Alison is a headstrong and controlling woman. She desires to dominate her husband. She trusts that, in order to be her companion, a man needs to be submissive and that she remains the head of the household. Although she has been married for several times, she has never accepted to be dominated by a man. She says out of her five marriages, two were bad husbands and three were good husband. The wife of the Bath is aggressive to get what she wants and nothing can stop her because she lives for dominance. à à à à à à à à à à à In conclusion, characters in the medieval literature are different and unique in their behavior; however, each character plays a role to exhibit the role of men and women in the society. According to Albert in his book Medieval Sexuality, a girl says ââ¬Å"I canââ¬â¢t mind if am beaten by man but a womanâ⬠¦Ã¢â¬ (52).This shows that characters in the book do not exhibit understanding of their rights and roles as men and women they should hold in the society. In medieval literature it is evident that women had hard times while men lived harsh lives, perhaps all in effort to perform their roles. References Chaucer. ââ¬Å"Conversion and Convergence: The Role and Function of Women in Post-Medieval Icelandic Folktales.â⬠Scandinavian Studiesà 2 (2012): 165. Blumenfeld-Kosinski, Renate. ââ¬Å"Medieval Life Cycles: Continuity And Change.â⬠à Medieval Reviewà (2014): Source document
Friday, January 10, 2020
Foreign Bodies
When All is Lost, Faith Remains Many people find themselves in a constant struggle of faith. These individuals are often questioning if there is a God, and if there is how does one know. In Hwee Hwee Tanââ¬â¢s novel, Foreign Bodies, there is a struggle of faith in each of the four main characters. Mei and Andy are two of these characters that are able to come to faith in the Christian God after life altering experiences. These experiences have caused each of them to analyze and attack life in different ways.Each of these individuals have been able to overcome a treacherous past, and find faith, hope, desire and justice in their futures through Tanââ¬â¢s novel. Meiââ¬â¢s religious views are consistent throughout the novel, Foreign Bodies. Though she was born into a Confucianism based family, Mei chose at a young age to throw her traditional Singaporean beliefs to the side, and walk in the light of God, with her Uncle Cheongââ¬â¢s guidance, through faith in Christianity. It was a brutal shock to Meiââ¬â¢s grandfather when he finds out she no longer believes in her familyââ¬â¢s faith.This conversation arises as Meiââ¬â¢s grandfather is telling her how to reduce her time in hell. ââ¬Å"After I die, you going to feed me or not? â⬠Gong Gong is shocked when Mei replies that she will be unable to. He immediately responds by asking who is responsible for the change in Meiââ¬â¢s beliefs. He is not surprised when she responds with Uncle Cheong. As a child everyone has a hero they look up to. Uncle Cheong is Meiââ¬â¢s hero. ââ¬Å"In my eyes Uncle Cheong could do no wrong. Even his farts smelled like Aramis No. 7.With the heart of Mother Teresa and the body of Tom Cruise, Uncle Cheong was my heroâ⬠¦Ã¢â¬ Meiââ¬â¢s adoration allowed herself to be susceptible to Uncle Chongââ¬â¢s stories and views of God. She loved when he would tell her stories about her newfound savior. A key role in the strengthening of Meiââ¬â¢s faith in G od was due to the incident at Red Hill. Mei has oppressed this tragedy in her memory for many years, and only a few people are aware that it took place. As a four year old, Meiââ¬â¢s father took her to Red Hill to run and play with her lantern. It was the time of year when Mid-autumn was celebrated.At Red Hill, Meiââ¬â¢s father raped her. While this was occurring Mei sent multiple prayers up to her God. ââ¬Å"I used all the prayers I knew, all the prayers Uncle Cheong had taught me. â⬠Meiââ¬â¢s connection with God helped her get through her father raping her. She no longer felt the pain after she started to seek Godââ¬â¢s help through prayer. Without the help of God, Mei may not have been able to become the person she is today. It is a miracle that Mei was able to recover physically, emotionally, and most important spiritually from this tragedy.One might have suspected that she would have lost all faith in God, for letting her father hurt her the way he did. This incident proves how strong Mei has faith in God. She has accepted that he will always be there for her, to watch and protect over her, even though it may not be immediately. Meiââ¬â¢s ultimate view of evil is seen through her view of evil being extremely prevalent throughout society. She believes that when someone close to her commits an act of wrong, it is her responsibility as a good Christian to fix their mistakes.This was seen in multiple events throughout the novel. Mei, with the push of her fatherââ¬â¢s will, believed that her mother is not able to take care of her own finances. Mei took on the burden of regulating her motherââ¬â¢s money, and frequently became frustrated and irritated with the way her mother wants to spend her mother. ââ¬Å"My mother was a sucker for sales. She would go for anything which said ââ¬ËOffer ends today. ââ¬â¢ She was the type who would mass-buy toothpicks. â⬠This quote displays the burdens Mei takes on with caring for her moth er.Mei is constantly trying to fix her motherââ¬â¢s life and teach her values that Mei finds important. Meiââ¬â¢s views on evil and religion are very different from Andyââ¬â¢s views of God. At the beginning of the novel Andyââ¬â¢s view of evil directly stems from his belief in the absence of God. Andy wishes to find some sort of proof that there is a God and goodness in the world, and he wants to be able to feel and understand God by himself. He denies the presence of this goodness and God in the beginning of Foreign Bodies by placing his desires into football teams. Too mediocre to ever achieve anything great in life by my own merits, I latched my personal identity onto something which could achieve greatness for me: a football club. â⬠When Andy establishes his stance on religion at this point of the novel he is stating that he wants something great, but he is lost as to what this greatness is. Many individuals would seek a religion to fulfill these desires, but A ndy is content with placing his dreams on a football team. Though Andy in the beginning of the novel considers himself a ââ¬Å"lapsed atheistâ⬠, he develops and changes throughout to become the person he eventually intended to be.Andyââ¬â¢s conversion to faith in God was originally not self-motivated. Andy seemed to have an eye for Mei, and Mei did not want a relationship with an individual that had spiritual beliefs different from hers, let alone none at all. After they start dating and Andy enters trail Mei accuses him of having no spiritual beliefs at all. ââ¬Å"You faked it all, pretending to have seen Jesus, giving up gambling. You only said that to trick me into going out with you. â⬠Andy gives no response as Meiââ¬â¢s statement is partially true, but Andy always did have hope that there was something more out there.Andy continuously hinted to the reader that he wanted something more to believe in. He may not have had the same extent of belief in God that Me i does, but she had no right to call him out as a complete non-believer. Though Meiââ¬â¢s push for Andy to find a spiritual safe haven was unsuccessful, the trail that Andy was put on gave him the final push to help him find God. Andy had been put on trial in Singapore for gambling on football games. This action had been legal in England where Andy had lived before his move to Singapore.Even though he was innocent of the charges against him, another individual who had hopes of framing a different man set him up. Once the trail began, and all of his friends had left him to face the charges alone, Andy had no other option, but to turn to God. He was an innocent man that stood no chance of winning his court case. Andy knew that he would be spending the next three years in jail, and he needed something to help pull him through when everyone else abandoned him. This abandonment caused Andy to put his trust and faith into he newfound God. ââ¬Å"He slay me, yet I will trust him. This s tatement made by Andy in a letter to Mei proves that he came to God on his own free will without the help of anyone else. The absence of God that Andy once felt in his life has been removed due to his newfound faith. ââ¬Å"I love God not for what He gives, but for who He is. I love him because He is God. I donââ¬â¢t care how much He hurts me, I will still love him, because no matter what I do to Him, He will still adore me. â⬠The words could never be confessed from a straight atheist. Andy has always had hope and desire that there was some form of good out there for him, it just took longer than expected to find it.Though Mei and Andy are both believers in the Christian God, the experiences and challenges they both overcame to come to faith are extremely different, but still have similarities. Both of these individuals are able to forgive. Forgiveness in the Christian church is a huge belief, as God has forgiven each of us as individuals. Without this learned tool of forgi veness Mei would never have been able to forgive her father, and Andy would not have been able to forgive Mei for abandoning him in his time of urgent need.Mei and Andyââ¬â¢s views in God help define who they were as people, and who they aspire to be. God is ever present in both of their lives, giving them hope to take on the challenges that are waiting to cross their paths in the future. ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â [ 1 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 20. [ 2 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 21. [ 3 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 248. 4 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 149. [ 5 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 124. [ 6 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 222. [ 7 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 45. [ 8 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 277. [ 9 ]. Tan, Hwee Hwee. Foreign Bodies. (New York: Washington Square Books, 1997), 278.
Subscribe to:
Posts (Atom)