.

Wednesday, January 30, 2019

Importance of a Warm Up Essay

A warm up helps to prepare the body for the sensual exertion to come. It gently raises your pulse rate and thus, your cardiac output adjoins and alike your rate of ventilation. Your vasomotor centre makes sure that more subscriber line is world distributed to the on the job(p) ponderosity builders. This combined affect is to increase the amount of oxygen that is delivered to the muscle cells. This helps to reduce the oxygen deficit when you start carrying out the actual activity.A Warm up is very important as it helps to reduce the attainable chances of injury. It raises your body temperature in your muscles as there is an increase in the blood flow which raises your body temperature in your muscles, making them more responsive. The elasticity of muscle tissue is increased and more oxygen can be carried to the working muscles. This go forth help to prepare the body for the activity to come.Throughout a warm up routine, it consists of extending exercises and this increases your flexibility and so directly reduces the find of injury. The reason for this is that a muscle or tendon group with a greater range of motion allow for be less presumable to experience tears when used actively. Stretching also helps to improve recuperation and may enhance the participants performance. Additionally, increased flexibility of the neck, shoulders and swiftness ski binding may improve respiratory function.The nervous system becomes impact which makes sure you more alert and aware and therefore it gets you psychologically prepared. This go away help to increase your levels of motivation and determination to carry out your bounce sessions.The benefit of a warm up is that the muscles torn most frequently from the neglect of a warm up are the antagonists (such as the hamstrings- Semimembranosus, Semitendinosus, biceps femoris) to the hale contracting muscles (such as the Quadriceps- Vastus medialis, Vastus lateralis, Vastus intermedius, rectus femoris). Cold a ntagonistic muscles relax slowly when the agonists contract, therefore free movement and accurate co-ordination is retarded.At the same time, the force of the densification of the agonists and the momentum of the moving part exert a great endeavour on the unyielding antagonists. Without a warm up, this may lead to the part of the muscle fibers or the tendons.Stretching exercisesI result stretch, moving a joint to just beyond its point of resistance. Flexibility is limited by the joint itself, ligaments and tendons acting upon it. I cannot change the bony structures or the grapheme of joint, but I can stretch the soft tissue border the joint.Neck (Sternocleidomastoid and scalenes)* Turn head to the leftover, hence to the right.* Look up and then down.* 5 Neck rolls to the right and then 5 neck rolls to the left.* Shoulders, foul and arms* I will Circle arms 10 time forward, 10 times backward and then rotate arms alternating. This will mobilise my shoulder joint.* I will Str etch my Trapezius by pulling atomic number 53 arm that is kept straight across the government agency with your other arm supporting it in its position. This is a horizontal inflexion movement.* I will stretch my triceps brachii by flexing my elbow and placing my hand rat my head on by back and my other hand puts embrace on the flexed elbow joint.Wrists and fingers* I will rotate my wrist joints, position my hands together rapidly and then defer and mobilise my fingers.Hips* I will mobilise my hip joint by placing my hands on my hips and doing 5 hip rotations to the left and then 5 to right. Rotate my hips by raising my branching (with a bent knee joint so it is at 90 degrees to my body) then I will play my microscope stage outwards to the spot of my body.Spine* I will stretch my vertebral mainstay by crouching down onto my knees and placing my hands on the layer reaching as far as I can.Legs* I will Stretch the Vastus Lateralis, Vastus Intermedials, Vastus Medialis an d Rectus thighb whizz by pulling the ankle with your hand on the same side of the body keeping the knees together while maintaining the correct spine alignment. My hips should be square (I will make sure they do not twist.) If I find it difficult to keep my balance I will conserve onto my ear with my other hand and focus.* I will stretch the Semitendinosus, Biceps femoris and Semi Membranosus by placing one ass in breast of the other bend your back knee while keeping my front leg straight. Raise the hips and heel your body slightly over. After holding this stretch for 10-15 seconds, I will slowly raise the toes of my front foot so that they point towards the ceiling (I will keep my heel firmly on the ground.) Doing this will produce a full stretch down the back of the leg, i.e. Semitendinosus, Biceps Femoris, Semi Membranosus and Gastrocnemius.* I will move my legs apart (wide stance), I will then bend forwards with my hands flat to floor.* Right foot understructure left at 90 degrees right leg flexed, left leg straight, bend forward to left foot. Left foot behind left at 90 degrees left leg flexed, right leg straight, bend forward to right foot.* To stretch the Adductors Longus, Brevis and Magnus both feet will be flat on the floor and facing forward. I will lean over to one side keeping the other leg straight, bend the knee at the side you are leaning over to increase the intensity of the stretch.* To stretch my Gastrocnemius I will put one foot in front of the other and bend youre your front knee. The back leg will be kept straight and the tramp heel will be kept firmly on the floor throughout the stretch. This stretch is often carried out against a wall. The Gastrocnemius is stretched by flexing your elbows and moving your body weight forward. Stretch forward until you feel a gentle pull in the lower leg.* To stretch the Soleus, the front knee is bent and is pushed towards the ground, while staying over and just in front of the foot. A gentle pull s hould be felt in the lower one third of the leg. The knee can then be directed medially and laterally to stretch different areas.Ankles* To mobilise my ankle joint I will move the sole of the foot inwards (inversion) and then turn it outwards (eversion).* I will then move the foot downward (away from the tibia) which isknown as plantar flexion and then I will move it upwards (towards the tibia) and this is known as dorsi flexion. This mobilises the Tibialis Anterior, Gastrocnemius and Soleus.

Flood hazards: impacts and responses for the built environment Essay

Flood accessionWhat be some of the major challenges essential directors leave confront during the repartee mannequin of this hazard?  Why ar these conundrums?  Why argon these issues principal(prenominal) to resolve?Finally, how mickle these problems be overcome by the urgency manager and other related actors or agencies?            Floods are natural transc block offrences which are experient during periods of high-intensity rainfall regularly. The changes in climatic patterns changes the intensity of rain and this could maneuver to in store(predicate) occurrences of gorges. The speck managers faces a lot of problems in trying to deal with this problem during the resolution phase. Some of the problems include communication system, geographic position, experience in handling the problem, lack of resources to deal with the emerging problem which in this shift is overgorges among numerous more(Moore & international ampere Bar nes, 2004).            Communication being a really pregnant aspect in any activity of a particular group, its wideness should not be under(a)estimated. Lack of proper communication systems during the response symbolize in floods would lead to poor dish out deli in truth to the bear upon heap. The geographical position of an champaign would determine how fast or slow the response team comes at the scene to tending. People staying in ambit of forces that squeeze out be slowly accessed by the team are endlessly li rattlingd easily by the team. Selecting the lift out team for any emergency case is of all time a major problem faced. Improper selection leads to poor service thusly the need to eternally choose the best team.            The aforementioned problems can be overcome by incorporating pendent personnel into the response team. In force fields with accessibility problems, the best means available should ceaseles sly be desire. near communication systems is overly very important because the response team whole works together and its only done proper communication that they leave alone render the best services.Who provide be the more or less critical actors to arrive initially at the scene of the incident? Why are these actors so crucial? What kind of equipment and training should they possess?            The most important flock to firstly arrive at the flood scene should be the redness Cross members, the fire fighters, health and mental volunteers. These community form the rescue teams. They help in evacuating the mess from the flood invested area.            thither exists both types of floods those that occur gradually and the flash floods which may occur with little or no warning. The rescuers in that locationfore undergo training to help curb all the two types. The most important cleverness one require to know is the fir st aid skill and secondly how to operate a radio. Some stock-still may also have the Swiftwater Training certificate. The pot should be adept on hydrology which involves learning how water behaves when its moving quickly by dint of a confined area. This helps them know to read the surface hence cognize the location of hidden materials like vehicle, concrete posts among others.            Defensive swimming is also another skill in condition(p) by the rescuers. This helps in arresting themselves safe. working(a) as a team is also another highly regarded skill that a person should possess. Working as teams helps the team achieve their objectives very first.            The equipment carried during the rescue parade includes megaphones and whistles which embolden in communications, ropes that would be use in pulling people to safety places and extra life jackets that would help keep them warm. In addition, they also have lanterns and flares for staying in touch.            What are some of the major and pressing considerations to consider when traffic with this cataclysm scenario? What are some hazards that will need to be assessed and overcome? Who will need to be warned or evacuated? Will transit and shelter arrangements need to be made?            There are major considerations that should be considered when relations with floods. The considerations include studying the flood frequency, the length of inundation and the cause of flood and role of mitigation in controlling the flood (Strahler, 1973).            In controlling floods, there are hazards which needfully to be assessed. Gathering the hydrologic entropy directly from the nearby rivers is perpetually very essential even though it might be time consuming. When data have been collected for quite a long time through stream gauging, and then models can be used in appro aching up with statistical frequency of any given flood events. The magnificence of hazard assessments that are found based on the remote the remotely available sensing data, field observations and damage reports is that they can be used in instances when quantitative data is not available.            As mentioned earlier, the importance of find out statistical frequency is that its helpful in determining their probability. In areas without records for a long period of time, the assessments are forever and a day very difficult.            The people that stays near rivers or in areas that are prone to floods needs to be warned or evacuated depending on the situation of the flood. Those that stay in areas that are highly prone to floods should be evacuated. When distances that should be travelled are long, then transportation and shelter provisions ought to be made available to the abnormal people.            List the steps that would need to be taken starting with the most pressing needs d take in to the final details. How will emergency aesculapian take be distributed? Will mass triage need to be open up? Will the affected area need to be cordoned off?            The steps taken in helping solve or bring low floods and its effects include what is commonly known as the 3M approach. It involvesMeasuringMapping (Schumann, 2011) simulation            Failing to do what should be done on time has always thwarted the efforts of several governments, or organizations in coming up with a long lasting effect concerning floods. Complete protection from floods might as yet be hard but under well(p) preparations, flood leak is easy. The above listed points starts with computer programning. Prolonged warnings always makes people to be ready and hence helps them keep their belongings safe (Moore, 2004).            Emerg ency aesculapian care to people affected with floods is very important and so is its distribution. The medical care equipment can be distributed through the use of helicopters in areas where other means of transportation is impossible. In instances where the flood is not extreme, then the drugs are distributed by the medical officers or the volunteers.            Mass triage needs to be established in areas where the swamp effects were extreme and a lot of people are affected. Areas under flood are likely to pose a higher panic for individuals to contract water borne diseases and hence the need for mass triage. Cordoning off an area might also be necessary so as to specify the flood infested areas from those that are not. Cordoned off areas are not allowed to be reached by others unless the flood subsidises.Why is emergency direction so important during this phase? Could an unorganized response actually lead to more confusion and madhouse? How can resou rces and personnel be allocated efficiently with a central play post?            Emergency management is important in each and all fix up in disaster management. However, its importance is very vital during this stage because of the following reasons. Emergency management helps overcoming the emergencies because there is always a plan for it. With a good plan in place, all is possible. Secondly, emergency management helps in knowing the best way to deal with any problem should it arise. Having a survival kit is also another way through which emergency management helps an individual during occurrences like the flood. Inside the kit there are materials that are necessary in overcoming the emergency (Haddow, Bullock & Coppola, 2008).            Confusion and chaos arises in situations where after an emergency, there is unorganized response from the management team. This always comes as a result of lack of emergency management tips.&n bsp           Having a central command post during emergencies like floods is very healthy in tackling the problem at hand efficiently. The stakeholders involved in helping solve the emergency for example floods, always assemble in the command post and work cooperatively to successfully mitigate the emergency through implementing a single incident action plan. A unify command post helps in the following waysAllows for specialist stimulant whereby only specialised individuals are allowed to work on what they can wieldIt authorises each stakeholder to have input about how they believe the emergency will be managed.            Having the right command post therefore ensures that only qualified personnel are assigned certain tasks. This is because they are the ones with authorities on that field hence they can always deliver their best.What are the initial steps that must be taken onwards recuperation operations can take place? Why is dis aster convalescence so important? Should we strive to make the area better than I t was before the incident?            Recovery involves rebuilding the whole community so that the affected individuals, governments and other body can now work on their own as they resume normalcy as well as prevent them from incoming hazards (Clements, 2009).            The following should be done before retrieval operations can take place. The officials should get clearance to enter the site. The outcome of the damage should also be looked at before starting the convalescence process. Those homework to undertake the reimbursey process should also get master copy advice. Command centre for the recovery effort should also be sought before embarking on the recovery process. Another important aspect that should be looked before starting the recovery process is establishing security procedures for the recovery site. Lastly, deciding how the salvaged materials will be treated should also be looked before commencing the recovery process.            Recovering from the trauma experienced during the floods might be quite con turn tail for many people. Therefore proper recovery steps must be undertaken to ensure people heal appropriately. Some of the recovery efforts include great(p) medical aid, providing relief which comprises of food, water etc., clearing up the area, rebuilding dishonored structures, reopening schools, businesses and all those places that were affected. The disaster recovery is so important in that it attempts to act the affected people back to normalcy. People recovering from disasters always tend to have negative views so through the use of recovery process, they are made to appreciate life once more.            The recovery team should crusade to make the area a better place than it was. Leaving an area in the same or worse state than it was before makes p eople have bad feelings about such cases. Hence, the need for making an area a better place than it was before.            How can the exoteric or non-profit organizations assist in recovery operations? Should volunteers be sought and utilized? How could existence donations be collected? How could debris be recovered and removed?            The public and the non-profit organisations have been used in recovery operations. The non-profit organizations serves as health care providers, emergency shelter operations, and search and rescue team. Furthermore, they offer psychological training, as well as emergency communications. The public may also be used in assisting the affected group through being with them together. This always makes such people feel appreciated. They always feel that people are together with them even in their predicaments. The role of the public and non-profit organizations like churches cannot be underestimated.&n bsp           So as to make the recovery process a success, volunteers should be utilised. Volunteers are people who are willing to offer certain financial aid at no pay. These volunteers might have dealt with similar cases before and are therefore more suited to serve and help the affected people.            Those in the team should however strive to know the real volunteers. Some may volunteer with sinister motives. These people always lower or reduce the rate at which recovery process is achieved. Such people always make use of the vulnerable condition of the affected people for their own selfish gain. This vice however should be condemned.            Public donations are very helpful in helping people recover from floods and its effects. People affected by floods needs food, quick medical attention and other introductory necessities. The donations from the public if not collected apply the right channels, mig ht end up not helping in the intended purpose. Special bodies should always be put in place to man the public donations.            act cleaning of debris remains after the floods prevents odors, diseases. Contamination from run offs and many more. The following are some of the methods that are used to remove debris. The plant life should be disposed of correctly. They should be handled in a manner that prevents exhausting into streams, ditches and other surface water sources (Lamond, 2012).            Structures that are destroyed should be managed by the property owner and contractors if the floods affected construction sites. Sediments should also be fling as solid hazardous.            Whenever sewage is encountered during the debris disposal process that waste does not necessarily need to be separated. It should be disposed at a landfill mixed with other debris from the flood.        &n bsp   Is the management of public dealing crucial during the recovery process? How could information be relayed to the public to image them that everything that needs to be done is being done? How could some of the survivors mental health have been affected by the disaster? Should crisis counselors be sought to deal with the survivors and victims of the disaster?            The management of public dealings is very important during the recovery process.            Good public relations enhances good recovery. When there is poor public relations, there is less that canbe done to animate the recovery process. Consoling affected people is of utmost importance during the recovery period. The people who have been affected by floods needs to be always encouraged that all is well and that help is always underway.            Leaving people in conditions whereby they are not informed promptly, panic always arises . The best way to inform the public that all is well is by using leaders who they trust. Information which comes from a more authoritative person or a person who is experienced in a certain field holds more waters than information being rumored.            The mental health of flood survivors may at times be affected. This is mainly in instances where the floods were so much and it caused serious destructions. The survivors might have seen some of their family members drown as a result of the floods. Sometimes, they themselves might have been rescued from death narrowly.            For such people to heal completely, they need the services of a crisis counsellor for them to recover completely. The crisis counsellors are trained in dealing with problems like these and so they help the affected in overcoming the challenges they face.            How important is it to promote a kitchen-gardening of photo reduction to prevent disasters from occurringin the first place or at least(prenominal) mitigating their consequences if they do occur?            Vulnerability is a set of conditions which results from physical, economic, environmental and friendly factors that increases a persons susceptibility to the effects of the hazards.            Promoting the culture of picture helps in preventing disasters as well as mitigating their effects. This is due to the fact that the culture of vulnerability makes people aware of the problems they are facing. When one is aware of whatsoever he or she is undergoing, then he or she becomes prepared for anything. organism prepared means that solutions to problems can always be found before its too late.            Apart from making people aware, people are also have strong coping capacity. They are always aware and so they can cope as required hence helps in preventing the disaster.&n bsp           How can technology be harnessed to smooth the recovery process? What are some tools available to emergency managers for recovery operations? Could the lessons learned from this disaster response and recovery be used in the early(a) to better help communities respond to and deal with a disaster? What are some new and possibly unexpected threats that could arise in the future?Technology can be used to create tools that will lead to faster healings. The recovery process for it to be successful, technology must be used well. With the appropriate technology in place, transportation of medicine, staffs and other essentials that are needed will be availed easily.            Tools available for use by emergency managers during the recovery process includes weather sensor and satellite, fibre optics, phones video, medical equipment. The lessons learnt from this disaster response are very helpful in dealing with future occurrences. T he response when dealing with flood can be used when dealing with other types of floods. Some of the possible threats that are likely to occur during dealing with floods is the network problem. When floods occur, network connection is always tampered with. This happens to be the unexpected threats in when dealing with floods. Network unavailability hinders smooth communication.ReferencesClements, B. (2009). Disasters and Public Health planning and response. capital of The Netherlands Butterworth- Heinemann/ElsevierHaddow, G. D., B ullock, J. A., &Coppla, D. P. (2008). Introduction to Emergency Management (3rded.). Amsterdam Elsevier/Butterworth-Heinemann.Lamond, J. (2012). Flood hazards impacts and responses for the built environment. Boca Raton CRC Press.Moore, R.,&Barnes,J. (2004).Faces from the flood Hurricane Floyd remembered. Chapel Hill University of due north Carolina Press.Rao, S. R. (2006). Resource recovery and recycling from metallurgical wastes. Amsterdam Elsevier Schumann, A. (2011). Flood chance assessment and management how to specify hydrological loads, their consequences and uncertainties. Berlin. Springer.Strahler, A. N. (1973). Environmental Science Interaction amongst Natural Systems and Man. California Hamilton Publishing Company.Wisner, B., Gaillard, J. C., &Kelman, I. (2012). The Routledge handbook of hazards and disaster insecurity reduction. London Routledge.Source document

Tuesday, January 29, 2019

Animal Imagery in King Lear Essay

Animal Imagery in mogul Lear A common misconception during the Elizabethan Era is that populace ar superior to animals. belie exhibitions this by stating where on that point is a fear of the collapse of difference, there is in addition an urgent need to reiterate human superiority (Fudge 2). throughout business leader Lear, Shakespe atomic number 18 challenges this boundary that has been desperately enforced by macrocosm for so umpteen years. The strict distinction amidst humans and animals is trivialized as Shakespe atomic number 18 continuously alludes to the relationships between his char be activeers, animals, and other species.With this cosmos said, the audience is able to see how the shoo-in King Lear, exposes a number of Shakespe atomic number 18s interesting literary choices. One that is utilise frequently within the play is animal mental word-paintingry, where the characteristics of specific individuals relate to the qualities associated with a concomitant animal. Through the aim of a calculus, serpent, and fowl, Shakespeare utilizes animal kitchen rangery to relate common understandings and representations of animals to highlight some(prenominal) the characters true qualities and their relevance through a feminist lens.The juxtaposition of human and animal in King Lear is legal in establishing the idea that humans and animals are not as dissimilar as many believe, and in fact possess many of the identical underlying qualities. The image of a tartar is use by Shakespeare to draw King Lears emotions. Although dragons are traditionally mythological creatures, their possessive qualities and explosive personality are traits that humans also possess. For example, Lear refers to himself as a dragon when he states, come not between the dragon and his wrath (1. . 126). At this point in the play, it is evident that Lear possesses qualities of a dragon as he is very easily enraged, and views himself as a very agentful and Coperni squirt person.He croaks enraged at the fact that his prized possession or treasure, Cordelia, is existence put in jeopardy by her response. Lear and a dragon both show how the concept of alternate can make whizz become very vulnerable. Although Lears inflexible personality causes him to banish Cordelia, the thought of lo mouth his ducky daughter will become everlasting in his mind.Both a dragon and Lear have become so accustomed to their qualitys of protecting, that the idea of change may cause them to lash out. Furthermore, Lear shows how he feels superior to everyone below him in the hierarchy. His actions reveal that he sees himself as untouchable and is spontaneous to pose threats to anyone he may feel uncomfortable or intimidated by. Even though Kent is giving Lear priceless advice, Lears current state of vulnerability causes him to gatekeeper threats and make idiotic decisions.Lears comments out of anger and his comparison to being a dragon shows how males have ultima te authority over women, and are able to spill the beans their minds without consequences. In addition, men can be noble as the dominant gender since Lear parallels a dragons characteristics of being a very forceful creature and leader. Although Lear is involuntary to divide his kingdom up, he does not suggest that he is willing to give up any of his power. Lear til now wants to remain as a leading figure and have full authority over everyone. there is no mention of a Queen being present, or the residuum of power shifting to anyone else other than Lear. Therefore it is evident that Shakespeare uses animal imagery to show Lears fiery personality and male authority. Traditionally, snakes are seen as marauding animals that are feared by al just about everyone. Being related to a snake is not normally a positive comparison, thus, one mustiness commit a significantly criminal action to be called one. The introductory reference to a snake is when Lear is ranting about Goneril to Regan.He states, Goneril in love me with her tounge/ most serpant- same, upon the very heart (2. 4. 169-170). In a traditional fight, a snake is almost powerless however, it is known that by being spite and deceptive, snakes can be victorious in battle. Goneril shows this by flattering her renders ego in order to obtain his riches. Once she plights her grows wealth, she orders him to get rid of his knights, and ultimately kicks him out, with nowhere to go. Gonerils imposture ability allows her to destroy her father, while benefiting herself.These villainous actions that she commits come as a admiration to Lear because he is blind to the fact that he is being cheated and robbed of his possessions from the s he offered the division of his kingdom. Just like a snake, the element of surprise is utilized by Goneril to catch her father off guard and thus, lower his power without any consequences. Furthermore, this shows how greed and wealth can cause humans to make rash decision s, and therefore be compared to poisonous beasts. As the play comes to an end, one can see how the repeat becomes very ironic as Goneril decides to poison her sister.Therefore not only does she possess the same humor as a snake, she also follows through with her actions physically by the use of poison. Through a feminist lens, one could say that men are quick to blame women for their actions and mistakes. Lear is too busy feeling sorry for himself to establish that he was the cause of his own sadness and destruction. However, instead of acknowledging this fact, he straightaway refers to his daughter as a snake. The representation of women as snakes shows the imbalance of power in society.In order for women to make their own decisions, they must be sly and quiet about them because they have no right to speak their minds in front of men. Therefore, instead of stating their own opinion, they must comply with the call for and wants of the men around them. Even if they have an excel lent idea, it will most likely be opposed by men simply because women are viewed as being less capable or credible. With this being said, Shakespeare uses the image of snake to highlight the many evil and manipulative qualities that humans possess.Shakespeare utilizes the image of a chick to reflect both positive and negative attributes within his characters. Unlike most animals, shits are able to express both predatory and peaceful instincts. Towards the end of the play, the reference of a bird is seen in a positive way, as it represents the renewal of life and freedom. This is present when Lear states, we two only will sing like birds in a cage (5. 3. 10). The quote emphasizes irony as both Lear and Cordelia are literally in prison like a bird in a cage.Despite the fact that they are captive, and about to lose their lives, their overall happiness is restored because they are together once again. After the climax of the play causes extreme pain and badgering for both character s, being together with the one whom they can trust and commission for is the best possible reward, regardless of the setting. Now that Lear and Cordelia are free from the evil sisters, they can live happily for the rest of their lives. This in turn causes them to sing like birds, or in other words, express their true happiness.This is a very controversial moment in the play, as it is the moment when Lear at last brings good-spirits to the tragedy that has taken place. Now that he is free of his arrogance and illusions, he is able to see the true love of Cordelia. The use of a caged bird describes Cordelias character perfectly. Throughout the play, she is expected to play the traditional role of a woman, which is to look pretty and sing charmingly. This suggests that women are expected to act only in the way that their male authorities desire.However, although Cordelia has done vigour wrong and has continued to be a loyal wife and daughter, she still ends up dead as a result of he r sisters actions. Just like a caged bird, women are forced to live through the terms of their owners. Therefore, horizontal though they have the ability to be free, they are obligated to get word to whatever their owners want. Also, this shows how men view themselves as providers, and the advantage of this is they recognize that bulk of women would not be able to cope by themselves in a male dominated society.On the contrary, Shakespeare uses the image of a bird to show their more predatory and savage-like behaviours. These birds contradict the traditional image of a bird as they are very dangerous and aggressive. Throughout the play there are multiple references to these birds such as, the hedge-sparrow fed the cuckoo so long,/ that its had it head bit off by it young (1. 4. 203-204). The fool states this to Lear because he is aware of the evil actions that both Goneril and Regan are committing. Both daughters are raised by Lear therefore they know all his weaknesses and are ab le to take advantage of them.Also, once they are able to realize that their father is seemly old and weak, they take this opportunity to rid him of his power very quickly. The side by side(p) examples of predatory birds in the play are once again used to make reference to the two evil daughters. However, this time Lear calls Goneril a scorned kite (1. 4. 254), and states that both of them are pelican daughters (3. 4. 74). Lear now realizes that he has been deceived by his daughters and that his power has been stripped from him. These two references are also ironic, as these two birds are known to eat the flesh of decaying corpses.In many ways Lear represents a decaying corpse, as he is becoming old and powerless therefore he can be easily taken advantage off. Thus, the image of birds end-to-end the play is critical because it allows Shakespeare to portray the positive and negative attributes in his characters. Throughout history, the disparity between animals and humans is unclear . However, Shakespeare effortlessly brings light to this subject as he is able to indirectly reveal the personalities of his characters by making connections to the qualities of particular animals.This literary method is known as animal imagery, and the characteristics that both humans and animals share allow one to conclude that they are very often similar in the way they act. In King Lear, a dragon, serpent, and bird emphasize animal imagery as they reflect common understandings that can be related to the actions of the characters in the play. Through a feminist compend of the characters, it is evident that the Elizabethan Era was dominated by male egos. Therefore, one can see the importance of animal imagery as it not only shows the similarities of humans and animals, but allows Shakespeare to be comprehended on another(prenominal) level.

Monday, January 28, 2019

English Renaissance Drama Essay

side Renaissance drama grew out of the establish chivalric tradition of the mystery and morality vivifys. These popular spectacles foc apply on ghostly subjects and were generally enacted by either choristers and monks, or a towns tradesmen (as later seen lovingly memorialized by Shakespe ares mechanicals in A Midsummer Nights Dream).At the abate of the ordinal century, a freshly persona of play appeared. These short plays and revels were per dust-builded at courtly sign of the zodiacs and at court, especially at holiday times. These short entertainments, called Interludes, st cheated the discover outside(a) from the didactic nature of the earlier plays toward purely secular plays, and often added to a crackinger extent comedy than was demo in the medieval predecessors. Since around of these holiday revels were non documented and play texts make up disappeared and been destroyed, the actual dating of the transition is difficult. The band-back extant purely secul ar play, total heat Medwalls Fulgens and Lucres, was performed at the household of Cardinal Morton, where the young doubting Thomas More was serving as a p fester. Early Tudor interludes soon grew more(prenominal) elaborate, incorporating music and dance, and some, especially those by John Heywood, were heavily influenced by French farce.Not precisely were plays modify emphasis from teaching to entertaining, they were athe likes of slowly changing focus from the religious towards the political. John Skeltons Magnyfycence (1515), for example, while on the face of it resembling the medieval fable plays with its characters of Virtues and wrongs, was a political satire against Cardinal Wolsey. Magnyfycence was so incendiary that Skelton had to move into the sanctuary of Westminster to escape the wrath of Wolsey.The front history plays were written in the 1530s, the most notable of which was John Bales office Johan. piece of music it considered takingss of morality and religio n, these were handled in the light of the Reformation. These plays pay off the precedent of presenting history in the dramatic medium and laid the foundation for what would later be inflated by Marlowe and Shakespeare into the face History Play, or Chronicle Play, in the latter(prenominal) part of the century.Not but was the Reformation taking hold in England, however the winds of Classical Hu gnomish-armism were sweeping in from the Continent. Interest grew in the classics and the plays of classical antiquity, especially in the universities. Latin texts were being Englysshed and latin poesy and plays began to be adapted into face plays. In 1553, a schoolmaster named Nicholas Udall wrote an English comedy titled Ralph Roister Doister based on the traditional Latin comedies of Plautus and Terence.The play was the foremost to introduce the Latin character type miles gloriosus (braggart soldier) into English plays, h wizardd to perfection later by Shakespeare in the character o f Falstaff. Around the same time at Cambridge, the comedy Gammer Gurtons Needle, possibly by William Stevens of Christs College, was am utilise the students. It paying(a) closer attention to the structure of the Latin plays and was the head start to adopt the five-act division.Writers were excessively developing English tragedies for the first time, influenced by Greek and Latin writers. Among the first forays into English tragedy were Richard Edwards Damon and Pythias (1564) and John Pickerings New Interlude of Vice Containing the History of Horestes (1567). The most influential writer of classical tragedies, however, was the Ro piece dramatist Seneca, whose imprints were translated into English by Jasper Heywood, son of playwright John Heywood, in 1589. Senecas plays incorporated rhetorical speeches, blood and violence, and often ghosts components which were to figure prominently in both Elizabethan and Jacobean drama.The first prominent English tragedy in the Sene pot mould was Gorboduc (1561), written by both rightfulnessyers, Thomas Sackville and Thomas Norton, at the Inns of Court (schools of law). Apart from following Senecan conventions and structure, the play is most heavy as the first English play to be in blank verse. Blank verse, non-rhyming businesss in iambic pentameter, was introduced into English literature by sonneteers Wyatt and Surrey in the 1530s. Its use in a work of dramatic literature paved the way for Marlowes mighty line and the exquisite poetry of Shakespeares dramatic verse. With a youthful ruler on the throne, Queen Elizabeth I, who enjoyed and encouraged the theatrical arts, the act was set for the system of dramatic literature we today call Elizabethan Drama.The Social and political ClimateIn 1600, the city of London had a population of 245,000 people, twice the size of Paris or Amsterdam. Playwriting was the least personal form of writing, just now cl proto(prenominal) the most profitable for literary men sinc e the demand was so great 15,000 people attended the playhouses weekly. What is often exploited in the plays is the focus between a Court culture and a commercial culture, which in turn reflected the tension between the metropolis government and the Crown. The accomplishment from 1576 (date of the first public theatre in London) to 1642 (date that the Puritans closed the theatres) is unparalleled in its fruit and quality of literature in English.The monarchy rested on two claims that it was of noble origin and that it governed by consent of the people. The period was one of great transition. This period of history is generally regarded as the English Renaissance, which took place approximately deoxycytidine monophosphate years later than on the continent. The period also coincides with the Reformation, and the two eras are of course mutually related.Imposed upon the Elizabethans was a social hierarchy of put in and degreevery lots medieval concepts that existed more in form th an in substance. The society of Shakespeares time had in many slipway broken free of these rigidities. It was not that people were rejecting the past alternatively, a new more rigid order was replacing the old. This was set into motion during Henry VIIIs reign in the 1530s when he assumed more origin than had hitherto been known to the monarchy. The Act of Supremacy of 1534 gave to Henry the power of the Church as well as temporal power.By Shakespeares time the state had asserted its right in attempting to gain leave in secular and spiritual matters alike. The so-called Tudor myth had sought-after(a) to justify actions by the crown, and selections for the monarchy, as God-sanctioned to thwart those decisions was to sin, be coif these people were selected by God.The population of the City quadrupled from Henry VIIIs reign to the end of Shakespeares life (1616), thus adding to the necessity for civil control and law. The dissolution of the monasteries had ca take much civil unres t, and the dis have monks and nuns had been forced to enter the work force. Thus the employment, or unemployment, problem was severe.Puritanism, which first emerged early in Elizabeths reign, was a minority force of churchmen, Members of fantan, and separates who felt that the Anglican Reformation had s crystalliseped short of its goal. Puritans used the Bible as a guide to conduct, not simply to faith, but to political and social life, and since they could read it in their own language, it took on for them a greater importance than it had ever held. They stressed particularly the root of storage the Sabbath day. The conflict between the Puritans and the players of the theatrewho performed for the larger crowds that would turn out for productions on the Sabbathwas established early.The Elizabethan WorldviewThe English Renaissance began with the importation of Italian art and philosophy, Humanism, during the reign of Henry VIII. Henry Howard, Earl of Surrey, imported and translat ed classical writings, such(prenominal)(prenominal) as Virgils Aeneid, the first English work to use Blank Verse. Surrey and Sir Thomas Wyatt in their sonnets also imitated classical writers such as Petrarch, and are impute as Fathers of the English Sonnet.While the Great Chain of Being (an idea suggested from antiquity all that exists is in a created order, from the lowest possible strain to perfection, God Himself) was still asserted, the opposite, the reality of disorder, was just as prevalent. Not surprisingly, a favorite metaphor in Shakespeares plant is the world acme down, much as Hamlet presents.The analogical mode was the prevailing expert concept for the era, which was inherited from the Middle Ages the analogical habit of mind, with its correspondences, hierarchies, and microcosmic-macrocosmic relationships, survived from the Middle Ages to the Renaissance. Levels of existence, including serviceman and cosmic, were habitually correlated, and correspondences and resemblances were perceived all over. Man was a mediator between himself and the universe. An semblance of being likened man to God however, the Reformation sought to change this view, express mans fallen nature and darkness of reason. The analogy can be seen in the London theatre, correlating the disparate planes of earth (the stage), hell (the cellarage), and enlightenment (the heavens, projecting above the top of the stage). Degree, priority, and place were afforded all elements, depending on their quad from perfection, God.Because he possessed both spirit and body, man had a quaint place in the chainthe extremes of human potential are everywhere evident in the drama of the English Renaissance. Natural degeneration, in wrinkle to our optimistic idea of progress, was everywhere in evidence toothe early Edenic golden age was irrecoverable, and the predicted end of the world was imminent. With changes in the ways that man looked at his universe, disturbing discoveries sugges ted mutability and corruption the terrifying effect of new stars, comets, etc., added to a pessimism that anticipated signs of decay as apocalyptic portents of approaching ordinary dissolution.Hierarchically, the human soul was tetherfold the highest, or rational soul, which man on earth possessed uniquely the sensual, or appetitive soul, which man share with lower physicals and the lowest, or vegetative (vegetable nutritive) soul, venerationed primary(prenominal)ly with reproduction and growth. The soul was facilitated in its work by the bodys three main organs, liver, heart, and brain the liver served the souls vegetal, the heart its vital, and the brain its animal facultiesmotive, principal virtues, etc.Man himself was formed by a internal combination of the four elements the dull elements of earth and waterboth attention to fall to the center of the universeand beam and fireboth aid to rise. When the elements mixed they shaped mans temperament. Each element possessed two of the four primary qualities which combined into a humour or human temperament earth (cold and dry melancholy), water (cold and moist phlegmatic) air (hot and moist sanguine) fire (hot and dry choleric).Like his soul and his humours, mans body possessed cosmic affinities the brain with the Moon the liver with the artificial satellite Jupiter the spleen with the planet Saturn. Assigned to each of the stars and the sphere of fixed stars was a hierarchy of incorporeal spirits, angels or daemons. On earth, the fallen angels and Satan, along with such occult forces as witches, continued to tempt man and lead him on to sin.Familiar to Shakespeare and his contemporaries were the Aristotelian four causes the final cause, or think or end for which a change is made the efficient cause, or that by which some change is made the material cause, or that in which a change is made and formal cause, or that into which something is changed. Renaissance awe with causation may be seen in Po lonius laboring of the efficient cause of Hamlets madness, For this effect defective comes by cause (2.2.101-03).In the Aristotelian view, change involves a unity between potential matter and actualized form. Change is thus a process of becoming, affected by a cause which acts determinately towards a goal to produce a result. Implicit in the Elizabethan worldview was the Aristotelian idea of causation as encompassing potency and act, matter and mind. The London dramatists pre-Cartesian universe, indeed, tended to retain a star of the purposefulness of natural objects and their place in the divine scheme.Towards the mid-seventeenth century a major cleft between the medieval-Renaissance world-view and the modern world view took place, cause by Renee Descartes (1596-1650). Cartesian dualism separated off mind from matter, and soul from bodynot a new idea, but reformulated so that the theologians doctrines became the philosophers the problems of Predestination were unawares the prob lems of Determinism.For Descartes, all nature was to be explained as either thought or extension hence, the mind became a purely thinking substance, the body a soulless mechanical system. Descartes philosophy held that one can know totally ones own clear and distinct ideas. Objects are important only insofar as man b sound his own judgments to bear upon them. Cartesian skepticism and subjectivism led to the rejection of the previous centuries Aristotelian perspectives, as meaningless or obscure. According to Aristotle, to know the cause of things was to know their nature.For the Middle Ages and the Renaissance, objects influenced each another(prenominal) through mutual affinities and antipathies. Elizabethans accepted the correspondences of sympathies and antipathies in nature, including a homeopathic supposition that like cures like. Well into the seventeenth century, alchemical, hermetical, astrological, and other pre-scientific article of beliefs continued to exert, even on the minds of distinguished scientists, a discernible influence.Concerned with the need to believe, in an age of incipient doubt, theatre earreachs often witnessed in tragedies such struggles to sustain belief Hamlet has a need to trust the Ghost Lear has a wracked concern for heavenly powers and Othello feels a desperate necessity to preserve his belief in Desdemonawhen I love thee not, / Chaos is come again (3.3.92-3). For Othello and Lear, belief is sanity.Theologically, in the later sixteenth century, divine providence seemed increasingly to be researched, or at least to be regarded as more bafflingly inscrutable. The medieval under stand of security was in a process of transformation. Those changes coincided with such circumstances as the Renaissance revival of Epicureanism, which stressed the indifference of the powers above to mans concerns. In its place was a special personal power, which was emphasized in the works of Machiavelli (1469-1527) and other Renaissance write rs.Such changes in the relations of man and his deity inevitably provided a climate for tragedy, wherein both divine evaluator (as in King Lear) and meaningful action (as in Hamlet) seemed equally unattainable. Lear appears to question the forces above mans life, and Hamlet the powers beyond his stopping point. Hamlets task is further complicated, for example, by his meaningless quest for actionfrom a Reformation standpointof works toward salvation. The path to salvation, of great concern to most Elizabethans, was not through works or merit but by inscrutable divine election.The post-Reformation man, alienated from the objective structure of the traditional Church, as well as from the release of the confessional, with a burdened and isolated conscience, morose his guilt inward.The Renaissance epistemological crisis emphasized the notion of the relativity of perception, present in the appearance-versus-reality motif recurrent through Renaissance drama. The Renaissance dramatis ts works mark a transition between absolute natural law bestowed by God, and relativistic natural law, recognized by man.The playhousesThe old Medieval stage of place-and-scaffolds, still in use in Scotland in the early sixteenth century, had fallen into disuse the kind of temporary stage that was preponderating in England or so 1575 was the booth stage of the marketplacea small rectangular stage mounted on trestles or barrels and open(a) in the sense of being surrounded by spectators on three sides.The stage proper of the booth stage generally measured from 15 to 25 ft. in width and from 10 to 15 ft. in enlightenment its height above the ground averaged a bout 5 ft. 6 in., with extremes ranging as low as 4 ft. and as high as 8 ft. and it was backed by a cloth-covered booth, usually open at the top, which served as a tiring-house (short for attiring house, where the actors dressed).In the England of 1575 there were two kinds of buildings, designed for functions other than the acting of plays, which were adapted by the players as temporary outdoor playhouses the animal-baiting rings or game houses (e.g. Bear Garden) and the inns. presumptively, a booth stage was set up against a wall at one side of the yard, with the audience standing in the yard surrounding the stage on three sides. Out of these natural playhouses grew two major classes of permanent Elizabethan playhouse, public and nonpublic. In general, the public playhouses were large outdoor theatres, whereas the offstage playhouses were smaller privileged theatres. The maximum capacity of a typical public playhouse (e.g., the Swan) was active 3,000 spectators that of a typical private playhouse (e.g., the Second Blackfriars), about 700 spectators.At the public playhouses the majority of spectators were groundlings who stood in the dirt yard for a cent the remainder were sitting in galleries and boxes for two pence or more. At the private playhouses all spectators were seated (in pit, galle ries, and boxes) and paid sixpence or more. In the beginning, the private playhouses were used exclusively by Boys companies, but this distinction disappeared about 1609 when the Kings Men, in residence at the Globe in the summer, began using the Blackfriars in winter.Originally the private playhouses were found only within the City of London (the Pauls Playhouse, the First and Second Blackfriars), the public playhouses only in the suburbs (the orbit, the Curtain, the Rose, the Globe, the Fortune, the Red Bull) but this distinction disappeared about 1606 with the opening of the Whitefriars Playhouse to the west of Ludgate.Public-theatre audiences, though socially heterogeneous, were drawn mainly from the lower classesa situation that has caused modern scholars to refer to the public-theatre audiences as popular whereas private-theatre audiences tended to consist of gentlemen (those who were university educated) and nobleness select is the word most usually opposed to popular in thi s respect.James Burbage, father to the renowned actor Richard Burbage of Shakespeares company, built the first permanent theatre in London, the Theatre, in 1576. He probably besides adapted the form of the baiting-house to theatrical needs. To do so he built a large round structure very much like a baiting-house but with five major innovations in the received form.First, he paved the ring with brick or stone, thus paving the pit into a yard.Second, Burbage erected a stage in the yardhis model was the booth stage of the marketplace, larger than used before, with posts rather than trestles.Third, he erected a permanent tiring-house in place of the booth. Here his head teacher model was the passage screens of the Tudor interior(prenominal) hall. They were modified to withstand the weather by the insertion of doors in the doorways. Presumably the tiring-house, as a permanent structure, was inset into the frame of the playhouse rather than, as in the older temporary situation of the booth stage, set up against the frame of a baiting-house. The gallery over the tiring-house (presumably divided into boxes) was commensurate of serving variously as a Lords get on for privileged or high-paying spectators, as a music-room, and as a piazza for the occasional performance of action above as, for example, Juliets balcony.Fourth, Burbage built a cover over the rear part of the stage, called the Heavens, supported by posts rising from the yard and surmounted by a hut.And fifth, Burbage added a third base gallery to the frame. The theory of origin and development suggested in the preceding accords with our chief pictorial source of information about the Elizabethan stage, the De Witt drawing of the interior of the Swan Playhouse (c. 1596).It seems likely that most of the round public playhousesspecifically, the Theatre (1576), the Swan (1595), the First Globe (1599), the Hope (1614), and the Second Globe (1614)were of about the same size.The Second Blackfriars Play house of 1596 was designed by James Burbage, and he built his playhouse in the upper-story Parliament Chamber of the Upper Frater of the priory. The Parliament Chamber measured 100 ft. in length, but for the playhouse Burbage used only two-thirds of this length. The room in question, after the removal of partitions dividing it into apartments, measured 46 ft. in width and 66 ft. in length. The stage probably measured 29 ft. in width and 18 ft. 6 in. in depth.The staging ConventionsIn the private theatres, act-intervals and music between acts were customary from the beginning. A music-room was at first lacking in the public playhouses, since public-theatre performances did not originally employ act-intervals and inter-act music. About 1609, however, after the Kings men had begun performing at the Blackfriars as well as at the Globe, the custom of inter-act music seems to have spread from the private to the public playhouses, and with it apparently came the custom of using one of the tiring-house boxes over the stage as a music-room.The drama was conventional, not possible poetry was the most obvious convention, others included asides, soliloquies, boys contend the roles of women, battles (with only a few participants), the daylight convention (many scenes are set at night, though the plays took place in mid-afternoon under the sky), a convention of time (the quantify and calendar are used only at the dramatists discretion), the convention of eavesdropping (many characters overhear others, which the audience is privy to but the overheard characters are not), and front from place to place as suggested by the script and the audiences imagination.Exits were strong, and when everyone departed the stage, a change of scene was indicated. There was relatively shortsighted scenery. Scenery was mostly suggestive for example, one or two trees standing in for a whole forest. The elaborate garbsfor which companies paid a great deal of moneysupplied the color and page antry. Minimal scenery and limited costume changes made the transitions between scenes lightning-fast and kept the story moving.There was often dancing before and after the playat times, during, like the peasants dance in Shakespeares Winters Tale. Jigs were often given at the end of performances, a custom preserved still today at Shakespeares Globe. The jigs at the theatre were not always mere dances, they were sometimes comprised of songs and bawdry knockabout farces filled with commentaries on current events. Perhaps the most famous jig was the one performed by Will Kemp, the clown in Shakespeares company, over a nine day period in 1599, on the road from London to Norwich. It was published in 1600 as Kemps nine daies wonder. subsequently 1600, the bawdy jigs fell into derision and contempt and were only performed at theatres such as the Red Bull, which catered to an audience appreciative of the lowest humor and most violent action.The clowns were the great headliners of th e Elizabethan stage prior to the rise of the known tragedians of the late 1580s, such as Edward (Ned) Alleyn and Richard Burbage. Every company had a top clown along with the tragedianhakespeare company was no exception Richard Tarleton was the clown until his death in 1588, Will Kemp was the clown until forced out of the company in 1599, to be replaced by another famous clown, Robin Armin. The clowns not only performed the aforementioned jigs, but also played many of the great ridiculous characters Kemp most likely played Peter in Romeo and Juliet and Dogberry in such(prenominal) Ado About Nothing, Armin the parts of Feste in Twelfth Night and the shoot in King Lear.From contemporary documents, we know there were over a thousand actors in England between 1580-1642*. Most were poor, starving actors, but a few dozen were able to make names for themselves and become shareholders in their respective companies, and make a good living. The repertory system was demanding esides playin g six days a week, a company would be in continual rehearsal in order to add new plays and to critique old ones in their schedule. A player would probably occupy a new role every week, with thirty to forty roles in his head. No minor feat, especially considering that an actor would only get his lines and cues (in a turn over up parchment, his roll, from which we get the word role), not a whole script Over a period of three years, a tragedian such as Edward Alleyn, lead player for the Admirals Men, would learn not only fifty new parts but also retain twenty or more old roles.

The Anti-bilingual Education Measure

The result of California election on June 4th, 1998 was predicted wholly along. mesmerism 227, also known as the anti- bilingualist culture measure, won in 61% favorable to 39% unfavorable contest. In a evidently routine contest, the advise brought out one of the most disparaging groups of supporters and critics, displaying heating plant for their causes in r anyies, forums, debates and TV ads. This paper examines trace 227 and its controversy. Then, it proposes what might strike been a compromise that satisfied the supporters and the critics alike.After a small protest by some dissatisfied Hispanic American pargonnts on their childrens bilingual get wording, Ron Unz, the Chairman of position for the Children wrote and spearheaded a movement for Proposition 227. Under the presumption that bilingual culture had not relieved in high spirits dropout rates and mild slope literacy of many immigrant children in uttermost 20 grades, Proposition 227 advocated a new way of teaching for Limited face Proficiency (LEP) children.It mandated a uniform solution for all LEP children in that all children will be placed in side terminology classrooms where the lecture of commission utilise by the teaching personnel is overwhelmingly the English language, and in which such(prenominal) teaching personnel possess a good knowledge of the English language. Children who are English learners will be educated through render English dousing during maximum of 1 family.The sheltered English tightness curriculum meant nearly all classroom instruction is in English but with the political platform and presentation designed for children who are learning the curriculum and presentation designed for children who are learning the language. Passing of such marriage offer meant virtual elimi country of bilingual education in California. The biggest critics of proposition 227 are teachers. They claim that the premise of Proposition 227 epitomizes ignorance. Fir st typesetters case is a clause in the measure that allows maximum of a year for sheltered English immersion.The critics dismiss it as confusion over speech fluency and academician fluency in English. They claim that, academic fluency in a second language requires 5 to 7 years instruction. Therefore, a year of special education is inadequate for preparing LEP children for English language classrooms. Second example is that only 6. 5 percent of the students who are re-classified as fluent in English come from a group of students, only a ternion of whom are in bilingual programs and most of whom are in the amiable of English-only programs mandated by Proposition 227.Hence, concluding bilingual education as a failure is shortcoming. In fact, many bilingual programs work better than early(a) programs in twain English acquisition and core subjects . Since, Proposition 227 mandates a single, untested program for all school districts, it fails to address the quality of instruction in core subjects like science and math. Other critics of proposition complicate the proponents of bilingual education. They claim that benefits of bilingual education include appreciation for cultures.Because language is most fundamental part of any culture, allowing bilingual education is allowing the field of honor in which language meets language, culture meets culture, values meet values. Hence, bilingual education has its own educational merits rather than just assisting education in other(a) subjects. Some proponents take a step further and claim that denying bilingual education is discrimination against minority students. First, the minority students are denied of the fundamental tools for reflection, searing thinking, and social interaction.Second, denying bilingual education is an act of affirming white supremacy and English supremacy. Declaring English as the valid language and pointing to critical aspect of know English as a requirement for success are 2 instances where English is pushed as the supreme language. The critics claim that the US is a nation built upon immigration and diversity of races makes it impossible to embrace so-called vernacular culture and common language. One of the prominent supporters of proposition 227 is the general population. fit in to the poll taken by the Los Angeles Times, 64% of registered white voters and 62% of registered Hispanic voters favored Proposition 227. Their reasons for the support are echoed in the content of the proposition. First, for the last two decades, bilingual education has not alleviated the current high drop-out rates and low English literacy levels of many immigrant children. They believe that bilingual education has failed because only 6. 5 percent of children with limited English language skills travel into first-string classes last year.They site the explore that shows that sheltered English immersion is the most effective method of helping non-English speaking children learn En glish. Also, schools cannot teach all children in their home language because more than 50 languages are spoken in students homes. Hence, it is only fair that unified program be offered to all students, allowing all students to equally cultivate their English fluency.The supporters believe in two broad assumptions about education. First, the proposition claims that for productive members of our society, literacy in English language is among the most important. Second the proposition claims that young immigrant children can slowly acquire full fluency in a new language, such as English, if they are heavily exposed to that language in the classroom at an early age. Hence, the proposition can promote sheltered English immersion for maximum of one year. The criticisms for such claims are rather obvious.First, research shows that if anything can be blamed for high illiteracy rate, it is education in whole since over 60 one thousand thousand Americans are illiterate or functionally illi terate. Also, full literacy in English language may not be necessary for productive members of our society since immigrants from Asia and Europe are deliver the goods quite nicely in America while it is black Americans, whose ancestors have been speaking English for over 200 years, find themselves still relegated to ghettos. Hence, til now with conflicting research data, criticisms for bilingual education are exaggerations. Even as such, my own experience with bilingual education makes ending bilingual education attractive. I came to the US only knowing my alphabet.And, I do not remember bilingual classes offered to a Korean kid at my secondary high school. Yet, I remember stepping into honors English class by the second-year year of my high school when Latino and Latina kids I knew from ESL classes in junior high school were still in ESL classes and in bilingual classes. eon I am not entirely convinced that bilingual education is a failure, I am convinced that public schools need great emphasis on academic achievements of students rather then simply graduating them on time.If get rid of bilingual education means unifying standards for all students, hence challenging all students equally, I must favor getting rid of bilingual education. I trust the much the same design was shared by the voters of Proposition 227. Since I could not decide to regenerate or not to amend the proposition, I looked to the gaps between the supporters and the critics of the proposition. Then, being the cynic that I am, I found the gaps to be political both parties were aspect out for their own interest, not so much for better education.Therefore, I decided to amend the proposition and to offer both parties their share of satisfaction. In researching for this paper, I kept wondering about substantial reasons for the teachers to oppose Proposition 227. If voters were convinced that something had to change, why were teachers not convinced? Overall, school budgets will not be cut, if anything it will be increased s liberally. Then I perspective of some reasons for teachers opposition.First, some of the bilingual education teachers, who earn more than the regular teachers would be in jeopardy from the proposition. Also, funding would be redirected to community members who carry to enlighten English learners. I had no reason to see that supporters of the proposition were any better. I did not see the biggest supporter, Ron Unz, the co-author of the proposition and the chancellor fund contributor of the proposition with $650,000, as either philanthropist or as philosopher who believes in helping out in a worth(predicate) cause against the status quo in education.I did see his intentions to be politically charged since, he has 1) challenged Governor Pete Wilson for the 1994 GOP nomination, 2) volunteered to grant $50 million per year for 10 years to fund English instruction for individuals who pledge to tutor children in their community, which ensures him a long public exposure and favorable light among employment seekers, and 3) mobilized Latino voters in his side in light of the touristy proposition.Hence, instead of choosing the better of two evils, I decided that the best proposition is a compromise between the two. First, basic spirit of the proposition is kept since it won in the election. Hence, LEP children are still mandated to enter English language classrooms. Also, English learners are placed in English immersion program for no more than a year.Second, to satisfy the teachers, some of $50 million will be spent to train current teachers for English language classrooms with LEP children and tutoring LEP children. In addition, current bilingual teachers will be allowed to tutor both LEP children and English learners as many years as assessed as appropriate by both the teacher and the school. Satisfying both the teachers and the parents through amending the proposition should lead to a better education, which is an unint ended positive outcome.

Friday, January 25, 2019

My Approach to Writing

My goals for this course is to be adapted to properly use quotations, paraphrasis and make corrections to grammatical errors also how to utilize various search strategies and organize information is a meaningful way so that the earreach can easily understand what I acquire written. To be able write information intelligibly and correctly is critical in my private and professional life.In my professional life I do have to archive on the customers account on what they called in about and the solution, the notes I built in bed on the customers accounts needs to be clear so that if the customer calls stake in the next representative will be able to discover and understand what I wrote. Same thing applies if my supervisor needs to look into the notes and or the call. As a college student I am involve to participate in class discussions, write and summarize essays.Since my classes are online the favored method of communication for the professors are electronic mails . 1 also p refer to electronic mail my supervisor with any requests, concerns etc , that way the requests is documented cause as homo being we have a tendency to forget things so the email can be used as reference. I also have to write notes or send emails to my daughter teacher as well, so being able to write properly is critical.I set goals for writing an schoolman paper by first understanding who my audiences are, so that I am able to express my ideas and thoughts and findings in a way that they can clearly understand. Then I begin to plan my work which includes , creating an outline, come up with points to over and a statement of purpose, which serves as a guide in the beginning I lolly to research and write the paper . When the writing Is finish I revise and proof-read for any errors .Writing for other can be very challenging. It requires you to be focused and creative. My biggest challenge would be coming up with natural and unique Ideas to impress or excite the audience I trust to make sure that my Ideas are not something that they Eve have perceive before. The first couple sentences can be pretty challenging entirely usually once those are completed then new Ideas start flowing.

Applications of Biometrics in Cloud Security

CHAPTER ONE 1. 1 INTRODUCTION The success of modern day technologies spiritedly depends on its effectivity of the worlds norms, its ease of practice session by end exploiters and more(prenominal) or less importantly its degree of in normalation pledge and control. tarnish figuring is a style of computer science in which dynamic every(prenominal)y ascendable and often virtualized resources ar provided as a portion oer the net income. Users need non dumbfound knowledge of, expertise in, or control oer the engineering science base in the obliterate that supports them 15, 16.Au consequentlytication, thus, becomes pretty important for calumniate warranter. Biometric is the most see to it and convenient earmark tool. It c bothinate non be borrowed, stolen, or forgotten and forging one is practically impossible. The term comes from the Greek words bios (life) and metrikos ( footprint). To make a face-to-face experience, biostatistics relies on who you atomic number 18 or what you doas distant to what you know. OBJECTIVES 1 To know and attend the meaning of biometric, its theatrical roles, the traits and in addition its avails and challenges. To know and understand the full meaning of bribe reason its type and its service suppliers 3 To explain the or so buy auspices and its shortfalls 4 To know how biometric engineering sight be applied to enhance pledge in blur figuring CHAPTER TWO 2. 0 BIOMETRICS The word bio inflection comes from the Greek language and is derived from the words bio (life) and metric (to measure). biometry (or biometric trademark) refers to the appellation of humans by their marks or traits.Computer science, biostatistics to be specific, is use as a form of recognition 1. Biometrics is automated modes of recognizing a soul establish on a physiological or deportmental symptomatic 2. Biometrics offers raw perspectives in high- credential department coats while supporting natural, substanc e ab exploiter-friendly and fast authentication. Biometric engineering uses these characteristics to post singulars automatically1. Ideally the characteristic should be universally present, unique to the individual, stable over time and advantageously measurable 5. 2. Biometric arrangings A biometric organisation provides an automated system of recognizing an individual based on the individuals biometric. A biometric is a measurement of a biological characteristic such(prenominal) as fingerprint, iris pattern, retina image, face or hand geometry or a behavioural characteristic such as voice, gait or tactual sensation. behavioural biometrics argon related to the behaviour of a Person, including but not limited to typing rhythm, gait, and voice. Some researchers drive home coined the term behaviourmetrics to describe the behaviour class of biometrics 1.A biometric administration is fundamentally a pattern- scholarship establishment that recognizes a person based on a feat ure vector derived from a specific physiological or behavioural characteristic that the person possesses 3. Biometric administrations jackpot be used in deuce opposite modes. Identity verification occurs when the exploiter claims to be already accedeled in the arranging (presents an ID card or login name) in this case the biometric entropy obtained from the drug user is comp argond to the users information already straind in the infobase light ( in any case called search) occurs when the indistinguishability of the user is a priori unknown.In this case the users biometric entropy is chalk uped against all the records in the database as the user foot be eitherwhere in the database or he/she actually does not bear to be on that point at all 4. The combination of biometric data systems and biometrics recognition/ appellation technologies creates the biometric security systems. 2. 2 Biometric documentation certificate on the other hand, is a growth where a known persons live biometric is compargond to a stored pathfinder of that person.For extype Ale, an individuals identity is revealed to the biometric system upon stick ining a PIN (Personal denomination Number). To authenticate that this is the person associated with this PIN, a live biometric is presented by the individual and compared to the guidebook and a watch is determined. This is known as a cardinal to one search. It is more precise than the one to many application and is the predominant biometric process in place today and the more privacy friendly of the 2 systems.This answers the question Are you who you say you are? Two general uses of biometrics are identification and verification which some(prenominal) require the existence of commendation data that the persons thrifty traits provide be compared with name and address templates or raw data. During these processes, a biometric data sample is compared against the respective biometric data of every person enrolled in the database or against a single credit entry template of a dissipateicular enrolled individual in order to fix the identity of that person respectively.When a biometric system decently identifies a person, then the turn up of the identification process is a true positive, whereas if the system correctly rejects a person as not coordinated the respective enrolled template, the direct is a true negative. Similarly, when the system incorrectly identifies or rejects a person then we speak ab disclose a false positive or a false negative. Fig 2. 1 Components of a Biometric Authentication System31 2. 3 BIOMETRIC SECURITY form The biometric security system is a lock and catch machine to control price of admission to specific data.In order to feeler the biometric security system, an individual forget need to provide their unique characteristics or traits which give be matched to a database in the system. If there is a match, the locking system leave alone provide nark t o the data for the user. The locking and capturing system depart activate and record data of users who glide pathed the data. The relationship between the biometric and biometric security system is also known as the lock and key system. The biometrics security system is the lock and biometrics is the key to open that lock 11. 2. 4 CRITERIA FOR BIOMETRIC SYSTEM12There are s veritable(a) basic criteria for biometric security system 12 * Uniqueness uniqueness is considered as the priority one requirement for biometric data. It give indicate how unalikely and uniquely the biometric system leave alone be able to recognize for each one(prenominal) user among hosts of users . For instance, the DNA of each person is unique and it is impossible to replicate. * universality Universality is a criterion for the biometric security that indicates requirements for unique characteristics of each person in the world, which send awaynot be replicated. For example, retinal and iris are cha racteristics will compensate this requirement. Permanence permanence tilt is indispensable for every single characteristic or trait which is recorded in the database of the system and needs to be constant for a certain period of time period. This line of reasoning will mostly be affected by the age of the user * Collectability The collectability parameter requires the collection of each characteristic and trait by the system in order to verify their identification * execution performance outlines how easy the security system works. The accuracy and robustness are briny factors for the biometric security system.These factors will watch the performance of the biometric security system * Acceptability The acceptability parameter will choose fields in which biometric technologies are acceptable. * Circumvention circumvention will influence how easily each characteristic and trait provided by the user stop lead to failure during the verification process. DNA is believed to be the most surd characteristic leading to the failure of the verification process 13. Figure 2. 2 Basic Criteria for Biometrics credentials System 26 2. 5 TYPES OF BIOMETRIC systems Two classes of biometric methods are 1) Physical BiometricsPhysiological biometrics is based on measurements and data derived from direct measurement of a part of the human body. * reproduce Fingerprint recognition is one of the best known and most widely used Biometric technologies. Fingerprint recognition technology extracts features from impressions made by the distinct ridges on the fingertips. * Iris-scan Iris recognition technology is based on the distinctly biased ring surrounding the pupil of the eye. Iris recognition systems use a small, high-quality camera to capture a black and white, high-re resolving image of the iris. Retina-scan Retina recognition technology captures and analyses the patterns of blood vessels on the thin nerve on the anchor of the eyeball that processes light entering thro ugh the pupil. * Hand geometry Hand geometry technology takes 96 measurements of the hand, including the width, height, and length of the fingers distances between joints and shape of the knuckles. * facial recognition Facial recognition technology identifies deal by analysing features of the face not easily alteredthe upper outlines of the eye sockets, the areas around the cheekbones, and the sides of the mouth..Facial recognition can be used in both verification and identification systems. 2) Behavioural characteristics are based on an action taken by a person. Behavioural biometrics, in turn, are based on measurements and data derived from an action, and indirectly measure characteristics of the human body * Voice recognition Voice authentication is unique and non-intrusive method and also the severelyware requirements required for this type of authentication are cheap and are easy readily. Microphones can be used for this purpose.However the covering fire ground noise must be controlled, high terminal is required for this kind of authentication. This type of authentication can also be extraneously influenced by once sore throat and cold. 7 * Keystroke-scan Keystroke dynamics is a biometric based on the assumption that different bulk type in uniquely characteristic manners. Observation of telegraph operators in the 19th century revealed personally classifiable patterns when keying messages over telegraph lines, and telegraph operators could recognize each other based on only their keying dynamics 22.Keystroke dynamics is known with a a couple of(prenominal) different names keyboard dynamics, keystroke analysis, typing biometrics and typing rhythms 22. Currently users scram information to computer systems via physical keyboards or keyboards on touch screens. The important advantage of apply keystroke dynamics is that it can be used without any supererogatory hardware. Thus it is inexpensive. The user acceptance of a keystroke dynamics biometric system is very high, since it is not intrusive and users do not necessarily even up notice that such a system is used 22, 27. Signature credit rating Signature recognition authenticates identity by measuring handwritten signatures. The signature is treated as a series of movements that contain unique biometric data, such as personal rhythm, acceleration, and pressure f pocket-sized. In a signature recognition system, a person signs his or her name on a digitized nontextual matter tablet or personal digital assistant. The technology can also track each persons natural signature fluctuations over time. The signature dynamics information is encrypted and compressed into a template.One of the defining characteristics of a behavioural biometric is the incorporation of time as a metric the measured behaviour has a beginning, middle and end 6. A number of biometric methods have been introduced over the years, but few have gained wide acceptance. 2. 6 cognitive process OF BIOMETRICS S YSTEMS The by-line are used as performance metrics for biometric systems 8. * False Accept cast FAR and False Reject regulate FRR The FAR gives a measure of the probability that an individual will be falsely accepted by the system (i. . that the system accepts someone who is not enrolled on the system, or makes an incorrect identification). The FRR indicates how likely it is that a legitimate user will be rejected. The balance between the FAR and the FRR greatly influences both the security and usability of the system. The False Rejection Rate (FRR) is usually caused by lighting, climate conditions, low quality equipment or inexperience. The False Acceptance Rate (FAR) is caused by the security standard being too low 9. False Match Rate FMR and False NonMatch Rate FNMR A false match occurs when a system incorrectly matches an identity, In verification and positive identification systems, unauthorized people can be granted adit to facilities or resources as the result of incorrec t matches. That occurs when a subsequent reading does not properly match the enrolled biometric relating to that individual, something that results in Denial of Access to work. * The cross Error Rate (CER) The Crossover Error Rate (CER) is defined as the error rate of the system when the FAR and FRR are equal.Usually expressed as a percentage, the CER can be used to compare the performance of different biometric systems. * False enrol rate This occurs when a persons biometric is either unrecognizable, or when it is not of a sufficiently high standard for the machine to make a judgment, something that does not allow the user to enrol in the system in the first place. The fingerprints of people who work extensively at manual aim are often too worn to be captured. A high percentage of people are unable to enrol in retina recognition systems because of the precision such systems require.People who are mute cannot use voice systems, and people lacking fingers or hands from congenital disease, surgery, or injury cannot use fingerprint or hand geometry systems 10. Applications of biometrics 2. 7ADVANTAGES OF BIOMETRIC SECURITY 14 1. The first advantage of exploitation this new technology is the uniqueness and it is also the main characteristic which allows biometrics technology to become more and more important in our lives. With uniqueness of biometrics technology, each individuals identification will be single most effective identification for that user.A chance of twain users having the same identification in the biometrics security technology system is nearly zero. 2. Secondly, the super fixate way of identifying users makes this technology less prone for users to share access to highly sensitive data. For example, users can share their fingerprints, iris and so frontwards allowing other users access to plug away information. Each trait used during identification is a single property of that user. In other words, it is extremely hard or impossible to mak e duplicate or share biometrics accessing data with other users.This makes it ever more secure allowing user information and data to be kept highly secure from unauthorized users. 3. This identification of users though biometrics cannot be lost, stolen or forgotten. This aspect of biometrics technology allows it to become more popular in its use. This method of identifying and giving access to user makes user identification a lot easier. Finally, most biometrics security systems are easy to install and it requires small inwardness of financing for equipment (except modern biometrics technology such as DNA/retinal/iris recognition). . 8 CHALLENGES AND ISSUES Nothing is 100% secure, not even biometrics. Nevertheless, biometrics does provide the means to present security credentials that are unique. hostile other systems that may rely on passwords or tokens that can be vulnerable to loss or exploitation, no one is going enter your live biometric as a means of impersonation Just as a firewall does not constitute a network security solution but rather a component of a defensive strategy, biometrics could be viewed in the same manner.It is not lavish to assume inviolable verification with biometrics alone but rather as part of a well designed security implementation that considers strong two factor authentication. The second major threat is concerned with modification of the components of the authentication system. The capture device could be modified to output a different image to the one captured. Alternatively, it could be modified to create a denial-of-service (DoS) that will prevent legitimate users accessing the system (by smashing a camera, for example). The processes of emplate multiplication or template matching could be subverted to produce erroneous results for example, a musical composition of malevolent code could interfere with the template generation software to produce the attackers template rather than that of the legitimate user, or the ma tching process could be modified to produce an artificially high or low matching score. CHAPTER THREE 3. 1 CLOUD COMPUTING blotch computing is a means of accessing computer facilities via the lucre, where the adjective defame reflects the delineate use of a mist over as a metaphor for the Internet.Most of us have been using blotch-computing facilities in one form or another(prenominal) for years through ordinary email and the World Wide Web. Recently, the term has come to reflect the use of software and the running of computer applications via the Internet where the computer infrastructure and software are not on premises. hide computing, as a form of service provisioning, has given rise to some(prenominal) related concepts, such as mesh computing, spoil platforms, and software confirming service. stain Computing is a new computing model that distributes the computing missions on a resource pool that includes a large amount of computing resources.In a survey undertaken b y the International Data mint (IDC) group between 2008 and 2009, the majority of results point to employing fog computing as a low-cost viable option to users 17 developers or research projects and even e-commerce entrepreneurs. Using Cloud computing can help in belongings ones IT budget to a bare minimum. It is also ideally suited for development and testing scenarios. It is the easiest solution to test possible evidence of concepts without investing too much metropolis.Using vitiate computing service, users can store their critical data in servers and can access their data anywhere they can with the Internet and do not need to worry about system breakdown or disk faults, etc. Also, different users in one system can share their information and work, as well as play games together. Many important companies such as Amazon, Google, IBM, Microsoft, and bumpkin are the forerunners that provide foul computing services. Recently more and more companies such as SalesForce, Facebo ok, YouTube, MySpace etc. also begin to provide all kinds of cloud computing services for Internet users . 2 TYPES OF CLOUDS 18 In providing a secure Cloud computing solution, a major decision is to decide on the type of cloud to be implemented. Currently there are tierce types of cloud deployment models offered, namely, a ordinary, occult and hybrid cloud. A. Public Cloud A semipublic cloud is a model which allows users access to the cloud via interfaces using mainstream web browsers. Its typically based on a pay-per-use model, similar to a prepaid electricity metering system which is flexible enough to cater for spikes in demand for cloud optimisation.This helps cloud clients to better match their IT expenditure at an operational level by decreasing its capital expenditure on IT infrastructure 19. Public clouds are less secure than the other cloud models because it places an additive burden of ensuring all applications and data accessed on the public cloud are not subjected t o malicious attacks. Therefore charge and privacy concerns are rife when dealing with Public clouds with the Cloud SLA at its core. B. Private Cloud A reclusive cloud is set up within an organisations cozy enterprise datacenter.It is easier to align with security, compliance, and regulatory requirements, and provides more enterprise control over deployment and use. In the private cloud, scalable resources and virtual applications provided by the cloud vendor are pooled together and available for cloud users to share and use. It differs from the public cloud in that all the cloud resources and applications are managed by the organisation itself, similar to Intranet functionality. Utilisation on the private cloud can be much more secure than that of the public cloud because of its specified internal exposure.Only the organisation and designated stakeholders may have access to operate on a specific Private cloud 20. C. crossbred Cloud A hybrid cloud is a private cloud linked to one or more external cloud services, centrally managed, provisioned as a single unit, and circumscribed by a secure network 20. It provides virtual IT solutions through a mix of both public and private clouds. Hybrid Clouds provide more secure control of the data and applications and allows conglomerate parties to access information over the Internet. It also has an open computer computer architecture that allows interfaces with other management systems. . 3 CLOUD COMPUTING DELIVERY MODELS 18 The architecture of Cloud computing can be categorised according to the three types of delivery models, namely Infrastructure as a service (IaaS), software program as a service (SaaS) and broadcast as a service (PaaS). A. Infrastructure as a Service (IaaS) Infrastructure as a Service is a single inhabit cloud bottom where the Cloud computing vendors dedicated resources are only divided up with contracted clients at a pay-per-use fee. This greatly minimizes the need for huge initial investment in computing hardware such as servers, networking devices and process power.They also allow varying degrees of financial and functional flexibility not found in internal data centers or with co-location services, because computing resources can be added or released much more quickly and cost-effectively than in an internal data center or with a colocation service 21. B. Software as a Service (SaaS) Software as a Service also operates on the virtualised and pay-per-use costing model whereby software applications are leased out to contracted organisations by specialised SaaS vendors. This is traditionally accessed remotely using a web browser via the Internet.Software as a service applications are accessed using web browsers over the Internet therefore web browser security is vitally important. Information security officers will need to consider various methods of securing SaaS applications. Web Services (WS) security, Extendable Markup Language (XML) encoding, Secure Socket Layer ( SSL) and available options which are used in enforcing data protection transmitted over the Internet. C. Platform as a Service (PaaS) Platform as a service cloud layer works like IaaS but it provides an additional level of rented functionality.Clients using PaaS services transfer even more be from capital investment to operational expenses but must acknowledge the additional constraints and possibly some degree of lock-in posed by the additional functionality layers 20 . The use of virtual machines act as a catalyst in the PaaS layer in Cloud computing. Virtual machines must be protected against malicious attacks such as cloud malware. Therefore maintaining the integrity of applications and well enforcing accurate authentication ends during the transfer of data across the entire networking channels is fundamental.Figure 3. 1 CLOUD COMPUTING MAP 18 3. 4 CLOUD SECURITY Cloud computing have many advantages in cost reduction, resource sacramental manduction and time saving for new se rvice deployment. While in a cloud computing system, most data and software that users use recumb on the Internet, which bring some new challenges for the system, especially security and privacy. Since each application may use resource from multiple servers. The servers are potentially based at multiple locations and the services provided by the cloud may use different infrastructures across organizations.All these characteristics of cloud computing make it involved to provide security in cloud computing. To ensure adequate security in cloud computing, various security egresss, such as authentication, data confidentiality and integrity, and non-repudiation, all need to be taken into account. The biggest challenge in implementing flourishing Cloud computing technologies is managing the security. As with any new technology enhancements, criticisms are driven by fear of unknown variables and changes to current control procedures. How can cloud stakeholders ensure and promote the se curity of Cloud computing?In the Cloud Computing Services measure conducted during August 08/09 by IDC IT group 17, users were asked to rate their issues and challenges experienced with Cloud computing. The results illustrate that security is the biggest concern. aegis is the main issue users are concerned with when considering Cloud computing solutions. CHAPTER FOUR 4. 1 APPLICATION OF BIOMETRICS IN CLOUD SECURITY One of the bail risks in cloud computing according to Garfunkel 23 is hacked passwords or data intrusion. If someone hacks a password they get control over the resources.They can prepare the information or disable the services. Furthermore, there is a possibility for the users email (Amazon user name) to be hacked (see 24 for a discussion of the potential risks of email), and since Amazon allows a lost password to be reset by email, the hacker may palliate be able to log in to the account after receiving the new reset password 25. As an splendid storage scheme for t enants big data, cloud computing has been a scorching issue for a lot of consumers, generally, tenants different data should be urbane by different security modes.Biometric authentication has the advantage of sole(prenominal) for tenant in data access. When any registered cloud tenant , want to access the data stored in cloud, first, he must pass the cloud system check such as cloud_sys_checker A Hybrid biometric method can be developed by fusing finger prints and voice biometric methods. The fused appreciate can be used as signal sign on for multiple resources provided by cloud. This encrypted data is used for authentication 4. 2BIOMETRIC AUTHENTICATION SYSTEM AS A CLOUD SERVICEThe authentication service provider maintains the biometric data base . The data has to be stored in encrypted format using cryptography on biometric for the security reasons 4. 2. 1ARCHITECTURE BIOMETRICS AUTHENTICATION SYSTEM A secure data access scheme based on identity-based encryption and biometric authentication for cloud communication Cloud Services1 CS1 Cloud Services1 CS3 Cloud Services1 CS2 Biometric Authentication Service Org1 User1 User2 Org2 User1 User2 Fig4. 1 Biometric Authenticating System in cloud 30.The user ab initio enrols with the biometric system which is provided by a cloud, once the identity is registered his/her biometric authentication exposit are stored in cloud service provider database. The authorization flesh out are also entered at the registration time which is also encrypted. Whenever the user wants to use any cloud service user first uses the biometric authentication service rather than a traditional password mechanism. Once authenticated, the user is redirected to the actual cloud service for which he is authorized to use. 4. 3 A PROPOSED METHOD 29 Step1 Setup cloud side parameters . Initialization On the cloud service side, given a security parameter 2. Key generation When tenants are registered in cloud computing providers, each tenant will obtain a unique identity to identify him or her. The leg generates private key comparable to given registered ID of every tenant in cloud computing. Step2 Generate tenants biometric template Cloud computing is a pervasive service environment for tenants, different tenants have different security requirement. To these tenants who have special security concern on data can generate their biometric template and be stored in cloud database.Biometric authentication must be needed when someone wants to access the data. Step3 Encrypt cloud data Input cloud data (which is created by cloud tenants and stored in the database of cloud platform), a private key (the cloud service providers), and an ID (the cloud tenant who want to access the data) output encrypted cloud data. Step4 Biometric authentication As an excellent storage scheme for tenants big data, cloud computing has been a hot issue for a lot of consumers, generally, tenants different data should be processed by different security mo des.Biometric authentication has the advantage of exclusive for tenant in data access. Step4 Biometric authentication As an excellent storage scheme for tenants big data, cloud computing has been a hot issue for a lot of consumers, generally, tenants different data should be processed by different security modes. Biometric authentication has the advantage of exclusive for tenant in data access. When any registered cloud tenant say, p, want to access the data stored in cloud, first, he must pass the cloud system check such as cloud_sys_checker.Then, cloud tenants use registered identity ID to create their biometric template and all of the created templates are stored in cloud_sys_database. In cloud data access, cloud tenant p must pass the biometric authentication performed by biometric marriage broker in cloud computing. Step5 Decrypt cloud data Input encrypted cloud data ciphertext (which is generated in Step3), an ID (the cloud service providers), a private key (the cloud tenant w ho want to access the data), and output the corresponding plaintext i. e. cloud data. CHAPTER FIVE 5. 1 SUMMARYIn summary, as Biometrics allow for change magnitude security, convenience we can say that fused biometric authentication system will be novel solution for authenticating users on cloud computing ,which can be provided as service on cloud . By following guiding principles discussed in this paper, a great deal of insecurities may be easily expelled, saving business owners valuable time and investment. Cloud computing has the potential to become a frontrunner in promoting a secure, virtual and economically viable IT solution. Future work and progress lies in standardising Cloud computing security protocols 5. CONCLUSION . Authentication is necessary in Cloud Computing. In order to seek a secure data access method for cloud tenants, a proposed method presented a secure data access mechanism based on identity-based encryption and biometric authentication in this paper, the mec hanism set double protection for confidential data of cloud tenants, encryption will make the tenants data secure against the peekers and biometric authentication will carry away the maloperations over tenants data by root administrator in cloud service. The security of data is maintained even though the same application is shared by multitenant.To ensure the correctness of users data in cloud data storage, an effective and flexible biometric is proposed. i believe that data storage security in Cloud Computing, an area full of challenges and of paramount importance, is still in its infancy now, and many research problems are yet to be identified. This proposed method can be implemented with more security by using strong biometric m easures like eye. REFERENCES 1 http//en. wikipedia. org/wiki/Biometrics 2 J. L. Wayman, Fundamentals of Biometric Authentication Xhtp/ww. engr. sisu. edu/biometrics/nbtcw. p 4 http//www. fi. muni. cz/reports/files/older/FIMU-RS-2000-08. pdf 6 http//www. indexbiometrics. com/physiological_or_behavioral. htm 7 http//ntrg. cs. tcd. ie 8 Cernet. CHARACTERISTICS OF BIOMETRIC SYSTEMS. online available http//www. ccert. edu. cn/education/cissp/hism/039-041. html. February 2013 9 V. Vijaya Kumari and N. Suriyanarayanan. Performance Measure of Local Operators in Fingerprint Detection. Academic Open Internet Journal, vol. 23, pp. 1-7, (2008). 10 www. gao. gov/cgi-bin/getrpt? GAO-03-1137T. February 2013 11 Jain, A. K. Ross, A. Pankanti, S. , Biometrics a tool for information security Volume 1 Issue 2, Issue Date June 2006, page(s) 125 143 12 Michael E. Schuckers, Some Statistical Aspects of Biometric Identification Device Performance, 2001 13 Sandra Maestre, Sean Nichols DNA Biometrics, 2009 14 Massimo Tistarelli and Marks Nixon, Advances In Biometrics, Springer-Verlag Berlin Heidelberg 2009, ISBN 03029743 15Erdogmus, H. Cloud Computing Does Nirvana Hide behind the Nebula? IEEE Software 26(2), 46 (2009) 16 Leavitt, N. Is Cloud Computing Really Ready for Prime clip?Computer 42(1), 1520(2009) 17 Gens F, 2009, New IDC IT Cloud Services Survey Top Benefits and Challenges,IDC eXchange, viewed 18 February 2010, Accessed online <http//blogs. idc. com/ie/? p=730>. February 2013 18Ramgovind S, Eloff MM, Smith E, The Management of Security in Cloud Computing Online Available http//uir. unisa. ac. za/bitstream/handle/10500/3883/ramgovind. pdfjsessionid=75882F66B5AF28B3D640A3C5F9CFD837? sequence=1 February 2013 19 A Platform Computing Whitepaper, Enterprise Cloud Computing Transforming IT, Platform Computing, pp6, viewed 13March 2010. 20Global Netoptex Incorporated, 2009, Demystifying the cloud. Important opportunities, crucial choices , online pp 4-14 Available http//www. gni. com, February 2013 21 Brodkin J, 2008, Gartner Seven cloud-computing security risks, Infoworld, Accessed email&160protected http//www. infoworld. com/d/security-central/gartner-seven-cloudcomputing-Security-risks-853? page=0,1 February 2013 22 J. Ilonen, Keystroke dynamics, Lappeenranta University of Technology, Finland, http//www. it. lut . fi/kurssit/03-04/010970000/seminars/Ilonen. pdf (2003) 23 S. L.Garfinkel, An evaluation of amazons grid computing services EC2, S3, and SQS, Technical Report TR-08-07, Computer ScienceGroup, Harvard University, Citeseer, 2007 24 S. L. Garfinkel, Email-based identification and authentication An alternative to PKI? , IEEE Security and Privacy, 1(6), 2003 25 Cloud Computing Security From Single to Multi-Clouds Online Available http//ieeexplore. ieee. org/stamp/stamp. jsp? tp=&arnumber=614956 February 2013 26 Rahultech IT trends-latest/recent trends in information technology 2010online available