Friday, December 20, 2019

Soren Kierkegaard Essay - 1309 Words

Project: Soren Kierkegaard: Mega Mind of the 19th Century Soren Kierkegaard: Mega Mind of the 19th Century As a man whose work spans across areas such as philosophy, theology, devotional literature, and more, Soren Kierkegaard is considered one of the mega-minds of philosophy and the 19th century. He was influenced by many people throughout his life, as well as influencing many people himself. With works that ranged from religious views all the way to developing a â€Å"new† way to view our surroundings, Kierkegaard was a very well-rounded and mentally profound man. There were few people that could influence such a profound mind at the time, but Kierkegaard found them both in church as well as in the realm of philosophy. As a whole†¦show more content†¦how deceptive then, that an omnipresent being should be recognisable precisely by being invisible’ (McDonald, 1996).† His father’s influence has been noted quite frequently in Kierkegaard’s works. Not only did Kierkegaard inherit his fathers melancholy, his sense of guilt and anxiety, and his pietistic emphasis on the dour aspects of Christian faith, but he also inherited his talents for philosophical argument and creative imagination (McDonald, 1996). Kierkegaard was a very religious man, even though he did not attend church on a regular basis. â€Å"He perceived God and existence of life from a humanistic view emphasizing the total autonomy of man (Philosopher Kierkegaard, 2011).† As almost a lone man standing, Kierkegaard was in seclusion publishing his writings for most of his adult life, due to the atheism of fellow philosophers of his time. â€Å"[Kierkegaard’s] legacy was his belief that our response to God should be one of unrestrained passion toward our beloved (Philosopher Kierkegaard, 2011).† During his later years Kierkegaard felt that the Christian religion had become corrupt through secular and political involvement, so he started to attack Christendom sayingShow MoreRelatedSoren Kierkegaard on God1772 Words   |  7 PagesKierkegaard claims that, Infinite resignation is the last stage before faith, so anyone who has not made this movement does not have faith, for only in infinite resignation does an individual become conscious of his eternal validity, and only then can one speak of grasping existence by virtue of faith, (page 52). This idea is demonstrated when Abraham surrenders himself to his fate and surrenders the life of his son to God. This infinite resignation is the reason God grants Abraham his son’s lifeRead MoreEssay The Father of Existentialism: Soren Kierkegaard1068 Words   |  5 Pagesphilosophical thinking begin with the human in terms of thinking, acting and feeling. The fundamental concepts of the externalist philosophers are that they believed that the existence of human conditions is the main problem to share similar ontology. Soren Kierkegaard is considered to be the father of existenti alism. Although, he did not use the word ‘existentialism’, but initially the concept that no society or religion is the main cause that leads an individual to live a life with sincerity or passionatelyRead MoreA Summary, Analysis and Discussion of Sà ¸ren Kierkegaard, Training in Christianity2560 Words   |  11 PagesA  summary, analysis and discussion of Sà ¸ren Kierkegaard, Training in Christianity[1] I. Introduction In this essay, I will try to summarize, analyze and discuss several pages of Sà ¸ren Kierkegaard’s Training in Christianity. I will try to focus on his approach to sacred history, a general Christian history and Christianity, which he discusses in this work in relation to faith in God. In other parts of this essay I will attempt also to relate these pages of his work to some key ideas ofRead MoreSoren Kierkegaard And The Existentialist Philosophy1116 Words   |  5 Pages 2. The Existentialist philosophy, started by Soren Kierkegaard, focuses on self-directed education, finding answers within yourself. Students are not graded because all standards come from themselves. This philosophy emphasizes freedom of choice and mind, and that authentic creative thinking leads to true learning experiences (Cohen). The teacher helps students find their passions and understand who they are. Existentialism has never become prevalent in schools because it is difficult to apply inRead MorePhilosophical Fragments By Soren Kierkegaard Essay922 Words   |  4 PagesIn Sà ¸ren Kierkegaard’s book, â€Å"Philosophical Fragments† he first prefaces his writing by explaining his own inadequacy to do so. It is his desire to deliberate upon the actuality of truth and it’s application to the human existence, but in order to do so, he deemed it necessary to admit that â€Å"What is offered here is only a pamphlet...without any claim to being a part of the s cientific-scholarly endeavor†¦Ã¢â‚¬  (Preface 1 IV 176). Near the end of his preface Kierkegaard, in efforts to convey his intentRead MoreThe Existential Choice : Soren Kierkegaard1368 Words   |  6 PagesSoren Kierkegaard is a Danish philosopher and theologian who attempted to deliver his existentialist point of views. Specifically, Kierkegaard emphasizes the need for humans to take responsibility for their actions and go beyond their â€Å"socially imposed identities† (Stanford Encyclopedia of Philosophy). According to his earliest major work â€Å"Either/Or,† he suggests humans are reluctantly stuck between two spheres of life that they must choose between: aesthetic or ethical. He delves into what constitutesRead MoreThe Philosophy Of Plato, Soren Kierkegaard, And Friedrich Nietzsche2613 Words   |  11 Pagesjournal with the goal of recounting my travels to different philosophical societies. Remarkably, each one of the three societies I was privileged enough to travel to r igidly followed a renowned philosophy. These were the philosophies of Plato, Soren Kierkegaard, and Friedrich Nietzsche. The Republic The first society I visited was that of Plato ’s philosophy. The residents were very kind and sought out true meanings of different vi rtues solely by dialectic. They structured their city much the sameRead MoreThe Individual or Society Essay1235 Words   |  5 Pagesinterest. Due to that contradiction, individualism is often contrasted with society or anti-individualism. Does the interest of the individual produce society or does the interest of society produce the individual? To defend individualism will be Soren Kierkegaard and to defend society will be Bertolt Brecht. What is the price of individuality and is it worth the cost? To be an individual is to have individual thoughts, however our actions throughout our life are far from individualistic. Our thoughtsRead MoreThe Song Unwritten by Natasha Bedingfield850 Words   |  3 Pagesexistentialism music seems to span from much of the well-known literature. Existentialism is prominently seen in literature through the minds of geniuses like Kierkegaard, Heidegger and Sartre. The Concept of Anxiety by Kierkegaard helps to explain the true definition of anxiety and why it exists. â€Å"Learning to understand anxiety is an adventure† (Kierkegaard). Anxiety is having fear for the unknown, so there is nothing truly there to fear. (www.uri.edu)The dark causes great fear but the fear is of somethingRead MoreComparing and Contrasting Nietzsche’s Preparatory Human Being and Kierkegaard’s Knight of Faith1469 Words   |  6 Pagesto some question, proposed about subjects that are necessarily personal in nature. All of philosophy is personal, but some philosophers may deny this. Discussed here are philosophers that would not be that silly. Two proto-existentialists, Sà ¸ren Kierkegaard and Friedrich Nietzsche, were keen observers of humanity, and yet their conclusions were different enough to seem contradictory. Discussed here will be Nietzsche’s â€Å"preparatory human being† and Kierkegaard’s â€Å"knight of faith†. Both are archetypal

Thursday, December 12, 2019

President of the United States free essay sample

Enhanced interrogation isnt enhancing the United States interests, as the war on terrorism continues the United States have gone to all lengths to stop it but has it gone to far in the new technique of enhanced interrogation. Former vice president Dick Cheney makes claims that had it not been for the actions taken further attacks agents the United States would have been made (Bergen), Cheney continues with if only americans could see the top secret information I was given access to then their minds would have changed (Bergen). Yet by using this new technique the government has put the lives of American citizens at risk of other nations retaliating to the actions made. Abu Zubaydan whom was the first detainee to be subject to the new enhanced interrogation techniques is a perfect example of this back firing on the government. Zubayden was subject to extreme weather conditions, stripped of his humanity and water-boarded 83 times (Bergen) only to realize Zubaydan had none of the information the government wanted and the United Stated was forced to return him. We will write a custom essay sample on President of the United States or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page A huge red target on the United Sated back for torturing a man with unjust causes. After this case had occurred during the Bush administration it was called into question the actions of authority figures, John Brennan current chief of counterterrorism advisor is being promoted after allegations that Brennan sat idly by as men were being tortured (Prasow) should Brennan be held accountable for the actions taken or be counted amount the ranks of unassuming heroes? (Prasow). Having this debate occur shows a weakness in our governments decision making which ultimately makes the United States as a whole look week. The behavior of one man should not be rewarded when Brennan has committed actions that is had not had the title he holds would be deamed a crime that must be punished. The interrogation practices that the CIA used had long been considered illegal (Prasow) using this is going to increase the determination of our enemies and decrease other nations willingness to cooperate with the United States leaving the country venerable to further attacks with no backup. Finally because of both actions occurring President Obama passed the Detainee Treatment Act in 2005 and completely banned enhanced interrogation making the fedral goverment suspend their use of interogation techniques.

Wednesday, December 4, 2019

Application of Sensory for the Maintenance of Health for the Elderly

Question: Write a Literature Review of "The application of Sensory for the Maintenance of Health for the Elderly. Answer: Introduction Disorders of smell and taste are often diagnostic dilemmas that most times present themselves in elderly people(Croy, Nordin, Hummel, 2014). The lack of knowledge and insight of these impairment conditions are common and can result in life threatening situations especially among the aged. In addition, poor appetite is a challenge faced by elderly people living both at home or in nursing care homes. Poor appetite can result in nutritional deficiencies and weight loss and is linked to poor health outcomes and mortality. By gaining an understanding on what causes reduced appetite and its link to sensory impairment, clinical staff and nurses can quickly identify elderly patients that have an impaired appetite. Several strategies can be utilized in promoting appetite and increasing intake of food (Pilgrim, Robinson, Save, 2015). The role of senses in food intake When the human tongue receives taste signals, a number of neural pathways are activated. However, these pathways don't require for food to be in the mouth for them to be activated; the sound of rattling dishes, or an image of food can cause the stomach to rumble. The sense of vision provides a critical sense with regard to food perception, driving preferences and raising expectations. Humans discriminate unconsciously, between foods that are low and high in calories, by just looking at the said food. Looking at images of food that are low or high calorie provokes different responses with varying intensities in the brain(Toepel, Ohla, Hudry, 2014). The study by Toepel et al.,( 2104) tested subjects where they were shown images of high calorie foods such as pastry, pizza, salmon, and lamb chops which were alternated with images of low calorie foods such as pasta/tomato sauce, yoghurt, watermelon, and beans. For every image observed, a weak electric current was attached to the tongues of the participants which stimulated the state function of the brain without any real taste being mimicked. This produced a metallic taste and sensation hence, the a food cue was initiated by the images and neutralized by the metallic stimulation. The results from the EEG measurements showed that looking at high calorie images stimulated pleasant and strong sensations as opposed to the low calorie food images. The high calorie images evoked neural activity which was stronger in some parts of the brain such as frontal operculum and the bilateral insula in comparison to images of lower calories. Any taste pleasantness changes activated the medial orbitofrontal cortex. Shape also affects taste as was studied by Gal in a research that analyzed consumer behaviour against marketing. In the study, the participants first sorted geometric figures after which they were shown a piece of cheese that had pointed corners rather than the usual round ones. The subjects described the taste of the cheese as being sharper (Bakalar, 2014). However, understanding the brain's mechanism that connects between gustatory and visual senses is still a relatively new In addition to visual and shape, odour too plays a significant role. Volatile molecules are released when a person chews food which then travel to the receptors at the back of the mouth that lines the nasal passages. The receptors are what enable a person to identify the different sensations' combinations which result in flavour- knowing what one is consuming. When a person eats sour or sweet strawberry, the mouth is able to detect this even while the nose is held tight (Stevenson, 2012). Hearing too plays a part in what people eat. If for example one hears the crunch of potato crisps, one imagines the crisps to be fresher. Taste can also be affected by sound as was demonstrate by a study where participants were asked to bite into crisps and rate their freshness and crispiness. The researcher played a crunching sound once the subject took a bite and which systematically changed the perceptions by the subjects where the subjects stated the crisps were crispier and fresher compared to when there was no aural cue (Spence,2015). Temperature also is a factor that determines one's perception of taste. For example, warming ice cream increases the perceived flavour. Sensitivity to temperature is regulated by the taste buds' molecular processes that are responsible for the different tastes (Amerine, Pangborn, Roessler, 2013). Increasing food temperature to 15-35 degrees Celsius enhances one's sweetness neural response. In approximately half of the population, cooling or heating the tongue causes taste sensations in that, cooling the tongue increases the salty or sour tasting sensations while increasing the temperature increases the taste sensation of sweetness. Taste and Smell receptors Smell when compared against taste, is more complex as human receptors for taste are fewer than receptors for smell. The five taste receptors are umami, bitter, salty, sour, and sweet. There are various ways of mixing both smell and taste leading to a broad array of flavours that a person perceives and which bear little subjective resemblance to the aforementioned tastes. There is a neurological link between taste and smell that is unique to the two senses. When one sees and hears something simultaneously, two different neurological pathways are used while this is not the case with tasting and smelling. For example, when one pops a jellybean in the mouth while holding the nose tight, one can still sense the jelly beans' sweetness but will not perceive the flavour. Once a person releases the nose, the flavour becomes identifiable. The flavour thus comes from the nose even when one tastes the sweetness of the beans (Society for Neuroscience, 2015). There is a distinction between smelling via the nose and via the back of the throat, while there is a neurological distinction in the tasting. Arrival of the retronasal and orthonasal odours is via the same route however, when they arrive simultaneously as taste, integration of taste and odour occurs which creates the perception of flavour. Flavour is only perceived through the simultaneous arrival of odour and taste to the anterior insula. Hence, it is concluded that the overlapping of the distinct smell and taste pathways occurs in the anterior insula. When molecules bind in the tongue receptors, then the sense of taste can be perceived which proceeds to send signals to various parts of the brain to eventually meet at the anterior insula (Yin, Hewson, Linforth et al., 2017). Further, a person is able to differentiate the experience with food through touching the food. This is more so, with regard to true fats (an example is the creamy taste of ice-cream and butter). There are specific neurons in the brain's orbitofrontal cortex that respond to fats texture in the mouth such as fat rich foods including chocolate and ice cream as well as similarly oily non food substances such as silicone oil and mineral oil. In addition, the taste of soda is influenced greatly by feel where a flat soda tastes different from a carbonated one (Drewnoski Almiron, 2010). Appetite and Diet in old age The proportion of elderly is escalating fast in the world. It is estimated that by 2025, there wil be 1.12 billion people aged 60 and above with most having some level of sensory loss including smell and taste perception (Coreira, Lopez, Wroblewsski et al., 2016). Laboratory and clinical studies have shown a decline in smell and taste functioning among persons aged 60 years and above which increases in severity in those aged 70 years and above. Dysfunction of smell and taste is caused by ageing and some specific disease conditions such as Alzheimer's and cancer, surgical and pharmacological intervention, environmental and radiation exposure. The chemosensory deficits may result in alteration in food choices and consumption and subsequently worsen any existing medical conditions, compromise immunity and nutritional status, change food choices and result in decrease in weight (Doty Kamath, 2014). As has been discussed earlier, vision, smell, and taste are involved in food enjoyment. When these senses are impaired due to ageing, they result in a reduction in appetite among the elderly. Appetite is stimulated by the smell of food while the taste of food promotes its enjoyment and stimulates the appetite further even after eating. Most elderly people have taste and smell senses that are impaired and which hinders their appetite to a great extent (Nieuwenhuizen et al., 2010). Having a good vision helps in stimulating one's appetite (Spence, Okajima, Cheok et al., 2015). As one ages, the vision reduces with 1 in 5 persons aged 75 years and above and 1 in every 2 persons aged 90 years and above having loss of vision (RNIB, 2014). The body composition of an individual is what determines his/her energy requirements and more so, the fat free mass (the component s of the body that are exclusive of fat for example organs, bones, and muscles), and their physical activity levels. As people age, they lose the fat free mass with a 1% rate of skeletal muscle loss among those aged 70 years and above. With most being physically inactive. Therefore the energy requirements among the elderly are low which is a contributory factor to appetite loss. This varies among individuals, which is reflective of the body composition differences as well as physical activity differences (Milanovi?, Panteli?, Trajkovi? et al., 2013). As people become older, the sense of smell deteriorates with declining olfactory functioning (Doty Kamath, 2014;Smoliner, Fischedick, Sieber et al., 2013).In addition to losing the sense of smell, people lose the ability to differentiate smells with more than 75% of persons aged 80 and above experiencing acute olfactory impairment with increased continuous decline after 70 years (Doty et al., 2014). Of persons aged between 80-97 years, 62.5% had olfactory impairment(Schubert, Cruickshanks, Klein et al., 2011). However, taste impairment is more common than olfactory impairment (Malaty Malty, 2013) Gustatory dysfunction is also linked to ageing, however, most often, what is thought to be taste impairment is in fact an olfactory impairment. Besides smell impairment, taste impairment is caused by prior infection of upper respiratory area, drug use, head injury, as well as idiopathic causes (Fomazieri, Borges, Bezerra, et al., 2014; Bromley Doty, 2014; Roper, 2013).Problems with chewing caused by loss of teeth and dentures can interfere with sense of taste along with decreased production of saliva. Decreased senses of tastes and smell causes suppression of appetite which results in loss of weight, impaired immunity, malnutrition, and medical conditions deteriorations (Phillips, Caroll, Drayson et al., 2015; Jacobson, Green, Murphy,2010).Problems with nutrition form a significant sequeale from disorders of taste and smell.Elderly persons need two-three times more salt concentration in tomato soup before they are able to detect it (Ahmed Haboubi, 2010).The tendency for the elderly to take in higher concentrations of sugar and salt can exacerbate already hazardous medical conditions they may be experiencing. A decrease or distortion in the sense of smell results in a decrease in life quality or even disability(Smeets, Veldhuizen, Galle, 2009). Further, such medical conditions can result in a high level of depression and anxiety in the person. Anxiety resulting from inability to enjoy the taste of food and fear that the taste impairment could be as a result of an unknown condit ion. In addition, there is also heightened depression among persons with anosmia (Hummel, T., Landis, B. N., Httenbrink,, 2011). Chemosensory Dysfunctions Classification of chemosensory dysfunction is as follows: ageusia (loss in sense of taste), hypogeusia (decrease in taste sensitivity), dysgeusia (normal taste distortion), anosmia (loss in of the sense of smell), hyposmia (decrease in smell sensitivity) and dysomia (normal smell distortion). Persons with hypogeusia often need tastants in higher concentrations in order to detect the same; their threshold for detecting and recognizing tastants is elevated above the normal controls. These group of persons also have less intense suprathreshold concentrations. Persons with dysgeusi experience taste distortion such as metallic/bitter taste sides that are not often linked to the foods they are consuming. Analogous impairments in perceptions of smell are often reported in persons with dysosmia and hyposmia. Chemosensory deficits compensation methods The chemosensory deficits that the elderly experience are irreversible. However, there are several sensory interventions that can be applied such as odour and taste intensification to compensate for perceptual loss that is age related. One such method is addition of monosodium glutamate (MSG) in food during and after its preparation to enhance its taste and smell as well as enhance its palatability. Taste and smell disorders management When a person presents with taste and smell disorders, they will first need reassurance and counselling that they are not suffering from an infection or malignant disease. Once diagnosis of diminished smell is done, the management goal will entail injury prevention that is related to the condition. Gas detection visual stimulating devices are ideal for a person that use gas stoves as such a person will be incapable of smelling a gas leak. Neighbours and relatives will need to be involved in assisting such a person as he/she may be unable to detect spoiled food which can cause food poisoning if consumed. MSG MSG is the glutamic acid sodium salt that poses the unique umami taste quality. The term umami is Japanese with no English translation , and is used for describing the MSG taste as well as the taste of certain broths and fish. The umami taste is similar to the protein taste. Different tests have shown that umami does not fall in any of the categories of bitter, salty, sour, and sweet. MSG is used in making commercial mixtures that contain specific 5-ribonucleotides such as IMP (inosine-5-monophosphate) and GMP (guanosine-5-monophosphate). MSG together with these compounds have synergistic and potent effects, including a significant decrease in the threshold levels of MSG. Flavours A person with a taste disorder will need flavoring enhancements added to his/her food. Flavors are a combination of odorant molecules which are blended or extracted from natural product or can be synthesized from natural products through mass spectrographic and chromatographic analysis. Flavor enhancers modify or enhance the food's original aroma or taste but lack their individual aroma or taste. For example, simulated beef flavour can be used as an addition to beef or beef soup to increase the beef sensation. There is a difference in flavour enhancement from the more common taste and odour sensation enhancers such as salt, herbs, and spices. Herbs and spices add diverse flavours as opposed to intensifying the food's existing chemosensory properties. Flavours are not spices hence they do not cause any stomach or mouth irritations. The main component in flavour enhancements is salt but also, MSG is used often. Flavour enhancement added in food for the sick and elderly can improve the palatability of food and also its acceptance, slow or reverse decline in functionality, increase counts of lymphocytes, and improve the overall quality of life. It also potentially makes up for anorexia (Islam, Fagundo, Arcelus, 2015).One study revealed that enhancement of flavour for the elderly living in a retirement home resulted in an enhanced immune status as witnessed in levels of B and T cell counts and also an improved strength in grip (Islam et al., 2015). In addition, odour and taste stimulation among the elderly has been shown to improve with an increased salivary IgA rate (Philips et al., 2015) Conclusion Several factors contribute to impaired appetite among the elderly and these are often linked to the psychological and physical alterations that come with ageing. Poor appetite is significant as it increases the likelihood of a person becoming nutritionally deficient and even losing weight. Weight loss is particularly difficult to regain in elderly patients and along with nutritional deficiency, they are both associated with mortality and poor health outcomes. The nurse is in a position to quickly identify patients that have impaired appetite and can commence on interventions to help the elderly patients to enhance their appetite and increase food intake by utilizing different strategies as discussed in this paper. These strategies include flavoring food with sauces, spices, and herbs, improving the ambience of food, ensuring the patient has company while eating, serving meals that the patient has shown preference for and during regular times when the patient eats. Amplification of fo od taste and flavor using MSG can improve the palatability of the food and its acceptance as well. It can also increase the immunity and salivary flow in a patient as well as minimize oral complaints among the elderly and the sick. Flavor molecules compensate for losses in chemosensory abilities by interacting with receptors in the mouth. MSG adds taste without enhancing other tastes. It may also be helpful to increase the patient's physical activity. Finally, the use of oral nutritional supplements may be necessitated in supporting elderly patients with acute illness and who have very low appetite. References Ahmed, T., Haboubi, N. (2010). Assessment and management of nutrition in older people and its importance to health.Clinical Interventions in Aging,5, 207216. Amerine, M. A., Pangborn, R. M., Roessler, E. B. (2013).Principles of sensory evaluation of food. Elsevier. Bakalar, N. (2012). Sensory science: partners in flavour.Nature,486(7403), S4-S5. Bromley, S.M. Doty, R.L. (2014)Clinical disorders affecting taste: an update. Chapter 39 in R.L. Doty (Ed),Handbook of Olfaction and Gustation(3rd Edition). New York: Wiley-Liss, 2014, in press. Correia, C., Lopez, K. J., Wroblewski, K. E., Huisingh?Scheetz, M., Kern, D. W., Chen, R. C., ... Pinto, J. M. (2016). Global sensory impairment in older adults in the United States.Journal of the American Geriatrics Society,64(2), 306-313. Croy, I., Nordin, S., Hummel, T. (2014). Olfactory disorders and quality of lifean updated review.Chemical senses,39(3), 185-194. Doty, R. L., Kamath, V. (2014). The influences of age on olfaction: a review.Applied Olfactory Cognition,5, 213-232. Drewnowski A, Almiron-Roig E.(2010) Human Perceptions and Preferences for Fat-Rich Foods. In: Montmayeur JP, le Coutre J, editors. Fat Detection: Taste, Texture, and Post Ingestive Effects. Boca Raton (FL): CRC Press/Taylor Francis; 2010. Chapter 11.Available from: https://www.ncbi.nlm.nih.gov/books/NBK53528/ Fornazieri, M. A., Borges, B. B. P., Bezerra, T. F. P., de Rezende Pinna, F., Voegels, R. L. (2014). Main causes and diagnostic evaluation in patients with primary complaint of olfactory disturbances.Brazilian journal of otorhinolaryngology,80(3), 202-207. Hummel, T., Landis, B. N., Httenbrink, K.-B. (2011). Smell and taste disorders.GMS Current Topics in Otorhinolaryngology, Head and Neck Surgery,10, Doc04. https://doi.org/10.3205/cto000077 Islam, M. A., Fagundo, A. B., Arcelus, J., Agera, Z., Jimnez-Murcia, S., Fernndez-Real, J. M., Fernandez-Aranda, F. (2015). Olfaction in eating disorders and abnormal eating behavior: a systematic review.Frontiers in Psychology,6, 1431. https://doi.org/10.3389/fpsyg.2015.01431 Jacobson, A., Green, E., Murphy, C. (2010). Age-Related Functional Changes in Gustatory and Reward Processing Regions: An fMRI Study.NeuroImage,53(2), 602610. https://doi.org/10.1016/j.neuroimage.2010.05.012 Malaty, J., Malaty, I. A. (2013). Smell and taste disorders in primary care.Am Fam Physician,88(12), 852-859. Milanovi?, Z., Panteli?, S., Trajkovi?, N., Spori, G., Kosti?, R., James, N. (2013). Age-related decrease in physical activity and functional fitness among elderly men and women.Clinical Interventions in Aging,8, 549556. https://doi.org/10.2147/CIA.S44112 Nieuwenhuizen W, Weenen H, Rigby P, et al. (2010). Older adults and patients in need of nutritional support: review of current treatment options and factors influencing nutritional intake.Clinical Nutrition.29:160169. Phillips, A. C., Carroll, D., Drayson, M. T., Der, G. (2015). Salivary immunoglobulin a secretion rate is negatively associated with cancer mortality: The West of Scotland Twenty-07 Study.PloS one,10(12), e0145083. Pilgrim, A., Robinson, S., Sayer, A. A., Roberts, H. (2015). An overview of appetite decline in older people.Nursing Older People,27(5), 2935. https://doi.org/10.7748/nop.27.5.29.e697 RNIB (2014). Key Information and Statistics.(Retrieved on 7th May, 2017). Available:https://www.rnib.org.uk/knowledge-and-research-hub/key-information-and-statistics. Roper, S. D. (2013). Taste buds as peripheral chemosensory processors.Seminars in Cell Developmental Biology,24(1), 7179. https://doi.org/10.1016/j.semcdb.2012.12.002 Schubert, C. R., Cruickshanks, K. J., Klein, B. E., Klein, R., Nondahl, D. M. (2011). Olfactory impairment in older adults: 5-year incidence and risk factors.The Laryngoscope,121(4), 873878. https://doi.org/10.1002/lary.2146 Smeets, M. A., Veldhuizen, M. G., Galle, S., Gouweloos, J., de Haan, A. M. J., Vernooij, J., ... Kroeze, J. H. (2009). Sense of smell disorder and health-related quality of life.Rehabilitation Psychology,54(4), 404. Smoliner, C., Fischedick, A., Sieber, C. C., Wirth, R. (2013). Olfactory function and malnutrition in geriatric patients.The Journals of Gerontology Series A: Biological Sciences and Medical Sciences,68(12), 1582-1588. Society for Neuroscience (2015). Making sense of scents: smell and the brain. (Retrieved on 7th May, 2017). https://www.brainfacts.org/sensing-thinking-behaving/senses-and-perception/articles/2015/making-sense-of-scents-smell-and-the-brain/ Spence, C. (2015). Eating with our ears: assessing the importance of the sounds of consumption on our perception and enjoyment of multisensory flavour experiences.Flavour,4(1), 3. Spence, C., Okajima, K., Cheok, A. D., Petit, O., Michel, C. (2015). Eating with our eyes: From visual hunger to digital satiation.Brain Cogn. Stevenson, R. J. (2012). The role of attention in flavour perception.Flavour,1(1), 2. Toepel, U., Ohla, K., Hudry, J., le Coutre, J., Murray, M. M. (2014). Verbal labels selectively bias brain responses to high-energy foods.NeuroImage,87, 154-163. Yin, W., Hewson, L., Linforth, R., Taylor, M., Fisk, I. D. (2017). Effects of aroma and taste, independently or in combination, on appetite sensation and subsequent food intake.Appetite.

Thursday, November 28, 2019

The Value of Source Study of Hamlet by Shakespeare

Introduction The content of this essay revolves around the Hamlet play staged and sensationalized by William Shakespeare. With substantial reference to varied sources, the prodigy hatched a theatrical drama piece of Hamlet, depicting a code of revenge, patricide, tragedy, and regicide (Sanchez 21).Advertising We will write a custom essay sample on The Value of Source Study of Hamlet by Shakespeare specifically for you for only $16.05 $11/page Learn More This paper bears significant valuation for the sources that Shakespeare alluded to in the production of this play. Sanchez attests that he studied previous works and literature of preeminent playwrights persistently fixating on Francois Belleforest borrowing insightful chapters and verses (1). Belleforest’s work is a replication of Saxo Grammaticus’s Danish legend on Amleth, accompanied with a selection of changes (Sanchez 7). Shakespeare still made some alterations in his adaptations to emp ower his performance, regardless of character references and tributes. This essay seeks to delineate these alterations and, over and above that, explain their instrumental significance. This article starts by narrating Hamlet’s story then outlines Shakespeare’s modifications mainly by way of character analysis and the language borrowed. Body Background Facts: Shakespeare’s Literature of Hamlet Hamlet is a fiction plot with a premise that convenes tragedy and revenge within the Elsinore Castle, in the Kingdom of Denmark (Stopes, Belleforest, and Shakespeare 3). The fortress summons Prince Hamlet, the protagonist, home from Germany to grace his father’s funeral with his presence. On arrival, the Prince gets wind of the marriage between his mother, Gertrude, and his uncle, Claudius, which agitates him. He fathoms foul play and attests his suspicions through an epiphany by his father’s ghost that appears to him recounting how Claudius murdered him in h is nap. The Ghost taxes Hamlet to compensate his death by killing his executioner, Claudius, to be at ease. However, Hamlet is somewhat unsure of the ghost’s credibility and decides to engage a troupe of players to stage a play called The Murder of Gonzago to affirm his notion.Advertising Looking for essay on british literature? Let's see if we can help you! Get your first paper with 15% OFF Learn More The tactic is so successful that it strikes Claudius’ conscience; he is remorseful and leaves to pray and ask for cleansing (Stopes, Belleforest, and Shakespeare 4). The affirmation of the stage play rekindles the intense passion for vengeance and retribution within Hamlet for his father’s death (Stopes, Belleforest, and Shakespeare 5). This vengeance, however, is all words but no action, and as the prince contemplates on how to achieve revenge, he instigates six ancillary deaths within the palace. According to Stopes, Belleforest, and Shakespeare (5 ), Hamlet first stabs Polonius, the king’s chief counselor, who was eavesdropping on a conversation between the Prince and the Queen behind the tapestry. The next victims are Hamlet’s schoolmates, Rosencrantz, and Guildenstern, whose demise Hamlet himself arranges by instructing the King of England to hang the two (Stopes, Belleforest, and Shakespeare 6). Ophelia, tormented by Polonius’ decease and Hamlet’s antic disposition, drowns while singing bawdy melodies, lamenting over her spurned lover (Stopes, Belleforest, and Shakespeare 6). Next is Laertes, Ophelia’s sister, who declares to finish off Hamlet, as he is entirely responsible for both his father and sister’s demise. Stopes, Belleforest, and Shakespeare assert that Laertes, in consultation with Claudius, concocts various strategies to kill the Prince, one of them being a ‘fencing match’ (7).Advertising We will write a custom essay sample on The Value of Source Study of Hamlet by Shakespeare specifically for you for only $16.05 $11/page Learn More In the course of the contest, Laertes uses a poisoned sword blade to maim the Prince but releases it after that. Hamlet sees an opening here to reciprocate the attack by Laertes and, therefore, collects the same blade; he uses it to impale his adversary. In a show of victory, the queen drinks from a contaminated glass of wine that Claudius had specially prepared and poisoned for Hamlet (Stopes, Belleforest, and Shakespeare 8). The toxic substance kills her instantly. In an aggravated maneuver, Hamlet grabs the sword, using it to wound Claudius in concurrence with forcing the wine down his throat, in light of Gertrude’s demise. After that, he announces that Prince Fortinbras should rule over Denmark’s throne. He also advocates his friend, Horatio, to retell the preceding events, after which he relinquishes life (Stopes, Belleforest, and Shakespeare 9). In reverence , Fortinbras secures Hamlet’s burial procession withal full military honors. What Changes Has Shakespeare Made to the Archetype Work of Amleth? I have researched that Shakespeare evidently altered some descriptions here and there to personalize Hamlet from looking through Nash’s book, Christ Tears Over Jerusalem. Sanchez clarifies that Shakespeare’s plays inferred from preexistent playwrights, tragedians, and dramatists who composed classic pieces of literature (4). These masterpieces were inclusive of mythologies, folktales, daily life, songs, and history emanating from varied localities such as Greek, Italian, Roman, Germany, and English.Advertising Looking for essay on british literature? Let's see if we can help you! Get your first paper with 15% OFF Learn More Shakespeare collected and remodeled these works, introducing new viewpoints and ideas to the existent compositions, affirms Sanchez (10). The reforms were all in a bid to create finer plot devices to advance the visual and speculative perceptions altogether. The Ghost Stopes, Belleforest, and Shakespeare (7) compare the spirits in the plays of Antonio’s Revenge and Hamlet to elucidate Shakespeare’s variations of King Hamlet’s apparition. By the exploitation of profound readings and assessment of the two works, Hamlet and Antonio’s Revenge implement the character of a ghost in their explanations (Stopes, Belleforest, and Shakespeare 9). The plot in Antonio’s Revenge is fundamentally similar to that of Shakespeare’s Hamlet as it encompasses vindictiveness by a son, whose father’s ghost emerges and commands revenge. Nonetheless, there exist definite divergences in the specters’ properties. The Significance of The Ghost’s Ch aracter Alteration Andrugio’s ghost materializes before both Antonio- the protagonist- and his mother alike, such that the two can see the specter’s impression in the same way (Stopes, Belleforest, and Shakespeare 10). Over and above that, this apparition even has a conversation with both Antonio and his mother, Maria. To Antonio, the ghost has come compelling him to take vengeance on his account, against his murderer, Piero (Stopes, Belleforest, and Shakespeare 11). On the other hand, Andrugio’s ghost relates to Maria in a rather comical and somewhat haunting way, explain Stopes, Belleforest, and Shakespeare (11). The play depicts Andrugio’s ghost seating on the edge of Maria’s bed chastising her by way of rebuking her loose ways, seeing that she has already been intimate with the villain. He proceeds to explain to her that her gender is frail and subsequently soothes her fears. Stopes, Belleforest, and Shakespeare analyze that the gap between the mortal human and the dead narrows down significantly and almost plummets them into one form (9). This plot device is in contradiction with that of Shakespeare’s Hamlet, as the ghoul does not show itself before Hamlet’s mother, Gertrude. Stopes, Belleforest, and Shakespeare note that Shakespeare modified the ghost of King Hamlet to only converse with the prince and beseeched him to get the appropriate revenge for his demise (11). He also points out that the ghoul does not interact directly with the Queen and instead reaches out to her through Hamlet, additionally warning him to care for her as her sex is fragile. In this context, the gap between the supernatural worlds versus the earthly humans remains as vast as it should be. In regards to the intended significance, Stopes, Belleforest, and Shakespeare report that Shakespeare designed the role of the ghost to appear to Hamlet relentlessly to enhance the melancholy motif of the play (12). The central theme envisaged re volves around revenge, and the protagonist aims to achieve his vengeance on the villain by faking madness. By slightly changing the scenario, Stopes, Belleforest, and Shakespeare (11) say that Shakespeare succeeded in consummating the original concept of ‘Hero-as-Fool.’ The leading role feigns a deranged character to avoid the rogue from suspecting his motives. By virtue of the ghost emerging incessantly before Hamlet, the rest of the observers, his mother included, believe without a doubt that Hamlet is not mentally right. The significance of the ghost in Shakespeare’s Hamlet holding conversation with the Prince only, also creates a mood of mystery and confusion (Stopes, Belleforest, and Shakespeare 12). The fact that the apparition comes back from Purgatory gives rise to mockery because Protestants such as Hamlet doubt the entire doctrine of the underworld (Stopes, Belleforest, and Shakespeare 13). This element of disbelief causes the prince to question the gho st’s reliability, thus attaining the aspect of delay in the outline. Ophelia Francois Belleforest sketched the individuality of Ophelia in Saxo Grammaticus’ Danish legend, in his very own rendition. Likewise, Shakespeare paints the same character of Ophelia that Polonius and Claudius use as a convenient tool to spy on Hamlet and examine if he was crazy (Stopes, Belleforest, and Shakespeare 15). In as much as Shakespeare and Saxo portray Ophelia as the lead character’s mistress, some notable differences surface as expounded below. The Significance of Ophelia’s Character Alteration In the Danish legend, Saxo imaged Amleth- the exponent- and Ophelia as foster siblings who shared a very strong likeness to each other. Their closeness was visible when Feng, the antihero, send Ophelia to observe Amleth, and she declined to reveal any information about him whatsoever (Stopes, Belleforest, and Shakespeare 16). After this point, Saxo does not comment on her again i n the play and thus, it is not coherent to the audience what befalls her after that. Secondly, mention is that when Amleth sailed to England, he married Herminthrud, who betrayed him later on. The duplicity and infidelity that Herminthrud inflicted on her husband drove him to detest women and utter profanities about them in general (Stopes, Belleforest, and Shakespeare 16). Shakespeare tweaked Saxo’s thesis marginally in various ways, for example; he stated that Ophelia was Hamlet’s sweetheart and not his foster sister (Stopes, Belleforest, and Shakespeare 17). Shakespeare employed this strategy to pull off the elements of betrayal by way of guiding Ophelia to betray her lover, Hamlet. In the setting of Hamlet, Ophelia sells out the prince repeatedly when at first; she deserts him under the instructions of Polonius, her father. The second time is when she reports Hamlet’s questionable behavior towards her, to her father and Claudius as well (Stopes, Belleforest, and Shakespeare 18). By her act of disloyalty towards him, he reproves of her conduct and shuns her away to a nunnery (Stopes, Belleforest, and Shakespeare 17). Her behavior hurts him, and he decides to humiliate her by refusing to wed her and instead calls her a ‘breeder of sinners.’ In light of her treachery, Hamlet becomes more alert to the people around him, more so, the ones he considers as precious and cherished (Stopes, Belleforest, and Shakespeare 18). In this setting, Shakespeare brought Ophelia into play to scrutinize Hamlet’s resolve of revenge and feigned madness, as Hamlet trusts her enough to divulge his secrets to her. Another significance of revising Ophelia’s individuality is visible in Shakespeare’s elimination of Herminthrud in Hamlet. If he included her in the plot, he would have first had to pause and acquaint her to his audience, hence disrupting the flow of the story. In view of this, he thus observed the rule of flow and coh erency in this narration. Unlike Saxo, who described Herminthrud’s character trait, Shakespeare omitted her intentionally to capitalize on the story’s code of revenge by having Hamlet attack Ophelia (Stopes, Belleforest, and Shakespeare 15). Ophelia thus serves as a scapegoat and takes the blame for all the female characters’ offenses. In addition, the omission of Herminthrud allowed Shakespeare to justify why Ophelia developed madness. Stopes, Belleforest, and Shakespeare argue that the unsympathetic attitude that Hamlet brandish on Ophelia only mirrors the contempt Amleth harbored against women (14). Gertrude Saxo and Shakespeare both incorporated the character of Geruth and Gertrude respectively as that persona that makes merry with the villain. This detail is apparent from the plays’ descriptions that both these personalities marry the antiheroes who have just killed their husbands (Stopes, Belleforest, and Shakespeare 25). By virtue of their union, t hey display an indecent show of incest that devastates both their spouses’ specters, as well as their sons. Despite the legends’ striking resemblance, there are several nonconformities in these characters’ distinctive attributes, verifying that Shakespeare reconstructed his version. The Significance of Gertrude’s Character Alteration The tale of Amleth presents Geruth as a very mild dignitary who suffered under her former husband’s- King Orvendil- quick temper before his death (Stopes, Belleforest, and Shakespeare 27). Her circumstances are so lamentable that her remarriage to Feng calls for deliverance; Saxo sculpts her as Feng’s pushover, whom he forces into marrying him after dispatching her husband, Orvendil. Later on, her son Amleth berated her to rectify her transgressions of conjugating with the villain, who doubled up as her spouse’s murderer and her brother-in-law. Amleth is successful in his castigations as she repents and v ows to help him enact his attack on Feng; Saxo per contra does not cite her again in the play. By contrast, Shakespeare’s Hamlet is quite the edited restatement of the earlier Amleth legend. Before all else, Shakespeare fails to establish Gertrude’s stand on the regicide issue meted out on King Hamlet, her husband (Stopes, Belleforest, and Shakespeare 26). Shakespeare’s indecisive angle enabled him to stage a theatrical aspect of a riddle, as his viewers are inquisitive of whether the queen willingly married Claudius, or he forced her into it. This part of the play also serves as a brainteaser- a quality that is profitable to any play or work of literature. Along the storytelling, Shakespeare records that Hamlet also rebukes his mother, Gertrude, for coupling with Claudius and more so, allying with the bully. Shakespeare also included a supplementary section where the Prince exhibited pictures of Claudius to the queen, in an effort to mark out Claudius’ f laws- a feature lacking in the Amleth legend. Following Hamlet’s admonitions, Gertrude apologizes for her actions and promises him that she will suppress the details of their meeting, never to disclose it to anyone. Unlike Geruth, Stopes, Belleforest, and Shakespeare (26) remark that Gertrude breaks her promise and confesses the solemn secret to Claudius, her second husband. There is a valid reason Shakespeare allowed the queen, Gertrude, to break her promise and betray him to Claudius. Stopes, Belleforest, and Shakespeare state that the betrayal served to enlighten why the Prince set sail for England (28). Hamlet reluctantly embarked on a sea voyage to England, under the king’s strict bidding, as he- Claudius- dreaded that Hamlet was out to kill him. In addition to this, he also required some space and time to account for Polonius’ decease to his children, Ophelia, and Laertes. Claudius also coerced the prince into exile, as he wanted to scheme a dark and cover t plan for killing Hamlet, by drafting letters to the King of England. Gertrude’s betrayal is thus paramount to the unfolding of affairs in Hamlet’s storyline; Shakespeare demonstrated her imperfect portrait of motherhood (Stopes, Belleforest, and Shakespeare 24). Additionally, Shakespeare contradicted Saxo by retaining Gertrude’s character in Hamlet, almost until the end of the narrative, where she died after drinking the contaminated wine. The author hangs on to her to maximize on the plot and theme of tragedy and a total catastrophe by reporting on her regrettable death (Stopes, Belleforest, and Shakespeare 24). The passing of the Queen amplified the element of calamity in the genre of tragic stories by resulting in an even more tragic ending. Hamlet The Danish legend and Hamlet both reverberate a similar sentiment- that of retaliation and the implementation of an eye for an eye. The playwrights appoint their champions as Amleth and Hamlet indicatively to acc omplish a counter play motif (Stopes, Belleforest, and Shakespeare 29). In their capacity as the leading role, they execute their assigned duties by way of donning a camouflage of madness to avoid suspicions by their uncles and bring their mission to fruition. Stopes, Belleforest, and Shakespeare (29) analyze that in their paths for vengeance, they trigger the annihilation of other members of the royalty, either deliberately or not. Beyond the correspondence between the two tales, Shakespeare still progressed to change some parts to modify Hamlet. Below is an outline of the revisions he made together with their distinct significances. The Significance of Hamlet’s Character Alteration In Saxo’s rendition, Amleth first appears at a junior age, such that he is feeble and powerless to take any action upon his father’s regicide. Feng’s deed of eradicating and regarding Orvendil’s regicide, as a deserved performance inspires Amleth to yearn for revenge ( Stopes, Belleforest, and Shakespeare 30). He formulates a strategically viable approach that he will administer on Feng when he becomes of age. In his laid out plan, he plots to eradicate Feng together with all those nobles that tolerated his uncle’s injustice. When he finally avenges King Orvendil’s death, Amleth continues to live, taking over the reins of kingship to implement peace in his kingdom (Stopes, Belleforest, and Shakespeare 31). In Hamlet, Shakespeare presents Hamlet as a young adult, approximately thirty years, who is still pursuing his university studies in Germany. Unlike Amleth, Hamlet is of age; he is fully able to maneuver and act towards his goal (Stopes, Belleforest, and Shakespeare 31). Regardless of his grown-up status, Hamlet is still hesitant to obtain payback; as a result perfecting the delay acts employed as plot devices in Shakespeare’s play. Shakespeare also circumvents from imaging Hamlet as intentionally conspiring to cause seven o ther subsidiary deaths encompassing Ophelia, Gertrude, and Laertes (Stopes, Belleforest, and Shakespeare 32). Instead, he brings out these deaths as a mere coincidence and a victim of the occurrences at the palace, all in an attempt to magnify the concept of tragedy. Uncalculated misfortunes are the core of a tragic story; therefore, Shakespeare endears to the expectations of his audience (Stopes, Belleforest, and Shakespeare 33). Furthermore, the ultimate collapse of the protagonist at the end of the narrative multiplies the effect of adversity. Fortinbras The Significance of Fortinbras’ Character Alteration Fortinbras, the Prince of Norway, is a sovereignty personification that makes an entry in Shakespeare’s Hamlet to take over governance from the ruins encountered in Denmark (Stopes, Belleforest, and Shakespeare 32). Stopes, Belleforest, and Shakespeare (46) write that Saxo’s report does not feature Fortinbras. The reason for this omission is that Amleth def eated Feng and his nobles and, therefore, took his rightful capacity as the new king of his empire. In Hamlet’s production, Shakespeare orchestrates the death of Hamlet to record tragedy at its highest peak, explain Stopes, Belleforest, and Shakespeare (33). The crowning fall of the Prince compelled Shakespeare to usher in a new ruler, Fortinbras, who would reign with utmost justice and peace. Another cause of incorporating Fortinbras in the play was that Hamlet likened himself to Fortinbras; By virtue of being a Prince, Hamlet qualified him as sufficient to preside over the throne. Additionally, Fortinbras prevailed under the same state of affairs as Hamlet, and his uncle displaced him as the king yet he, as the prince, was the inheritor of the crown. The unfortunate event aggravated the Norwegian prince to the point he also seeks revenge on his father’s slayer, provide Stopes, Belleforest, and Shakespeare (34). Given that they experienced the same dilemma, Hamlet adv ocated for Fortinbras’ appointment to the throne assuming that he would carry out his ambition. Claudius Shakespeare ventures to mirror Feng, from the Amleth legend, in his recount of Hamlet by embodying him as Claudius (Stopes, Belleforest, and Shakespeare 21). Claudius is a tyrant ruler and traitor; a mannerism perceptible in the way he dispatches his brother, marries his wife and conspires to put his nephew to death. As explained below, Shakespeare still customized Claudius’ character. The Significance of Claudius’ Character Alteration In Saxo’s tale, the playwright starts the folk tale by unfolding the details of the ruling history ongoing before Amleth’s tragedy (Stopes, Belleforest, and Shakespeare 23). He narrates the bitter and tense association between the two co-rulers, Feng, and Orvendil. When Orvendil triumphs in a war against Koller of Norway and becomes Jutland’s sole leader, Feng becomes jealous and massacres him in quite a sc andalous manner. Feng strikes one as a very hard-hearted and unsympathetic figure. So cruel is he that he makes public his murderous deeds to the absolute court of Jutland then disguises the act by claiming that it was a righteous act (Stopes, Belleforest, and Shakespeare 22). By contrast, Shakespeare embarks on the story midway, presenting Hamlet as a full-grown man who is thirty years of age (Stopes, Belleforest, and Shakespeare 25). Shakespeare deletes the ruling history of King Hamlet’s reign, thus allocating the readers the task of unraveling whether Claudius and King Hamlet were also joint leaders. Secondly, Claudius, unlike Feng, does not announce his cause of regicide, thus adding an interesting twist to the play that involves discerning the grounds of the sudden fate of the king. Stopes, Belleforest, and Shakespeare (22) offer that Shakespeare injects some mystification into the drama piece. Hamlet only becomes aware of the atrocity through the ghost’s divinat ion. Hamlet’s rage and crave for revenge intensify as he now realizes that the death was not accidental. The Names ‘Amleth’ and ‘Hamlet’ The title of Shakespeare’s drama play is reflective of the protagonist’s name, Hamlet, the Prince of Denmark (Stopes, Belleforest, and Shakespeare 13). In the course of lifting the name of his titular character from Saxo’s journal, Shakespeare reshuffles and circulates the etymological significance of the heading ‘Amleth.’ He decides to reposition the letter ‘H’ from the end to the beginning of the name, to read as ‘Hamlet’ in place of ‘Amleth.’ Shakespeare is steadfast in the rebirth of the name ‘Hamlet’ to revolutionize and answer to the call of modernity. The reason for his intended modernization is that he was working in a neoteric period or rather, in the Elizabethan era (Stopes, Belleforest, and Shakespeare 14). His audienceà ¢â‚¬â„¢s generation appealed to developments and reformations of outdated literary works. Language Borrowed For a long time, the wide-ranging perception has been that Shakespeare conceived entirely new words and phrases, advances Sanchez (12). The public deduce that he originated most of the terms and expressions used today, thus exalting him as the father of the modern-day language (Sanchez 14). Sanchez states that this impression is all wrong and even quotes that researchers have disputed this understanding in favor of the reality that Shakespeare merely borrowed terminologies from his predecessors (15). They argue that he possessed a great skill of acquiring language from earlier poets, novelists, and composers such as Thomas Nash. However, he did not just borrow heedlessly; instead, he transformed their meaning in the context of the texts he was writing. Explained below are two of the terms he adopted in his play, Hamlet. The Use of the Term ‘Nunnery’ and its Signif icance In the making of Hamlet, Shakespeare renovated the meaning of the utterance ‘nunnery.’ A meticulous study of Nash’s Christ’s Tears Over Jerusalem qualifies me to say that Shakespeare repeated the word from the celebrated pamphleteer, Thomas Nash. Nash first assimilated the ‘nunnery’ expression in his book Christ’s Tears Over Jerusalem to mean an Institute of courtesans and concubines (Nash 19). In Hamlet, Shakespeare slots this term in the phrase â€Å"Get thee to a nunnery,† uttered by Hamlet when he advises Ophelia to sign into a convent (Sanchez 32). Shakespeare utilizes this terminology, but he does not blend it to mean a brothel or bawdyhouse as Nash did. Stopes, Belleforest, and Shakespeare explain that Shakespeare instead projects its literal definition of a religious community (18). Shakespeare’s aim of changing the meaning is to enable him to make Hamlet urge Ophelia to liberate herself from the fleshly wor ld full of dishonest men. Moreover, Hamlet uses this term while rebuking Ophelia of her betrayal, which he suspects of her (Stopes, Belleforest, and Shakespeare 16). The Use of the Phrase ‘Mind’s Eye’ and its Significance A reading of Sanchez (57) reveals that Shakespeare takes on another idiomatic expression from a writer known as Chaucer (1390). The phrase in question here is ‘mind’s eye.’ Chaucer accommodated the set expression in his account, The Man of Law’s Tale, wording it as â€Å"It were with thilke eyen of his mynde† (Sanchez 58). In the negation of Chaucer’s expression, Shakespeare reverses the arrangement and sequence of the statement to appear as â€Å"mind’s eye.† Shakespeare integrates this saying in Horatio’s reply when he, together with the castle’s guards, glimpse King Hamlet’s apparition on the palace walls. â€Å"A mote it is to trouble the mind’s eye,† c autions Horatio. Sanchez deciphers this to mean that Horatio was warning the guards to acknowledge the ghoul’s appearance (61). In other terms, he was predicting that its sheer emergence could bring disaster to the castle. Shakespeare applies the word ‘eye’ here to represent the castle and not the conventional meaning of ‘one’s optical memory.’ Conclusion Despite the fact that he borrowed concepts and models from his predecessors, Shakespeare was a great tragedian himself in devising his plays and drama sets. Sanchez (5) reports that in his play of Hamlet, Shakespeare generously adapts Saxo Grammaticus’ story thesis based on Amleth. However, he makes some structural changes, primarily in the qualities and traits of his characters among other elements. He remodels the characters of Hamlet, Ophelia, Claudius, Gertrude, Fortinbras, and the ghost in conjunction with the language borrowed (Sanchez 15). Shakespeare’s revisions are just : he only implemented them to blend with the tendencies affixed in tragic stories (Sanchez 56). Works Cited Nash, Thomas. Christ’s Tears Over Jerusalem: Whereunto is Annexed. A Comparative Admonition to London. London: From the Private Press of Longman, Hurst, Rees, Orme, and Brown, Printed by T. Davison, 1815. Print. Sanchez, Isabel 2012, â€Å"The Root of the Recycled: A Comparative Analysis of Shakespeare’s â€Å"Hamlet† and the Mythological â€Å"Ur-Hamlet†Ã¢â‚¬ . Masters thesis, Florida International Univ., 2012. FIU Electronic Theses and Dissertations. Web. Stopes, Charlotte, Francois Belleforest and William Shakespeare. Why Does Shakespeare’s ‘Hamlet’ Differ from the ‘Amleth’ Story of Belleforest? [From the Transactions of the Royal Society of Literature, Vol. 33]. London: Adlard Son, 1914. Print. This essay on The Value of Source Study of Hamlet by Shakespeare was written and submitted by user Brooke C. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

The Power of Fuel Cells essays

The Power of Fuel Cells essays As the scientific world progresses and the over-consumption of fossil fuels continues, scientists, environmentalists, and businessmen alike seek alternate forms of energy production and usage. One such alternative is viable through fuel cells. Fuel cells can power cars, trucks, and buses without emitting harmful tailpipe emissions. Such vehicles will be cleaner and more energy efficient than those powered by an internal combustion engine. Fuel cells also may provide energy to factories and homes without creating smokestack pollution. They offer significant improvements in energy efficiency as they remove the intermediate step of combustion and mechanical devices such as turbines and pistons. Unlike conventional systems, their high efficiency is not compromised by small sizes. Fuel cell cogeneration plants have demonstrated unprecedented reliability and durability that is significantly better than conventional competitive equipment. The absence of combustion and moving parts means tha t fuel cells can run continuously for long periods of time before servicing and that they are far less prone to breakdown or forced outages. A number of fuel cell systems operating in "real world" commercial conditions have run continuously at full power for more than a year and over thirty have exceeded six months. One of the most exceptional qualities about fuel cells is that they promote energy security as they can use hydrogen derived from a variety of sources, including methane, propane, coal, and renewables such as biomass or, through electrolysis, wind and solar energy. In fact, hydrogen is the simplest and most abundant element in the universe, most commonly found on earth as H2Owater. Hydrogen is also the fuel of choice for energy-efficient fuel cells. Furthermore, hydrogen boasts many important advantages over other fuels: it is non-toxic, renewable, clean to use, and packs much more energy per pound. In a fuel cell, hydrogen gas from the fu...

Thursday, November 21, 2019

Can Sears Holdings Latest Strategy Allow the Corporation to Become a Essay

Can Sears Holdings Latest Strategy Allow the Corporation to Become a Competitor in Retail Once Again - Essay Example Can Sears Holdings Latest Strategy Allow the Corporation to Become a Competitor in Retail Once Again? This plan was woefully inadequate and profit has decreased the preceding 19 quarters consecutively. Capital and store updates are the only possible solution that analysts’ feel could make a difference in the demise of both chains. Sears is now competing with mega giant discount chain Wal-Mart, stylish and up to date Target and electronic giant Best Buy. Though Sears was once the catalog choice of America it has failed in building solid ground in the online retail market where others have had success (Munarriz). The ANSOFF matrix is used to generate strategic directions using product market options, possible growth opportunities are noted and explored and presented to reveal four distinct strategies2. ANSOFF focuses on using marketing strategy to achieve growth though it does not provide solutions or suggestion of how this strategy should be implemented, which requires further analysis. Sears Holdings has recently acquired a new chief merchandising officer, Ron Boire, who has previously been responsible for the success of Brookstone while also being utilized at Best Buy and Toy R Us. With Sears being such a household name for so many years it is possible that with diversification and new market development along with the maintaining of current customers through the use of reward programs and targeted marketing that Sears Holdings can compete with the larger chain retail stores.

Wednesday, November 20, 2019

Englsih - Rhetorical Appeals analysis (logos, ethos, pathos) Essay

Englsih - Rhetorical Appeals analysis (logos, ethos, pathos) - Essay Example The commercial appeals to viewers by implying that when we drive, we are responsible not only for our lives but the lives of others as well. Consequently, when we drive too fast, the consequences can be very tragic. As the commercial showed that the reckless driver was sentenced by the court, accountability is the lesson projected here. Ironically, the last scene showing the cemetery shows that we cannot bring back the dead and suffer the consequences. All throughout, emotions was effectively used to convey the message to the public. The commercial chosen was about transport safety that showed the difference in driving at higher speed when you hit a person. The theme of the commercial was â€Å"The faster you go the bigger the mess†. This commercial was one of the most discussed commercial in Poland. It showed two simultaneous situations ( split frame )with the same characters. The first one showed two joggers of which one was almost hit by a speeding car at 50m/h. The jogger was unhurt but run away scared after the car stopped. The other frame showed the same woman being hit by the car and thrown a few meters resulting to her death. In the end, the left frame showed 50m/h while the right frame showed 67m/h. The commercial has used logos argument since it directly argues to the audience that a difference of 17m/h can result to fatality. It rationally persuades viewers to drive in a certain limit. The commercial was balanced in using pathos and logos although the emphasis was more on the effect of the incr eased speed rate. The commercial that uses an Ethos argument well is the South African advertisement of BMW titled †Innovation†, although it was originally titled †Kinetic Sculptures†. The main endorser is world-class sculptor Theo Jensen who creates moving sculptures. Indeed, he is an authority when it comes to

Monday, November 18, 2019

Petrol market Essay Example | Topics and Well Written Essays - 1500 words

Petrol market - Essay Example 105). The amounts of external costs incorporate the direct physical, psychological, as well as emotional damage to others. Along with this, treatment costs are sometimes borne by the third parties (who are directly affected by the Alcohol consumption) by means of private or public insurance. It has been estimated by researchers that the total amounts of costs associated with the alcohol consumption resulting from welfare as well as health services, and also from insurance, enforcement, as well as penal costs and also from loss of costs of production accumulate to the total social cost by the amount of 1–3% of GDP in different European countries, including Poland. These amounts of loss of GDP by creation of negative effects of car accidents on the generation of greater amount of social costs are creating negative externalities to the people of the country (Bielinska-Kwapisz and Mielecka-Kubien, 2010, p. 1). As an outcome of the higher level of road accidents people are getting scared of traveling by road and thus they are expected to demand lesser amount of petrol. This reduces the demand for oil given the price of the petrol. Hence, the demand curve for petrol will shift down from AD1 to AD2 (Figure 1). Thus the equilibrium market price of petrol will fall and the producers will end up producing lesser amounts of output, selling at lower level of price and thus making lesser amount of profit. This also hampers the consumers by reduction in the amount of sales tax generated from the sales of petrol. This reduction in tax earning of the government reduces the amount of government spending on the development of road infrastructures and creates the negative externality to the consumers (Veal, 2002, p. 190). The externality is considered to be negative due to the fact that greater levels of accidents by some of the consumers to lack of proper road protections and infrastructures, which are to be implemented by the government, consumers are getting worse off. And also this fact is regarded as externality because of the fact that the generation of greater amount of negative effects upon the utility level of the consumers has not entirely been reasoned with the inefficient behavior of the people, in general. Rather these negative effects are largely generated by the lack of efficient government intervention into the process of development of higher degree of secured and well-protected road infrastructure Batta, 2008, p. 81). However this negative externality is also related to the misbehavior of the consumers of alcohol also. Greater accidents are made by the drunken car drivers for which the innocent people are paying the price in terms of their lives. This fact is also regarded as the negative externality to a large number of people (Bielinska-Kwapisz and Mielecka-Kubien, 2010, p. 5). Figure 1: Negative externality in the Petrol market Answer 2: Figure 2: Tax on petrol and reduction in negative externality The level of negative externali ty can easily be removed with the help of greater level of tax imposed on the petrol consumption. This higher level of tax on the purchase and use of petrol will increase the amount of tax revenues earned by the government of the country under consideration. This higher volume of tax revenues will thus give the government of the country to make higher amount of public expenditure on the developmen

Friday, November 15, 2019

Mobile Ad Hoc Networks (MANETs)

Mobile Ad Hoc Networks (MANETs) Introduction What is Mobile Ad Hoc Network? With rapid development of wireless technology, the Mobile Ad Hoc Network (MANET) has emerged as a new type of wireless network. MANET is a collection of wireless mobile nodes (e.g. laptops) that dynamically function as a network without the use of any existing infrastructure and centralized administration. It is an autonomous system where each node operates not only as an end system but also as a router to forward packets for other nodes. Since the nodes in MANET move around, the wireless links break and re-establish frequently. Furthermore, most of mobile nodes are resource limited in computing capability and battery power and therefore traditional computing content routing protocols are not suitable for MANET. Several ad hoc routing protocols have been proposed for each node acting as router and maintaining routing information. There are many other applications of MANET. For examples, MANET can be used to provide emergency Services when the network is impaired due to the damaging of existing infrastructure [8]. Computer scientists have predicted a world of ubiquitous computing in which computers will be all around us, constantly performing mundane tasks to make our lives a little easier. These ubiquitous computers connect in mobile ad hoc mode and change the environment or react to the change of the environment where they are suited. MANET is also found useful in the so-called sensor dust network to coordinate the activities and reports of a large collection of tiny sensor devices which could offer detailed information about terrain or environmental dangerous conditions. Problem Statement and Motivation Most current ad hoc routing protocols assume that the wireless network is benign and every node in the network strictly follows the routing behavior and is willing to forward packets for other nodes. Most of these protocols cope well with the dynamically changing topology. However, they do not address the problems when misbehavior nodes present in the network.A commonly observed misbehavior is packet dropping. In a practical MANET, most devices have very limited computing and battery power while packet forwarding consumes a lot of such resources. Thus some of the mobile devices would not like to forward the packets for the benefit of others and they drop packets not destined to them. On the other hand, they still make use of other nodes to forward packets that they originate. These misbehaved nodes are very difficult to identify because we cannot tell that whether the packets are dropped intentionally by the misbehaved nodes or dropped due to the node having moved out of transmission range or other link error. Packet drop significantly decreases the network performance.Traditional security mechanisms are generally not suitable for MANET because: The network lacks central infrastructure to apply traditional security mechanism such as access control, authentication and trusted third party. Limited bandwidth, battery lifetime, and computation power prohibits the deployment of complex routing protocols or encryption algorithms. New security models or mechanisms suitable for MANET must be found. Network topologies and memberships are constantly changing. Thus new intrusion detection system and entity recognition mechanisms that are suitable for mobile ad hoc networks must be designed to avoid or mitigate the behavior to the networks. Trust management systems have been recently introduced as a security mechanism in MANET. In a trust management system, a communicating entity collects evidence regarding competence, honesty or security of other network participants with the purpose of making assessment or decisions regarding their trust relationships. Here trust Objective and Sub-tasks means the confidence of an entity on another entity based on the expectation that the other entity will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other entity . For example, a trust-based routing protocol can collect the evidence of nodes misbehaving, form trust values of the nodes and select safest routes based on the trust metrics.Reputations systems are often seen as a derivation of trust management system. In the reputation system, an entity forms its trust on another entity based not only on the selfobserved evidence but also on the second hand information from third parties. One of the influential reputation systems is the DSR protocol. In the trust management system, reputation system and other trust-based systems, route selection is based on the sending nodes prior experience with other nodes in the network. Its opinions about how other entities are honest are constantly changing. Thus, we call the trust manag ement systems and their derivations as dynamic feedback mechanisms. The dynamic feedback mechanisms are usually applied on the current ad hoc routing protocols to rate the trust about other nodes in the network and make routing decisions based on the trust matrix, which is formed according to the evidence collected from previous interactions. By incorporating the dynamic feedback mechanism in the routing protocol, misbehaved nodes are identified and avoided to forward packets. In this way,misbehavior can be mitigated. Objective and Sub-tasks The primary objective of this thesis is to Investigate the state of the art of dynamic feedback mechanisms and protocols analyze, implement and evaluate DSR protocols to see how it improves the network performance and what are the side effects of introducing the mechanism to the mobile ad hoc network. Following tasks must be done to achieve the primary objective. Study the preliminary knowledge that is required to carry out the main tasks. For example, to understand DSR protocol one must have some knowledge of Bayesian analysis; to do performance analysis one must learn the methodologies of conducting performance analysis and processing simulation data. Investigate security issues of mobile ad hoc network and current dynamic feedback mechanisms or protocols that are used to solve or mitigate the issues. Investigate and learn how to use the network simulation tool. There are several popular network simulation tools available and we need to choose the one that best suits our needs. The selected network simulator should be studied so that we can use it as platform to implement protocol and conduct simulations. Analyze and implement the DSR protocol based on Dynamic Source Routing protocol (DSR); evaluate the network performance. Structure of the Report Since we have almost gone through the chapter one, we only briefly present the content of the subsequent chapters in this section. Preliminary Information State of the Art Analysis Design Implementation and Tests Performance Analysis Conclusion and Future Work Preliminary information we have introduced the MANET. This chapter presents other preliminary information and concepts that will be used in other parts of the thesis. Firstly four general modes of routing operations are introduced and compared. The DSR protocol, which is used as underlying routing protocol in the thesis, is explained in detail. Secondly Bayesian estimation and Beta function are explained to pave the way for the analysis of the reputation model of DSR in the chapter 4. Thirdly some techniques regarding simulation and performance analysis are presented. Finally, several popular network simulation tools are discussed and compared. Mobile Ad Hoc Network Routing Protocols Nowadays there are various routing protocols proposed for the MANET. The most popular ones are DSDV (Destination-Sequenced Distance Vector), TORA (Temporally- Ordered Routing Algorithm), DSR (Dynamic Source Routing) and AODV (Ad-hoc On Demand Distance Vector). These routing protocols can be categorized in different routing operation modes. Mode of Routing Operations These two modes concern whether or not nodes in an ad hoc network should keep track of routes to all possible destinations, or instead keep track of only those destinations of immediate interest Proactive protocols store route information even before it is needed. This kind of protocols has advantage that communications with arbitrary destination experience minimal delay. However it also suffers from the disadvantage that additional control traffic is needed to continually update stale route information. This could significantly increase routing overhead especially for the MANET where the links are often broken. Reactive protocols, on the contrary, acquire routing information only when it is actually needed. However, the latency of the communication increases tremendously especially when a node communicates to another at the first time. Source routing vs. Hop-by-hop routing These two modes concern whether the source node decides the route for a packet to be forwarded to the destination or the intermediate nodes are allowed to decide the next hop until the packet arrives at the destination. In the source routing protocols, the source node decides the route and puts the route information in the packet header. All the intermediate nodes forward the packet along the route faithfully. This kind of protocols has advantage that the intermediate nodes are not required to maintain the routing information. But it suffers from the disadvantage that the packet size grows because of source routing information carried in each packet. In the hop-by-hop routing protocols, it is sufficient for the source to know only how to get to the next hop and intermediate nodes find their own next-hops until the destination. In contrast to source routing protocols, hop-by-hop routing protocols do not increase packet size but they requires all the intermediate nodes to maintain rout ing information. Table 2-1 Categories of routing protocols has compared the performance of these four routing protocols . The results show that DSR has best throughput performance (above 95%) at all mobility rates and movement speeds. Thus we will use DSR as basic routing protocol in this thesis. The Dynamic Source Routing Protocol (DSR) John et al. proposed the dynamic source routing protocol (DSR) [1] which is a routing protocol for use in multi-hop wireless ad hoc networks of mobile nodes. DSR is an ondemand protocol, in which route are only discovered when data need to be transmitted to a node where no route has yet been discovered. The advantage of this on-demand routing protocol is that there are not any periodic routing advertisement and reducing the routing overhead. DSR is also a source routing protocol, allowing multiple routes to any destination and allows each sender to select and control the routes used in routing the packets. DSR is composed of the two main mechanisms: Route Discovery and Route Maintenance which are explained below. Route Discovery Route Discovery aims at finding routes from a source node to destination. Figure 2-1 illustrates the procedure of Route Discovery. When a source node S wants to send a data packet to some destination node D, it first searches its route cache to find whether there is a route to D. If there is no route to D, then S will initiate a Route Discovery and send out Route Request message which is propagated to all the nodes within its transmission range. At the mean time, it saves the data packet in its send buffer. The Route Request message contains the addresses of source node and destination node, a unique route request identifier and a route record which records all the intermediate nodes that this route request packet has traveled through. S appends itself to the beginning of the route record when it initiates the message. When a node receives the Route Request message, it compares the destination address in the message with its own address to judge whether itself is the destination node. If it is not, it will append its own address in the route record and propagate the message to other nodes. If the node is the destination node, it will send a Route Reply message to the source node and the message contains the source route record which is accumulated when the Route Request message is forwarded along its way to the destination. When the destination sends the Route Reply, if it uses MAC protocols such as IEEE 802.11 that require a bidirectional link, it just reverse the source route record and use it as route to send Route Reply to the source node. Otherwise it should find the route by searching its route cache or sending out a Route Request which piggybacks the Route Reply for the source node. When the source node receives the Route Reply message, it puts the returned route into its route cache. From t hen on all the packets destined to the same destination will use this route until it is broken. Route Maintenance Since the ad hoc network is dynamic and the topology of the network changes frequently, the existing routes maintained by nodes in their route cache are often broken. After forwarding a packet, a node must attempt to confirm the reachability of the next-hop node. If the node does not receive any confirmation from the next hop during a certain period of time, it will retransmit the packet. If after a maximum number of retransmission it still does not receive any confirmation, it will think the link to the next hop is broken and will send a Route Error message to the source node. DSR proposes three acknowledge mechanisms to confirm that data can flow over the link from that node to the next hop: Link-layer acknowledgement which is provided by MAC layer protocol such as IEEE 802.11. Passive acknowledgement in which a node hears the next-hop node forwarding the packet and thus confirms the reachability of the link. Network-layer acknowledgement in which a node sends an explicit acknowledgement request to its next-hop node. Passive Acknowledgement Passive Acknowledgement (PACK) is important in DSR protocol because it is used to detect whether the next hop forwards the packet or drops it. We explain it in detail in this section. Passive acknowledgement is used with the assumption that: Network links operates bi- directionally. The network interface is in the promiscuous mode. When a node taps a new packet in promiscuous mode after it originates or forwards a packet, it consider it as an acknowledgement of the first packet if both of following check success. The Source Address, Destination Address, Protocol, Identification, and Fragment Offset fields in the IP header of the two packets MUST match. If either packet contains a DSR Source Route header, both packets MUST contain one, and the value in the Segments Left field in the DSR Source Route header of the new packet MUST be less than that in the first packet. If no matched packet is found during PACK timeout, the node will consider the link between the next hop and itself is broken and will send Route Error message to the source node. Additional features DSR has additional features such as replying to route requests using cached routes, caching overheard routing information, packet salvaging and flow state extension and etc. We will introduce them in section 4.1 and discuss how they will impact the performance of network, how they will interact with DSR and whether they will be enabled in our simulation. Performance Analysis Techniques This section introduces the performance analysis techniques and methodologies that will be used in the performance evaluation. Factors and Primary Factors There are many parameters that will influence the simulation results and need to be carefully chosen in the simulations. Some parameters are chosen based on experience values or the conditions of the network we want to simulate. Others need to be tuned to optimize the network performance. We distinguish the two kinds of parameters as follows: Factors are the variables that affect the simulation result and have several alternatives. Normally they are decided based on experience. Primary factors are the factors whose effects need to be quantified. This kind of factors usually needs to be adjusted through simulation. Data Measurement The key step of the network performance analysis is to interpret the simulation result and summarize the characteristic of the network. To avoid the inaccurate simulation results due to an extreme scenario, we usually run simulations on several different scenarios. The data set of these simulations are called sample. A single number must be presented to give the key characteristic of the sample and this single number is called an average of the data. There are three alternatives to summarize a sample Mean is obtained by taking the sum of all observations and dividing this sum by the number of observations in the sample. Median is obtained by sorting the observations in an increasing order and taking the observation that is in the middle of series. If the number of the observations is even, the mean of the middle two values is used as a median. Mode is obtained by plotting a histogram and specifying the midpoint of the bucket where the histogram peaks. Confidence Interval for the Mean In our performance evaluation, the main objective is to compare the simulation results of DSR and Standard DSR to see whether there is any performance improvement. However, most simulation results are random in some degree due to the particularity of the node movement scenarios and we cannot tell whether the two systems are different. One way to minimize the random effect is to repeat the simulations with different scenarios as many times as possible and get a large sample space. Unfortunately, due to the time limitation we cannot conduct many simulations. points out that using confidence interval we can tell whether the two systems are different with smaller sample space. The confidence interval for the mean can be calculated using If the confidence intervals of the simulation results of the two systems have no overlap, then we can claim the two systems are different and one system is superior or inferior to the other. GloMoSims source and binary code can be downloaded only by academic institutions for research purposes. Commercial users must use QualNet, the commercial version of GloMoSim. OPNET Modeler OPNET Modeler is commercial network simulation environment for network modeling and simulation. It allows the users to design and study communication networks, devices, protocols, and applications with flexibility and scalability [30]. It simulates the network graphically and its graphical editors mirror the structure of actual networks and network components. The users can design the network model visually.The modeler uses object-oriented modeling approach. The nodes and protocols are modeled as classes with inheritance and specialization. The development language is C. Comparison When choosing a network simulator, we normally consider the accuracy of the simulator. Unfortunately there is no conclusion on which of the above three simulator is the most accurate one. David Cavin et al. has conducted experiments to compare the accuracy of the simulators and it finds out that the results are barely comparable [31]. Furthermore, it warns that no standalone simulations can fit all the needs of the wireless developers. It is more realistic to consider a hybrid approach in which only the lowest layers (MAC and physical layers) and the mobility model are simulated and all the upper layers (from transport to application layers) are executed on a dedicated hosts (e.g. cluster of machines). Although there is no definite conclusion about the accuracy of the three network simulators, we have to choose one of them as our simulation environment. We compare the simulators using some metrics and the results are summarized After comparing the three simulators, we decide to choose ns2 as network simulator in our thesis because Ns2 is open source free software. It can be easily downloaded and installed. The author of the thesis has used ns2 in another network related course and gotten familiar with the simulation. Ns2 uses TCL and C++ as development languages for which the author has some programming experience. The author of the DSR protocol has conducted simulation on GloMoSim and gotten performance results. We want to do the simulation on a different simulation to form comparison. State of the Art In this chapter we will introduce the start of the art security solutions in MANET with emphasis on dynamic feedback mechanisms. Firstly, we will present the general security issues/requirements of MANET to pave the way for the future investigation. Then we will discuss the state of the art security mechanisms for MANET such as payment system,trust management system, reputation system, etc. Finally, we will summarize all the security solutions we discussed in this chapter. Security Issues in Mobile Ad Hoc Network Due to lack of central infrastructural and wireless links susceptible to attacks, security in ad hoc network has inherent weakness. In section 1.2 we have discussed the reasons why mobile ad hoc network imposes security challenges that cannot be solved by traditional security mechanisms. In this section, we present the general security properties required by ad hoc network. Following are general security properties regarding ad hoc network Confidentiality: The confdiantiality property is to protect certain information from unauthorized disclosure. The information includes not only the application data that send over the routing protocol, but also the routing information itself as well as network topology and geographical location. Integrity: The integrity ensures that the transmitted message and other system asset are modified only by authorized parties. In the routing level, it requires all nodes in the network following correct routing procedure. The main challenge of ensuring integrity is that without central infrastructure and powerful computing capabilities, it is difficult to apply existing cryptography and key management systems. Availability: The availability property requires that the services or devices are exempt from denial of service, which is normally done by interruption, network or server overload. Typical examples or denial of service attack are radio jamming, in which a misbehaved node transmit radio to interference other nodes communications, and battery exhaustion, in which a misbehaved node interact with a node for no other purpose than to consume its battery energy. Authentication: The authentication property requires that the communication entitys identification is recognized and proved before communication starts. Access control: This property requires restricting resources, services or data to special identities according to their access rights or group membership. Non-repudiation: This property ensures that when data are sent from sender to receiver, the sender cannot deny that he has sent the data and the receiver cannot deny that he has received the data. Mobile nodes may conduct different misbehavior for different purposes. Po-Wah Yau classifies the misbehaved nodes into following categories. Failed nodes are simply those unable to perform an operation; this could be because power failure and environmental events. Badly failed nodes exhibit features of failed nodes but they can also send false routing messages which are a threat to the integrity of the network. Selfish nodes are typified by their unwillingness to cooperate as the protocol requires whenever there is a personal cost involved. Packet dropping is the main attack by selfish nodes. Malicious nodes aim to deliberately disrupt the correct operation of the routing protocol, denying network service if possible. These four types of misbehaved nodes actually can be categorized in two aspects: whether their misbehaviors are intentional or unintentional, and the severity of the results. Payment Systems Payment systems provide economic incentives for the cooperation in MANET. They consider that each node in MANET is its own authority and tries to maximize the benefits it gets from the network. Thus each node tends to be selfish, dropping packets not destined to them but make use of other nodes to forward their own packets. The purpose of payment systems is to encourage the cooperation within the MANET by economic incentives. There are several variations of payment systems proposed. Nuglets Nuglets is a virtual currency mechanism for charging (rewarding) server usage (provision). Nodes that use a service must pay for it (in nuglets) to nodes that provide the service. A typical service is packet forwarding which is provided by intermediate nodes to the source and the destination of the packet. Therefore either the source or the destination should pay for it. There are two models for charging for the packet forwarding service: the Packet Purse Model (PPM) and the Packet Trade Model (PTM). In the Packet Purse Model, the sender pays for the packet. It loads the packet with a number of nuglets when sending the packet. Each intermediate forwarding node acquires some nuglets from the packet that covers its forwarding costs. If a packet does not have enough nuglets to be forwarded, then it is discarded. If there are nuglets left in the packet once it reaches destination, the nuglets are lost. In the Packet Trade Model, the destination pays for the packet. Each intermediate node buys the packet from previous one for some nuglets and sells it to the next one for more nuglets until the destination buys it. Either of the two models has advantages and disadvantages. While the Packet Purse Model deters nodes from sending useless data and avoids the network overloading, the Packet Trade Model can lead to an overload of the network and the destination receives packets it does not want. On the other hand, in the Packet Purse Model it is difficult to estimate the number of nuglets th at are required to reach a given destination. But thePacket Purse Model does not need to consider this problem. To take advantages of the two models and avoid the disadvantages, a hybrid model is suggested. In this model, the sender loads the packet with some nuglets before sending it.The packet is handled according to the Packet Purse Model until it runs out of nuglets. Then it is handled according to the Packet Trade Model until the destination buys it. Counter To address the problems encountered by the nuglets approach such as difficulty in estimating pre-load nuglets and possible network overload, another payment approach based on credit counter is suggested. In this approach, the current state of each node is described by two variables b and c, where b is the remaining battery power and cstands for the value of its nuglet counter. More precisely, b is the number of packets that the node can send using its remaining energy and c is the number of packets a node canoriginate. A node can originate a number of packets N only when the condition c=N holds. When a node forwards a packet, nuglet counter c is increased by one and b is reduced by one. Thus in order to originate packets, each node must earn credits by forwarding packets. The counter solution requires tamper resistant hardware security module. Spirit S. Zhong et al. proposed Sprite [19], a credit-based system for MANET. As opposed to Nuglets or Counter they do not require tamper-proof hardware to prevent the fabrication of payment units. Instead, they introduce a central Credit Clearance Service (CCS). The basic scheme of the system is as follows. When a node receives a message the node keeps a receipt of the message and reports to the CCS when the node has a fast connection to Credit Clearance Service (CCS). The CCS then determines the charge and credits to each node involved in the transmission of a message, depending on the reported receipts of a message. In this scheme, the sender charges money. A node that has forwarded a message is compensated, but the credit that a node receives depends on whether or not its forwarding action is successful. Forwarding is considered successful if and only if the next node on the path reports a valid receipt to the CCS. Discussion on the Payment Systems The payment systems we describe in above sections either assumes a tamper resistant hardware module is available to ensure that the behavior of the node is not modified or requires a central authority server to determine the charge and credit to each node involved in the transmission of a message. Tamper resistant hardware may not be appropriate for most mobile devices because it demands advanced hardware solution and increases the cost of the devices. Lacking of central authority server is right the inherent property of MANET that causes security challenges so it is also not appropriate. Furthermore, all the approaches described above suffer from locality problems [20] that nodes in different locations of the network will have different chances for earning virtualcurrency, which may not be fair for all nodes. Usually nodes at the periphery of the network will have less chance to be rewarded. Reputation System Reputation systems have emerged as a way to reduce the risk entailed in interactions among total strangers in electronic marketplace. Centralized reputation systems have been adopted by many on-line electronic auctions such as eBay to collect and store reputation ratings from feedback providers in a centralized reputation database. Decentralized reputation systems used by MANET, on the other hand, do not use centralized reputation database. Instead, in these reputation systems, each node keeps the ratings about other node and updating the ratings by direct observation of the behaviorsof neighboring nodes or second hand information from other trusted nodes. Identifies three goals for reputation systems: To provide information to distinguish between a trust-worthy principal and an untrustworthy principals. To encourage principals to act in a trustworthy manner To discourage untrustworthy principals from participating in the service the reputation mechanism is present to protect. Most of the reputation systems in MANET are based on trust management system. Trust is such a subjective and dynamic concept that different entities can hold different opinions on it even while facing the same situation. Trust management system can work without reputation system. For example, a mobile node can form opinion about other nodes by direct experience with the nodes.We can unify reputation system and trust management system to dynamic feedback mechanisms. Former one is a global reputation system and mobile nodes share their own experiences of interaction with other nodes. The later one is a local reputation system in which mobile nodes rating the trustability of other nodes based on its own observation. DSR DSR is a reputation system aiming at coping with misbehavior in MANET. The idea is to detect the misbehaved nodes and isolate them fromcommunication by not using them for routing and forwarding and by not allowing the misbehaved nodes to use itself to forward packets. DSR stands for Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Network. It usually works as an extension to on demand routing Mobile Ad Hoc Networks (MANETs) Mobile Ad Hoc Networks (MANETs) Introduction What is Mobile Ad Hoc Network? With rapid development of wireless technology, the Mobile Ad Hoc Network (MANET) has emerged as a new type of wireless network. MANET is a collection of wireless mobile nodes (e.g. laptops) that dynamically function as a network without the use of any existing infrastructure and centralized administration. It is an autonomous system where each node operates not only as an end system but also as a router to forward packets for other nodes. Since the nodes in MANET move around, the wireless links break and re-establish frequently. Furthermore, most of mobile nodes are resource limited in computing capability and battery power and therefore traditional computing content routing protocols are not suitable for MANET. Several ad hoc routing protocols have been proposed for each node acting as router and maintaining routing information. There are many other applications of MANET. For examples, MANET can be used to provide emergency Services when the network is impaired due to the damaging of existing infrastructure [8]. Computer scientists have predicted a world of ubiquitous computing in which computers will be all around us, constantly performing mundane tasks to make our lives a little easier. These ubiquitous computers connect in mobile ad hoc mode and change the environment or react to the change of the environment where they are suited. MANET is also found useful in the so-called sensor dust network to coordinate the activities and reports of a large collection of tiny sensor devices which could offer detailed information about terrain or environmental dangerous conditions. Problem Statement and Motivation Most current ad hoc routing protocols assume that the wireless network is benign and every node in the network strictly follows the routing behavior and is willing to forward packets for other nodes. Most of these protocols cope well with the dynamically changing topology. However, they do not address the problems when misbehavior nodes present in the network.A commonly observed misbehavior is packet dropping. In a practical MANET, most devices have very limited computing and battery power while packet forwarding consumes a lot of such resources. Thus some of the mobile devices would not like to forward the packets for the benefit of others and they drop packets not destined to them. On the other hand, they still make use of other nodes to forward packets that they originate. These misbehaved nodes are very difficult to identify because we cannot tell that whether the packets are dropped intentionally by the misbehaved nodes or dropped due to the node having moved out of transmission range or other link error. Packet drop significantly decreases the network performance.Traditional security mechanisms are generally not suitable for MANET because: The network lacks central infrastructure to apply traditional security mechanism such as access control, authentication and trusted third party. Limited bandwidth, battery lifetime, and computation power prohibits the deployment of complex routing protocols or encryption algorithms. New security models or mechanisms suitable for MANET must be found. Network topologies and memberships are constantly changing. Thus new intrusion detection system and entity recognition mechanisms that are suitable for mobile ad hoc networks must be designed to avoid or mitigate the behavior to the networks. Trust management systems have been recently introduced as a security mechanism in MANET. In a trust management system, a communicating entity collects evidence regarding competence, honesty or security of other network participants with the purpose of making assessment or decisions regarding their trust relationships. Here trust Objective and Sub-tasks means the confidence of an entity on another entity based on the expectation that the other entity will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other entity . For example, a trust-based routing protocol can collect the evidence of nodes misbehaving, form trust values of the nodes and select safest routes based on the trust metrics.Reputations systems are often seen as a derivation of trust management system. In the reputation system, an entity forms its trust on another entity based not only on the selfobserved evidence but also on the second hand information from third parties. One of the influential reputation systems is the DSR protocol. In the trust management system, reputation system and other trust-based systems, route selection is based on the sending nodes prior experience with other nodes in the network. Its opinions about how other entities are honest are constantly changing. Thus, we call the trust manag ement systems and their derivations as dynamic feedback mechanisms. The dynamic feedback mechanisms are usually applied on the current ad hoc routing protocols to rate the trust about other nodes in the network and make routing decisions based on the trust matrix, which is formed according to the evidence collected from previous interactions. By incorporating the dynamic feedback mechanism in the routing protocol, misbehaved nodes are identified and avoided to forward packets. In this way,misbehavior can be mitigated. Objective and Sub-tasks The primary objective of this thesis is to Investigate the state of the art of dynamic feedback mechanisms and protocols analyze, implement and evaluate DSR protocols to see how it improves the network performance and what are the side effects of introducing the mechanism to the mobile ad hoc network. Following tasks must be done to achieve the primary objective. Study the preliminary knowledge that is required to carry out the main tasks. For example, to understand DSR protocol one must have some knowledge of Bayesian analysis; to do performance analysis one must learn the methodologies of conducting performance analysis and processing simulation data. Investigate security issues of mobile ad hoc network and current dynamic feedback mechanisms or protocols that are used to solve or mitigate the issues. Investigate and learn how to use the network simulation tool. There are several popular network simulation tools available and we need to choose the one that best suits our needs. The selected network simulator should be studied so that we can use it as platform to implement protocol and conduct simulations. Analyze and implement the DSR protocol based on Dynamic Source Routing protocol (DSR); evaluate the network performance. Structure of the Report Since we have almost gone through the chapter one, we only briefly present the content of the subsequent chapters in this section. Preliminary Information State of the Art Analysis Design Implementation and Tests Performance Analysis Conclusion and Future Work Preliminary information we have introduced the MANET. This chapter presents other preliminary information and concepts that will be used in other parts of the thesis. Firstly four general modes of routing operations are introduced and compared. The DSR protocol, which is used as underlying routing protocol in the thesis, is explained in detail. Secondly Bayesian estimation and Beta function are explained to pave the way for the analysis of the reputation model of DSR in the chapter 4. Thirdly some techniques regarding simulation and performance analysis are presented. Finally, several popular network simulation tools are discussed and compared. Mobile Ad Hoc Network Routing Protocols Nowadays there are various routing protocols proposed for the MANET. The most popular ones are DSDV (Destination-Sequenced Distance Vector), TORA (Temporally- Ordered Routing Algorithm), DSR (Dynamic Source Routing) and AODV (Ad-hoc On Demand Distance Vector). These routing protocols can be categorized in different routing operation modes. Mode of Routing Operations These two modes concern whether or not nodes in an ad hoc network should keep track of routes to all possible destinations, or instead keep track of only those destinations of immediate interest Proactive protocols store route information even before it is needed. This kind of protocols has advantage that communications with arbitrary destination experience minimal delay. However it also suffers from the disadvantage that additional control traffic is needed to continually update stale route information. This could significantly increase routing overhead especially for the MANET where the links are often broken. Reactive protocols, on the contrary, acquire routing information only when it is actually needed. However, the latency of the communication increases tremendously especially when a node communicates to another at the first time. Source routing vs. Hop-by-hop routing These two modes concern whether the source node decides the route for a packet to be forwarded to the destination or the intermediate nodes are allowed to decide the next hop until the packet arrives at the destination. In the source routing protocols, the source node decides the route and puts the route information in the packet header. All the intermediate nodes forward the packet along the route faithfully. This kind of protocols has advantage that the intermediate nodes are not required to maintain the routing information. But it suffers from the disadvantage that the packet size grows because of source routing information carried in each packet. In the hop-by-hop routing protocols, it is sufficient for the source to know only how to get to the next hop and intermediate nodes find their own next-hops until the destination. In contrast to source routing protocols, hop-by-hop routing protocols do not increase packet size but they requires all the intermediate nodes to maintain rout ing information. Table 2-1 Categories of routing protocols has compared the performance of these four routing protocols . The results show that DSR has best throughput performance (above 95%) at all mobility rates and movement speeds. Thus we will use DSR as basic routing protocol in this thesis. The Dynamic Source Routing Protocol (DSR) John et al. proposed the dynamic source routing protocol (DSR) [1] which is a routing protocol for use in multi-hop wireless ad hoc networks of mobile nodes. DSR is an ondemand protocol, in which route are only discovered when data need to be transmitted to a node where no route has yet been discovered. The advantage of this on-demand routing protocol is that there are not any periodic routing advertisement and reducing the routing overhead. DSR is also a source routing protocol, allowing multiple routes to any destination and allows each sender to select and control the routes used in routing the packets. DSR is composed of the two main mechanisms: Route Discovery and Route Maintenance which are explained below. Route Discovery Route Discovery aims at finding routes from a source node to destination. Figure 2-1 illustrates the procedure of Route Discovery. When a source node S wants to send a data packet to some destination node D, it first searches its route cache to find whether there is a route to D. If there is no route to D, then S will initiate a Route Discovery and send out Route Request message which is propagated to all the nodes within its transmission range. At the mean time, it saves the data packet in its send buffer. The Route Request message contains the addresses of source node and destination node, a unique route request identifier and a route record which records all the intermediate nodes that this route request packet has traveled through. S appends itself to the beginning of the route record when it initiates the message. When a node receives the Route Request message, it compares the destination address in the message with its own address to judge whether itself is the destination node. If it is not, it will append its own address in the route record and propagate the message to other nodes. If the node is the destination node, it will send a Route Reply message to the source node and the message contains the source route record which is accumulated when the Route Request message is forwarded along its way to the destination. When the destination sends the Route Reply, if it uses MAC protocols such as IEEE 802.11 that require a bidirectional link, it just reverse the source route record and use it as route to send Route Reply to the source node. Otherwise it should find the route by searching its route cache or sending out a Route Request which piggybacks the Route Reply for the source node. When the source node receives the Route Reply message, it puts the returned route into its route cache. From t hen on all the packets destined to the same destination will use this route until it is broken. Route Maintenance Since the ad hoc network is dynamic and the topology of the network changes frequently, the existing routes maintained by nodes in their route cache are often broken. After forwarding a packet, a node must attempt to confirm the reachability of the next-hop node. If the node does not receive any confirmation from the next hop during a certain period of time, it will retransmit the packet. If after a maximum number of retransmission it still does not receive any confirmation, it will think the link to the next hop is broken and will send a Route Error message to the source node. DSR proposes three acknowledge mechanisms to confirm that data can flow over the link from that node to the next hop: Link-layer acknowledgement which is provided by MAC layer protocol such as IEEE 802.11. Passive acknowledgement in which a node hears the next-hop node forwarding the packet and thus confirms the reachability of the link. Network-layer acknowledgement in which a node sends an explicit acknowledgement request to its next-hop node. Passive Acknowledgement Passive Acknowledgement (PACK) is important in DSR protocol because it is used to detect whether the next hop forwards the packet or drops it. We explain it in detail in this section. Passive acknowledgement is used with the assumption that: Network links operates bi- directionally. The network interface is in the promiscuous mode. When a node taps a new packet in promiscuous mode after it originates or forwards a packet, it consider it as an acknowledgement of the first packet if both of following check success. The Source Address, Destination Address, Protocol, Identification, and Fragment Offset fields in the IP header of the two packets MUST match. If either packet contains a DSR Source Route header, both packets MUST contain one, and the value in the Segments Left field in the DSR Source Route header of the new packet MUST be less than that in the first packet. If no matched packet is found during PACK timeout, the node will consider the link between the next hop and itself is broken and will send Route Error message to the source node. Additional features DSR has additional features such as replying to route requests using cached routes, caching overheard routing information, packet salvaging and flow state extension and etc. We will introduce them in section 4.1 and discuss how they will impact the performance of network, how they will interact with DSR and whether they will be enabled in our simulation. Performance Analysis Techniques This section introduces the performance analysis techniques and methodologies that will be used in the performance evaluation. Factors and Primary Factors There are many parameters that will influence the simulation results and need to be carefully chosen in the simulations. Some parameters are chosen based on experience values or the conditions of the network we want to simulate. Others need to be tuned to optimize the network performance. We distinguish the two kinds of parameters as follows: Factors are the variables that affect the simulation result and have several alternatives. Normally they are decided based on experience. Primary factors are the factors whose effects need to be quantified. This kind of factors usually needs to be adjusted through simulation. Data Measurement The key step of the network performance analysis is to interpret the simulation result and summarize the characteristic of the network. To avoid the inaccurate simulation results due to an extreme scenario, we usually run simulations on several different scenarios. The data set of these simulations are called sample. A single number must be presented to give the key characteristic of the sample and this single number is called an average of the data. There are three alternatives to summarize a sample Mean is obtained by taking the sum of all observations and dividing this sum by the number of observations in the sample. Median is obtained by sorting the observations in an increasing order and taking the observation that is in the middle of series. If the number of the observations is even, the mean of the middle two values is used as a median. Mode is obtained by plotting a histogram and specifying the midpoint of the bucket where the histogram peaks. Confidence Interval for the Mean In our performance evaluation, the main objective is to compare the simulation results of DSR and Standard DSR to see whether there is any performance improvement. However, most simulation results are random in some degree due to the particularity of the node movement scenarios and we cannot tell whether the two systems are different. One way to minimize the random effect is to repeat the simulations with different scenarios as many times as possible and get a large sample space. Unfortunately, due to the time limitation we cannot conduct many simulations. points out that using confidence interval we can tell whether the two systems are different with smaller sample space. The confidence interval for the mean can be calculated using If the confidence intervals of the simulation results of the two systems have no overlap, then we can claim the two systems are different and one system is superior or inferior to the other. GloMoSims source and binary code can be downloaded only by academic institutions for research purposes. Commercial users must use QualNet, the commercial version of GloMoSim. OPNET Modeler OPNET Modeler is commercial network simulation environment for network modeling and simulation. It allows the users to design and study communication networks, devices, protocols, and applications with flexibility and scalability [30]. It simulates the network graphically and its graphical editors mirror the structure of actual networks and network components. The users can design the network model visually.The modeler uses object-oriented modeling approach. The nodes and protocols are modeled as classes with inheritance and specialization. The development language is C. Comparison When choosing a network simulator, we normally consider the accuracy of the simulator. Unfortunately there is no conclusion on which of the above three simulator is the most accurate one. David Cavin et al. has conducted experiments to compare the accuracy of the simulators and it finds out that the results are barely comparable [31]. Furthermore, it warns that no standalone simulations can fit all the needs of the wireless developers. It is more realistic to consider a hybrid approach in which only the lowest layers (MAC and physical layers) and the mobility model are simulated and all the upper layers (from transport to application layers) are executed on a dedicated hosts (e.g. cluster of machines). Although there is no definite conclusion about the accuracy of the three network simulators, we have to choose one of them as our simulation environment. We compare the simulators using some metrics and the results are summarized After comparing the three simulators, we decide to choose ns2 as network simulator in our thesis because Ns2 is open source free software. It can be easily downloaded and installed. The author of the thesis has used ns2 in another network related course and gotten familiar with the simulation. Ns2 uses TCL and C++ as development languages for which the author has some programming experience. The author of the DSR protocol has conducted simulation on GloMoSim and gotten performance results. We want to do the simulation on a different simulation to form comparison. State of the Art In this chapter we will introduce the start of the art security solutions in MANET with emphasis on dynamic feedback mechanisms. Firstly, we will present the general security issues/requirements of MANET to pave the way for the future investigation. Then we will discuss the state of the art security mechanisms for MANET such as payment system,trust management system, reputation system, etc. Finally, we will summarize all the security solutions we discussed in this chapter. Security Issues in Mobile Ad Hoc Network Due to lack of central infrastructural and wireless links susceptible to attacks, security in ad hoc network has inherent weakness. In section 1.2 we have discussed the reasons why mobile ad hoc network imposes security challenges that cannot be solved by traditional security mechanisms. In this section, we present the general security properties required by ad hoc network. Following are general security properties regarding ad hoc network Confidentiality: The confdiantiality property is to protect certain information from unauthorized disclosure. The information includes not only the application data that send over the routing protocol, but also the routing information itself as well as network topology and geographical location. Integrity: The integrity ensures that the transmitted message and other system asset are modified only by authorized parties. In the routing level, it requires all nodes in the network following correct routing procedure. The main challenge of ensuring integrity is that without central infrastructure and powerful computing capabilities, it is difficult to apply existing cryptography and key management systems. Availability: The availability property requires that the services or devices are exempt from denial of service, which is normally done by interruption, network or server overload. Typical examples or denial of service attack are radio jamming, in which a misbehaved node transmit radio to interference other nodes communications, and battery exhaustion, in which a misbehaved node interact with a node for no other purpose than to consume its battery energy. Authentication: The authentication property requires that the communication entitys identification is recognized and proved before communication starts. Access control: This property requires restricting resources, services or data to special identities according to their access rights or group membership. Non-repudiation: This property ensures that when data are sent from sender to receiver, the sender cannot deny that he has sent the data and the receiver cannot deny that he has received the data. Mobile nodes may conduct different misbehavior for different purposes. Po-Wah Yau classifies the misbehaved nodes into following categories. Failed nodes are simply those unable to perform an operation; this could be because power failure and environmental events. Badly failed nodes exhibit features of failed nodes but they can also send false routing messages which are a threat to the integrity of the network. Selfish nodes are typified by their unwillingness to cooperate as the protocol requires whenever there is a personal cost involved. Packet dropping is the main attack by selfish nodes. Malicious nodes aim to deliberately disrupt the correct operation of the routing protocol, denying network service if possible. These four types of misbehaved nodes actually can be categorized in two aspects: whether their misbehaviors are intentional or unintentional, and the severity of the results. Payment Systems Payment systems provide economic incentives for the cooperation in MANET. They consider that each node in MANET is its own authority and tries to maximize the benefits it gets from the network. Thus each node tends to be selfish, dropping packets not destined to them but make use of other nodes to forward their own packets. The purpose of payment systems is to encourage the cooperation within the MANET by economic incentives. There are several variations of payment systems proposed. Nuglets Nuglets is a virtual currency mechanism for charging (rewarding) server usage (provision). Nodes that use a service must pay for it (in nuglets) to nodes that provide the service. A typical service is packet forwarding which is provided by intermediate nodes to the source and the destination of the packet. Therefore either the source or the destination should pay for it. There are two models for charging for the packet forwarding service: the Packet Purse Model (PPM) and the Packet Trade Model (PTM). In the Packet Purse Model, the sender pays for the packet. It loads the packet with a number of nuglets when sending the packet. Each intermediate forwarding node acquires some nuglets from the packet that covers its forwarding costs. If a packet does not have enough nuglets to be forwarded, then it is discarded. If there are nuglets left in the packet once it reaches destination, the nuglets are lost. In the Packet Trade Model, the destination pays for the packet. Each intermediate node buys the packet from previous one for some nuglets and sells it to the next one for more nuglets until the destination buys it. Either of the two models has advantages and disadvantages. While the Packet Purse Model deters nodes from sending useless data and avoids the network overloading, the Packet Trade Model can lead to an overload of the network and the destination receives packets it does not want. On the other hand, in the Packet Purse Model it is difficult to estimate the number of nuglets th at are required to reach a given destination. But thePacket Purse Model does not need to consider this problem. To take advantages of the two models and avoid the disadvantages, a hybrid model is suggested. In this model, the sender loads the packet with some nuglets before sending it.The packet is handled according to the Packet Purse Model until it runs out of nuglets. Then it is handled according to the Packet Trade Model until the destination buys it. Counter To address the problems encountered by the nuglets approach such as difficulty in estimating pre-load nuglets and possible network overload, another payment approach based on credit counter is suggested. In this approach, the current state of each node is described by two variables b and c, where b is the remaining battery power and cstands for the value of its nuglet counter. More precisely, b is the number of packets that the node can send using its remaining energy and c is the number of packets a node canoriginate. A node can originate a number of packets N only when the condition c=N holds. When a node forwards a packet, nuglet counter c is increased by one and b is reduced by one. Thus in order to originate packets, each node must earn credits by forwarding packets. The counter solution requires tamper resistant hardware security module. Spirit S. Zhong et al. proposed Sprite [19], a credit-based system for MANET. As opposed to Nuglets or Counter they do not require tamper-proof hardware to prevent the fabrication of payment units. Instead, they introduce a central Credit Clearance Service (CCS). The basic scheme of the system is as follows. When a node receives a message the node keeps a receipt of the message and reports to the CCS when the node has a fast connection to Credit Clearance Service (CCS). The CCS then determines the charge and credits to each node involved in the transmission of a message, depending on the reported receipts of a message. In this scheme, the sender charges money. A node that has forwarded a message is compensated, but the credit that a node receives depends on whether or not its forwarding action is successful. Forwarding is considered successful if and only if the next node on the path reports a valid receipt to the CCS. Discussion on the Payment Systems The payment systems we describe in above sections either assumes a tamper resistant hardware module is available to ensure that the behavior of the node is not modified or requires a central authority server to determine the charge and credit to each node involved in the transmission of a message. Tamper resistant hardware may not be appropriate for most mobile devices because it demands advanced hardware solution and increases the cost of the devices. Lacking of central authority server is right the inherent property of MANET that causes security challenges so it is also not appropriate. Furthermore, all the approaches described above suffer from locality problems [20] that nodes in different locations of the network will have different chances for earning virtualcurrency, which may not be fair for all nodes. Usually nodes at the periphery of the network will have less chance to be rewarded. Reputation System Reputation systems have emerged as a way to reduce the risk entailed in interactions among total strangers in electronic marketplace. Centralized reputation systems have been adopted by many on-line electronic auctions such as eBay to collect and store reputation ratings from feedback providers in a centralized reputation database. Decentralized reputation systems used by MANET, on the other hand, do not use centralized reputation database. Instead, in these reputation systems, each node keeps the ratings about other node and updating the ratings by direct observation of the behaviorsof neighboring nodes or second hand information from other trusted nodes. Identifies three goals for reputation systems: To provide information to distinguish between a trust-worthy principal and an untrustworthy principals. To encourage principals to act in a trustworthy manner To discourage untrustworthy principals from participating in the service the reputation mechanism is present to protect. Most of the reputation systems in MANET are based on trust management system. Trust is such a subjective and dynamic concept that different entities can hold different opinions on it even while facing the same situation. Trust management system can work without reputation system. For example, a mobile node can form opinion about other nodes by direct experience with the nodes.We can unify reputation system and trust management system to dynamic feedback mechanisms. Former one is a global reputation system and mobile nodes share their own experiences of interaction with other nodes. The later one is a local reputation system in which mobile nodes rating the trustability of other nodes based on its own observation. DSR DSR is a reputation system aiming at coping with misbehavior in MANET. The idea is to detect the misbehaved nodes and isolate them fromcommunication by not using them for routing and forwarding and by not allowing the misbehaved nodes to use itself to forward packets. DSR stands for Cooperation Of Nodes: Fairness In Dynamic Ad-hoc Network. It usually works as an extension to on demand routing