Friday, December 27, 2019

Embedded system - Free Essay Example

Sample details Pages: 23 Words: 6812 Downloads: 10 Date added: 2017/06/26 Category Statistics Essay Did you like this example? Abstract An Embedded system has become indispensable in our lifes: cars, aeroplanes, powerplant control systems, telecommunications systems, all contain digital computing systems with dedicated functionality. Most of them are real-time systems which response to their timeliness constraints. The timeliness requirement has to meet under influence of unpredictable stochastic behavior of the system. In this thesis we address stochastic task execution times. In scheduling of tasks in real-time systems, it is usually assumed that the tasks consume their WCET in every invocation. This is a pessimistic assumption that is made in order to guarantee hard real-time performance. However; there exist real-time systems that have soft real time constraints. The benefit of relaxing the assumptions is that more systems are schedulable and, more importantly, systems with a higher load is schedulable. Don’t waste time! Our writers will create an original "Embedded system" essay for you Create order The goal of the project is to: * Implementing Stochastic WCET and the least slack first scheduling algorithm in a real-time system simulator. * Experiments should be performed in order to investigate experimentally the benefits in terms of number of schedulable systems using stochastic wcets compared to using fixed wcets. The results show the performance and the advantage gained by least slack first scheduling algorithm which has lowest possible slack time. Key words RTOS, Simulation, Tasks, Response time, Worst case response time, worst case execution time. iii Sammanfattning begreppen Bddat in systemen har bli oumbrlig i vr livsform: bil, flygmaskinerna powerplant kontroll systemen telecommuncations systemen, de all innehlla digital arbete med computer systemen med hngiven funktionellitet. Hgst omen dem de/vi/du/ni r verklig tid systemen vilken svaren till deras timeliness tvngen. Och den hr timeliness behoven har till bli ngot ofrutsedd stochastic beteende om system. I denne teorien vi adress plattform beroende stochastic arbetsuppgift utfranden tiden. I planlge av uppgiften i verklig tid systemen, den er vanligtvis anta s pass uppgiften frtra den wcet i varje kallan. Den hr er en pessimistisk antaganden den dr er gjord for att garanti hrd verklig tid utfrande. Hur n; dr finnas verklig tid systemen s pass har mjuk verklig tid tvngen. Frmnen av slappa antagandena er det alt mer systemen de/vi/du/ni r schedulable och , mer viktigt , systemen med en hger lasta r schedulable. Mlet om projekt r till: * Stochastic wcet och den minst sl frsta planlge algoritmen i en verklig tid system simulanten. * Experimentera skulle bli utfrt for att underska experimental den frmnen i termen av antal av schedulable systemen anvndande stochastic wcets jmfrde med anvndande fstad wcets. Den resultaten utstllning utfranden och frdelen vinna vid minst sl frsta planlge algoritmen vilken har lgst mullig sl tid. List of Abbreviations PTDA } Probabilistic time demand analysis. STDA } Stochastic time demand analysis. EP } Execution profile SN } Switching number Chapter 1 Introduction This chapter gives the motivation for the work done in this thesis in section 1.1, and then objectives in section 1.2, and structure of the thesis in section 1.3. 1.1 Motivation Embedded systems have become common use in our life: household appliances, cars, airplanes, power plant control systems, medical equipment, telecommunication systems, space technology, they all contain digital computing systems with dedicated functionality. Most of them, if not all, are real-time systems, i.e. their responses to stimuli have timeliness constraints. The timeliness requirement has to be met despite some unpredictable, stochastic behavior of the system. 1.2 Objective The main objective of this thesis is to develop 1. Implementing stochastic wcet and the least slack first scheduling algorithm in a real-time system simulator. 2. Experiments should be performed in order to investigate experimentally the benefits in terms of number of schedulable systems using stochastic wcets compared to using fixed wcets. 3. Get trained in using Research methodology for solving a state of art problem in an area important for the Masters program. 4. Understand how the work is expected to be documented and practice it in writing a Masters thesis. 1.3 Thesis Outline Chapter 2, describes the theoretical background about the stochastic behaviour of real-time systems and least slack first scheduling algorithm. Chapter 3, outlines the problem formulation. Chapter 4, describes the solution. Chapter 5, demonstrates the evaluation of the simulation. Chapter 6, shows the related works. Chapter 7, follows conclusions from the results obtained. Chapter 2 Background This chapter introduces basic concepts and notations needed for understanding the remainder of the thesis. Section 2.1 presents the main concepts of real-time and embedded systems. Section 2.2 presents the concepts of least slack first algorithm and their types. 2.1 Real-Time and Embedded Systems 2.1.1 RTOS Real-Time Operating System, an operating system designed to be used in real time systems. A Real time systems has been defined as Any information processing activity or system which has to respond to externally generated input stimuli within a finite and specified delay. The basic characteristics of a real-time systems or embedded computer systems have been considered. They were: 1. Largeness and complexity 2. Manipulation of real numbers 3. Real-time control. 4. Efficient implementation. 5. Extreme reliability and safety. Systems, in which the correctness of their operation is defined not only in terms of functionality but also in terms of timeliness, form the class of real-time systems. Hard Real time systems: Timeliness requirements may be hard meaning that the violation of any such requirement is not tolerated. In a hard real-time system, if not all deadlines are guaranteed to be met, the system is said to be unschedulable. To understand, design, predict, and analyze safety critical applications such as plant control and aircraft control, therefore the community focused on hard real time systems, where breaking timeliness requirements are not tolerated. The analysis of such system gives a yes/no answer to the question if the system fulfils the timeliness requirements. Hard real time analysis relies on building worst-case scenarios. Hard real time analysis cannot afford but to assume that worst case scenarios always happen and to provision for these cases. This approach is the only one applicable for the class of safety critical embedded systems, even if very often leads to significant under utilization of resources. Soft Real time systems: Systems classified as soft real-time may occasionally break a real-time requirement provided that the service quality exceeds prescribed levels. The nature of real-time embedded system is typically heterogeneous along multiple dimensions. For example, an application may exhibit data, control and protocol processing characteristics. It may also consist of blocks exhibiting different categories of timeliness requirements, such as hard and soft. In the case of soft real-time systems however, the analysis provides fitness estimates, such as measures of the degree to which a system is schedulable, rather than binary classifications. 2.1.2 Simulation Simulation is a method which can be used for analysis of response time. When we are using simulation, a detailed model of the system is executed in simulating a system before it is implemented helps reducing risks of failure. 2.1.3 Tasks A process in a real time system usually with some deadline and a period. 2.1.4 Response time The time in which system gives output after taking input. 2.1.5 Worst case response time The maximum possible response time of a task. 2.1.6 Worst case execution time (WCET) The longest possible execution time of the task. Stochastic model uses in: It improves schedulability of tasks compared to assuming their execution times are always equal to their wcets. It uses well known Techniques of Deterministic Analysis, such as blocking in shared resources, task priority assignment. 2.2 Least slack first Scheduling Algorithm: Least Slack Time scheduling is a Scheduling algorithm. It assigns priority based on the slack time of a process. It is also known as Least Laxity First and most common use is in embedded systems, especially those with multiple processors. 2.2.1 Slack time This scheduling algorithm first selects those processes that have the smallest slack time. Slack time is defined as the temporal difference between the absolute deadline, the ready time and the run time. More formally, the slack time for a process is defined as: (d t) c Where, d is the process deadline t is the real time since the cycle start c is the remaining computation time. Its Suitable in: LST scheduling is most useful in systems comprising mainly aperiodic tasks, because no prior assumptions are made on the events rate of occurrence. The main weakness of LST is that it does not look ahead, and works only on the current system state. Thus, during a brief overload of system resources, LST can be sub-optimal and it will also be suboptimal when used with uninterruptible processes. It is optimal in: 1. Processor preemption is allowed. 2. No contention for resources. 3. Single processor. 4. Arbitrary release times. 5. Arbitrary deadlines. 2.2.2 Related works on LST When an algorithm contains same least slack time, it causes lots of unnecessary switching so bad performance will be there, so to restrict that we use least slack first heavily. LSF scheduling algorithm implemented by threshold; a novel Dynamic Fuzzy Threshold Based least Slack First (DFTLSF) scheduling algorithm is presented. DFTLSF algorithm uses the linguistic set (uncountable set) to describe the period and the slack time which contains uncertain characters. The threshold coefficient gotten by fuzzy rules assigns the threshold of the running task dynamically. Any one who wants to preempt this task must have the smaller slack time than the threshold. The results of the simulations show that, comparing to the traditional LSF Algorithm, the switching number (SN) is much smaller 2.2.2.1 DFTLSF Fuzzy Threshold: Two characters are considered to judge the priority of a task in DFTLSF: 1. Slack Time. 2. Threshold. The most important of the task to the system is, The small coefficient results in the small threshold which causes the hard preemption by other tasks. Once the task gets the CPU, its slack time reduces to its preemption threshold level which is computed. It wont get back until the task is done or the task is preempted by another task. The algorithm integrates the advantages of the preemption scheduling algorithm and the non-preemption one. It results in a dual priority system that is good for the tasks executing successfully and reducing the switching number. The method makes the schedule and the preemption flexible and reasonable according to the situation the task faces. When the threshold coefficient is 0, the algorithm is the method becomes the LSF while the threshold coefficient gets its biggest one which is 1. Scheduling strategy: In DFTLSF scheduling algorithm, the dynamic fuzzy threshold coefficient is proposed. It improves the schedulability by adding a fuzzy threshold coefficient. To look for the threshold coefficient, some fuzzy rules are made; the threshold coefficient is used for the running tasks in the system. It is compared with other tasks slack time to decide which one to run first. It decreases the switching number among tasks when the slack time of the tasks is almost the same. As a result, it avoids the thrashing (swapping) in the system and improves the schedulability. Another improvement is the critical value of slack time. It is introduced into the system to ensure the tasks which are nearly finished cant be preempted by other tasks. 2.2.2.2 Least Laxity First Scheduling: This can be a coprocessor capable of implementing dynamic scheduling algorithms which are, until now rarely used because of their complex computations at schedule time. LLF is an optimal scheduling methodology that allows detection of time constraint violations ahead of reaching a tasks deadline, but has the disadvantage of showing poor runtime behavior in some special situations (thrashing) The Least-Laxity-First algorithm (LLF) is a dynamic scheduling method, i.e. it makes the decision about which task to execute next at schedule time. Another great advantage of the Least-Laxity-First algorithm is the fact that except schedulability testing no further analysis, e.g. for assigning fixed priorities to the tasks, has to be done at development time. Furthermore, Least-Laxity-First shows poor performance in situations in which more than one task have the smallest slack. 2.2.2.3 Enhanced Least Laxity First Scheduling: This algorithm preserves all advantages of LLF while improving the run time behavior by reducing the number of context switches. Computation time of this device is rather a matter of time resolution than of the number of tasks. This is of high importance as LLF in certain situations causes a big number of unnecessary context switches that can dramatically increase operating system overhead. ELLF algorithm represents a passive scheduling coprocessor, i.e. the device determines the task to be executed next only after an external start signal. The aim of this improvement is to ensure that in a situation when some tasks would normally start to thrash, they are executed consecutively without preempting each other. This can not be done by simply making the whole system temporarily Non-preemptive. With such a non-preemptive LLF-algorithm, tasks may miss their deadlines. Advantages of Enhanced Least-Laxity- First Scheduling: 1. It responses the time analysis of thrashing tasks. 2. Number of Context Switches. 2.2.2.4 Modified Least Laxity First Scheduling: A Modified Least-Laxity-First (MLLF) scheduling algorithm is to solve the frequent context switches problem of the LLF scheduling algorithm. The MLLF scheduling algorithm allows the laxity inversion where a task with the least laxity may not be scheduled immediately. If the laxity-tie occurs, MLLF scheduling algorithm allows the running task to run with no preemption as far as the deadlines of other tasks are not missed. Laxity Inversion Duration at time t is the duration that the current running task can continue running with no loss in schedulability even if there exist a task (or tasks) whose laxity is smaller than the current running task. Hence, MLLF scheduling algorithm avoids the degradation of systems performance. Chapter 3 Problem Formulation Since the application domain of this thesis is embedded systems, this chapter starts in section 3.1 with a discussion on the existing scheduling algorithms based on Real time systems. Section 3.2 presents the need of Least Slack First Scheduling Algorithm in stochastic wcet. 3.1 Scheduling Algorithms in Real-time Systems For a given set of jobs, the general scheduling problems asks for an order according to which the jobs are to be executed by satisfying with various constraints. Typically, a job is characterised by its execution time, ready time, deadline, and resource requirements. The execution of a job may or may not be interrupted over a set of jobs and there is a precedence relation which constraints the order of the execution, especially with the execution of a job cannot begin until the execution of all its predecessors is completed. Types of Real-Time Scheduling For example the systems on which the jobs are to be executed is characterised by the amount of resources available [22, 59, 30, 32, 27, 12]. The following goals should be considered in scheduling a real-time system: [30, 32, 27]. * Meeting the timing constraints of the system * Preventing simultaneous access to shred resources and devices. * Attaining a high degree of utilization while satisfying the timing constraints of the system. * Reducing the cost of context switches caused by preemption. * Reducing the communication cost in real-time distributed systems. In addition, the following items are desired in advanced real-time systems: * Considering a combination of hard, and soft real time system activities, which implies the possibility of applying dynamic scheduling policies that respect to the optimality criteria. * Task scheduling of applying dynamic scheduling policies that respect the optimality criteria. * Covering reliability, security, and safety. Basically, the scheduling problem is to determine a schedule for the execution of the jobs so that they are all completed before the overall deadline [22, 59, 30, 32, 27, 12]. Given a real-time system, the appropriate scheduling approach should be designed based on the properties of the system and the tasks occurring in it. These properties are as follows [22, 59, 30, 32]: _ Soft/Hard/Firm real-time tasks The real-time tasks are classified as hard, soft and firm real-time tasks. Periodic/Aperiodic/Sporadic tasks Periodic tasks are real-time tasks which are activated (released) regularly at fixed rates (periods). Normally, periodic tasks have a constraint which indicates that instances of them must execute once per period. Aperiodic tasks are real-time tasks which are activated irregularly at some unknown and possibly unbounded rate. The time constraint is usually a deadline. Sporadic tasks are real-time tasks which are activated irregularly with some known bounded rate. The bounded rate is characterized by a minimum inter-arrival period, that is, a minimum interval of time between two successive activations. The time constraint is usually a deadline. An aperiodic task has a deadline by which it must start or finish, or it may have a constraint on both start and finish times. In the case of a periodic task, a period means once per period or exactly units apart. A majority of sensory processing is periodic in nature. For example, a radar that tracks flights produces data at a fixed rate [32, 29, 27, 12]. _ Preemptive/Non-preemptive tasks In some real-time scheduling algorithms, a task can be preempted if another task of higher priority becomes ready. In contrast, the execution of a non-preemptive task should be completed without interruption, once it is started [32, 30, 27, 12]. Multiprocessor/Single processor systems The number of the available processors is one of the main factors in deciding how to Schedule a real-time system. In multiprocessor real-time systems, the scheduling algorithms should prevent simultaneous access to shared resources and devices. Additionally, the best strategy to reduce the communication cost should be provided [32, 27]. Fixed/Dynamic priority tasks In priority driven scheduling, a priority is assigned to each task. Assigning the priorities can be done statically or dynamically while the system is running [22, 59, 30, 32, 12]. _Flexible/Static systems For scheduling a real-time system, we need to have enough information, such as deadline, minimum delay, maximum delay, run-time, and worst case execution time of each task. A majority of systems assume that much of this information is available a priori and, hence, are based on static design. However, some of the real-time systems are designed to be dynamic and flexible [22, 59, 30, 32, 12]. _ Independent/Dependent tasks Given a real-time system, a task that is going to start execution may require to receive the information provided by another task of the system. Therefore, execution of a task should be started after finishing the execution of the other task. This is the concept of dependency. 3.2 Implementing Least Slack First in stochastic behavior: The laxity of a process is defined as the deadline minus remaining computation time. In other words, the laxity of a job is the maximal amount of time that the job can wait and still meet its deadline. The algorithm gives the highest priority to the active job with the smallest laxity. Then the job with the highest priority is executed. While a process is executing, it can be preempted by another whose laxity has decreased to below that of the running process. A problem arises with this scheme when two processes have similar laxities. One process will run for a short while and then get preempted by the other and vice versa. Thus, many context switches occur in the lifetime of the processes. The least laxity first algorithm is an optimal scheduling algorithm for systems with periodic real-time tasks. If each time a new ready task arrives; it is inserted into a queue of ready tasks, sorted by their laxities. In this case, the worst case time complexity of the LLF algorithm is where the total number of the requests in each hyper-period of periodic tasks in the system and is the number of aperiodic tasks. The execution time of a task depends on application dependent, platform dependent, and environment dependent factors. The amount of input data to be processed in each task instantiation as well as its type (pattern, configuration) are application dependent factors. The type of processing unit that executes a task is a platform dependent facto r influencing the task execution time. If the time needed for communication with the environment is to be considered as a part of the execution time, then network load is an example of an environmental factor influencing the task execution time. Execution time probability density function shows the execution time probability density of such a task. An approach based on a worst case execution time model would implement the task on an expensive system which guarantees the imposed deadline for the worst case situation. This situation however will occur with a very small probability. If the nature of the system is such that a certain percentage of deadline misses is affordable, a cheaper system, which still fulfills the imposed quality of service, can be designed. For example, such a cheaper a system would be one that would guarantee the deadlines if the execution time of the task did not exceed a time moment t. It can be seen from the , that there is a low probability that the task execution time exceeds t and therefore, missing a deadline is a rare event leading to an acceptable service quality. Chapter 4 Design and Implementation This chapter presents the design and implementation of stochastic wcet and LSF scheduling algorithm in section 4.1 respectively. 4.1 Design of Least Slack First Algorithm: Hard real-time scheduling can be thought of as an issue for embedded systems where the amount of time to complete each burst is subject to these parameters: Amount of work (W), amount of slack time (S) Assume that the numbers are specified in terms of processor ticks (timer interrupts). The deadline (D) is the sum of W + S, i.e., slack time precisely represents the amount of time which in which the process can be preempted while completing its burst in order to achieve the deadline. When a number of processes are attempting to achieve their deadlines the following computation takes place at each tick (1): W; // for the current running process S; // for all processes on the ready queue Namely, the running process has completed another tick of work towards its deadline and the others have one less tick of slack time available. In scheduling algorithms we imagine for such a system would not be time-sharing, but would be priority-based, where the priority is measured by some sense of urgency towards completing the deadlines. Least Slack First (LSF): when a process completes a burst or a new one becomes ready, schedule the process whose value S is the smallest. Or, it can focus on completing of the overall deadline. Both represent reasonable notions of satisfying process urgency. Here is a simple example which illustrates the differing behavior: Process idle time burst - A 0 (W=10, S=8) B 3 (W=3, S=11) C 5 (W=3, S=6) Using the LSF algorithm, we would complete these bursts as follows: Time run ready - 0 A (10,8) () 3 A (7,8) (B(3,11) ) 5 C (3,6) ( A(5,8), B(3,9) ) 8 A (5,5) ( B(3,6) ) 13 B (3,1) () 16 Based on the above example the code has been generated and explanation for the above example: Iteration 1: At time 0 A will be (10, 8) Where as 10 is W (current running process), 8 is S (ready queue). Iteration 2: At time 3 We have 2 stages: 1. Run stage: At this stage the process A will (7, 8) because For 7: W idle time 8: ready queue 2. Ready stage: At this stage the process B will (3, 11) because For 3: idle time 11: ready queue Iteration 3: At time 5 Same as like Iteration 2 here also we have 2 stages 1. Run stage: At this stage the process C will (3, 6) because For 3: idle time 6: ready queue 2. Ready stage: Process A will be (5, 8) and B will be (3, 9) For 5: 10-5 i.e. W idle time 8: ready queue For B: 3: idle time 9: W+S+idletime idle time idle time Iteration 4: At time 8 In Run stage A will be (5, 5) Because one cycle is executed so A ready queue will be minimized by 3 In Run stage B will be (3, 6) 6: W-idle time -idle time There will be a context switches. Iteration 5: At time 13 In run stage B (3, 1) 1: ready queue of iteration 3 -idle time. 4.1.1Comparing of Slack tasks: To compare slack tasks in LSF with different conditions the code has been written. if (slackLeftT1slackLeftT2) { return -1; } if(slackLeftT2==slackLeftT1) { return 0; } if(slackLeftT2slackLeftT1) { return 1; } return 0; } } 4.1.2Implementation of Execution times: In an actual execution time, the execution block consumes a guessed execution time that the scheduler is using in its scheduling decisions. In the function execution, the class Computation need to use the actual execution. In the LSF comparator we must make sure the guessed execution time is being used. Lets denote the actual execution time as C_to_be_executed_time and it is a data member of the class Computation. this.C_to_be_executed_time = distr.sample(); // time that will be consumed by the execution block Lets denote the guessed execution time as C and it is also a data member of the class Computation. this.C = distr.sample();// Assumed WCET to be used by LSF scheduler We must now ensure that the execute method consumes C_to_be_executed_time time units and the LSF comparator uses C. Further, ensuring the execution times that are assigned in the constructor of Computation class lie in the range of 0 and some positive upper bound. 4.1.3Implementation for scheduling periodic tasks and workload: The below code mention to implements the periodic tasks. Periodic p1 = new Periodic(0,31, 0, T1); p1.installConditionedComputation(new Computation(new Normal(10,5), p1)); The workload can be calculated by, Workload = max execution time/ period time. Chapter 5 Evaluation of Simulation This chapter describes the performance evaluation of the simulator. Section 5.1 presents the simulator foundation, while in section 5.2 5.1 Eclipse and the Eclipse Foundation Eclipse is an open source community; projects are focused on building an open development platform comprised of extensible frameworks, tools and runtimes for building, deploying and managing software across the lifecycle. The Eclipse Foundation is a not-for-profit, member supported corporation that hosts the Eclipse projects and helps cultivate both an open source community and an ecosystem of complementary products and services. The Eclipse Project was originally created by IBM in November 2001 and supported by a consortium of software vendors. The Eclipse Foundation was created in January 2004 as an independent not-for-profit corporation to act as the steward of the Eclipse community. The independent not-for-profit corporation was created to allow a vendor neutral and open, transparent community to be established around Eclipse. Today, the Eclipse community consists of individuals and organizations from a cross section of the software industry. In general, the Eclipse Foundation provides four services to the Eclipse community: 1) IT Infrastructure. 2) IP Management. 3) Development Process and, 4) Ecosystem Development. Full-time staffs are associated with each of these areas and work with the greater Eclipse community to assist in meeting the needs of the stakeholders. Eclipse an open development platform Eclipse is an open source community; projects are focused on building an open development platform comprised of extensible frameworks, tools and runtimes for building, deploying and managing software across the lifecycle. A large and vibrant ecosystem of major technology vendors, innovative start-ups, universities, research institutions and individuals extend, complement and support the Eclipse platform. Used for 1. Enterprise Development. 2. Mobile + Device development. 3. Application framework, language ide. Eclipse Projects Eclipse is a collection of open source projects built on the Equinox OSGi run-time. Eclipse started as a Java IDE, but has since grown to be much, much more. Eclipse projects now cover static and dynamic languages; thick-client, thin-client, and server-side frameworks; modeling and business reporting; embedded and mobile systems. 5.2 simulator setup: On a high level, the simulator simulates a computer system by using objects that encapsulate different functionality and decide on parameters on the objects. The following classes are important: 1.ComputerSystem: c.add(cpu); 2.CPU: A CPU that is bound to the computer system DataDependencyGraph g = new DataDependencyGraph(); g.insertData(1, 0, 0); g.insertData(2, 0, 0); g.insertData(3, 0, 0); A data dependency graph that describes data items in the system and their relationship. Think of the relationships a edges between nodes in a directed acyclic graph. Constructs a data dependency graph of three data items. These data items have no relationships. 3. ConditionedExecution: At least one conditioned execution that is bound to a task. Periodic p1 = new Periodic(0, 100, 0, T1); p1.installConditionedComputation(new IfTime(1, 10, 1, p1, g)); p1.installConditionedComputation(new Computation(10, p1)); Periodic p2 = new Periodic(0, 200, 0, T2); p2.installConditionedComputation(new IfTime(1, 10, 1, p2, g)); p2.installConditionedComputation(new Computation(10, p2)); Periodic p3 = new Periodic(0, 103, 0, T3); p3.installConditionedComputation(new IfTime(2, 10, 1, p3, g)); p3.installConditionedComputation(new Computation(10, p3)); Constructs three periodic tasks. Each task has two conditioned executions that execute in the order they are bound to the task. 4.Tasks: At least one task that is bound to a CPU. VectorCPU c = new VectorCPU(); CPU cpu = new CPU(new WinOverSlack()); cpu.installTask(p1); cpu.installTask(p2); cpu.installTask(p3); Instantiates a CPU and bounds the tasks to the CPU. 5.Events: At least one data item that may be used by an execution ComputerSystem cs = new ComputerSystem(c, trace); cs.eventLoop(10000); Constructs a computer system and bounds the array of CPUs to it. The method eventLoop starts the simulation and the simulation finishes when it reaches time point 10000. 6.Trace: Trace trace = new Trace(new OutputStreamWriter(System.out)); Instantiates a trace where the output of the simulation will be written. This trace writes to standard output, which makes the output to appear in the console in Eclipse. In simulation, I used stochastic execution times on a kind of conditioned execution that is bound to a task. This means that every time the conditioned execution executes it consumes different amounts of time. Thus, when an instance of a task starts we can take a guess how much time it will consume. The system uses LSF that use the guessed execution time. Output: Chapter 6 This chapter focuses on alternative approaches and related research works namely stochastic task execution times. Hence, in the below section we discussed related works on stochastic worst case execution times. Related works Some of the related work in stochastic task execution times: Burns et al.: [BPSW99] addresses the problem of a system by breaking its timeliness requirements due to transient faults. In this case, the execution time variability stems from task re-executions and the shortest interval between two fault occurrence such that no task exceeds its deadline and is determined by sensitivity analysis. The probability that the system exceeds its deadline is given by the probability that faults occurs at a faster rate than the tolerated one. Broster et al.: [BBRN02] Determines the response time of a task; it re-executes K N times due to faults in order to obtain the probability distribution of the response time, and it compute the probability of the event that K faults occur. The fault occurrence process is assumed to be a poisson process in both of the cited works. But Burns et al.: Extend brosters approach by adding statistical dependencies among execution times. His approach are applicable to systems with sporadic tasks, which are unsuited for the determination of task deadline miss probabilities of tasks with generalized execution time probability distributions ,and also confined to sets which are independent tasks implemented by using monoprocessor systems. Bernat et al.: [BCP02] Address different problem which determines the frequency with which a single task executes for a particular amount of time, called execution time profile and this was performed by based on the execution time profiles of the basic blocks of the task. The strength of this approach is that they consider statistical dependencies among the execution time profiles of the basic blocks. But however, this approach would be difficult to extend to the deadline miss ratio analysis of multi-task systems because of the complex interleaving with the characteristics of task executions in such environments. Atlas and Bestavros: [AB98] extends the classical rate monotonic scheduling policy with an admittance controller in order to handle tasks with stochastic execution times. It analyses the quality of the service of the resulting schedule and its dependence on the admittance control parameters. The approach is limited to monoprocessor systems, rate monotonic analysis and assumes the presence of an admission controller at run-time. Abeni and Buttazzos [AB99] work addresses both scheduling and performance analysis of tasks with stochastic parameters. It focuses on how to schedule both hard and soft real-time tasks on the same processor, in such a way that the hard ones are not disturbed by ill-behaved soft tasks. Tia et al. [TDS95] assume a task model composed of independent tasks. There are two methods for performance analysis they were, one of them is just an estimate and is demonstrated to be overly optimistic. In the second method, a soft task is transformed into a deterministic task and a sporadic one. The sporadic tasks are handled by a server policy. The analysis is carried out on this particular model. Gardner et al, [GAR99, GL99] in their stochastic time demand analysis, introduce worst-case scenarios with respect to task release times in order to compute a lower bound for the probability that job meets its deadline. It doesnt contain data dependencies among tasks and applications implemented on multiprocessors. Zhou et al. and Hu et al. [ZHS99, HZS01] root their work in Tias., they do not intend to give per-task guarantees, but characterize the fitness of the entire task set. Because they consider all possible combinations of execution times of all requests up to a time moment, the analysis can be applied only to small task sets due to complexity reasons. De Verciana et al. [BPSW99] address a different type of problem. Having a task graph and an imposed deadline, its goal is to determine the path that has the highest probability to violate the deadline. In this case, the problem is reduced to a non-linear optimization problem by using an approximation of the convolution of the probability densities. Diaz et al. [DJG00] derives the expected deadline miss ratio from the probability distribution function of the response time of a task. The response time is computed based on the system-level backlog at the beginning of each hyper period, i.e. the residual execution times of the jobs at those time moments. The stochastic process of the system-level backlog is Morkovian and its stationary solution can be computed. It contains sets of independent tasks and the task execution times may assume values only over discrete sets. In this approach, complexity is mastered by trimming the transition probability matrix of the underlying Markov chain or by deploying iterative methods, both at the expense of result accuracy. Kalavade and Moghe [KM98] consider task graphs where the task execution times are arbitrarily distributed over discrete sets. Their analysis is based on Markovian stochastic processes too. Each state in the process is characterized by the executed time and lead-time. The analysis is performed by solving a system of linear equations. Because the execution time is allowed to take only a finite (most likely small) number of values, such a set of equations is small. Kim and shin [KS96] consider applications that are implemented on multiprocessors and modeled them as queuing networks. It restricts the task execution times to exponentially distributed ones, which reduces the complexity of the analysis. The tasks were considered to be scheduled according to a particular policy, namely first-come-first-served (FCFS). Chapter 7 Conclusion Future works This chapter gives conclusions in section 7.1 and discusses issues for the future work in section 7.2 7.1 Summary Now a days, systems controlled by embedded computers become indispensable in our lives and can be found in lot of application. And the area of embedded real-time systems introduces the aspects of stochastic behaviour of real-time systems. In my thesis I deal with platform specific stochastic task. Because of rapid growth in embedded systems by day to day, the tasks in a system are incomplexed manner in a real time system and it is usually assumed that the task consume wcet in every invocation. And it is pessimistic assumption that is made in order to guarantee hard real-time performance. But we have also soft real-time constraints so that pessimistic assumption could be relaxed. In my thesis I worked on relaxing the pessimistic assumption so that more systems are schedulable and more over it is very important for a system to work on a higher work load where it is to be schedulable. By this I can make this system to miss their deadlines. 7.2 Future work Based on my thesis work, In certain areas it can be improve further by implementing Modified Least Laxity Scheduling Algorithm. By, the help of this algorithm we can minimise the context switches. By minimising it, we cannot find any deadline misses and there will be hundred percent utilisation of system which contains higher work load. Chapter 8 References [1] https://www.cs.wcupa.edu/~rkline/OS/Scheduling-examples.html, Last updated: Oct 17, 2007. [2] https://www.answers.com/topic/least-slack-time-scheduling, Article licensed under GNU Free Documentation License. [3] Ba wei, Zhang Dabo.., A Novel Least Slack First Scheduling Algorithm Optimized by Threshold.., china, July 26 -31, 2007. [4] Jens Hildebrandt, Frank Golatowski, Dirk Timmermann.., Scheduling Coprocessor for Enhanced Least-Laxity-First Scheduling in Hard Real-Time Systems.., Germany. [5] Sung-Heun Oh, Seung-Min Yang.., A Modified Least-Laxity-First Scheduling Algorithm for Real-Time Tasks.., Korea. [6] Using components to facilitate stochastic schedulability analysis. Malardalen University [7] Using iterative simulation for timing analysis of complex real time systems. Yue Lu [8] Analysis and optimization of real time system with stochastic behavior. sorin manolache. [9] A. Atlas and A.Bestavrous.Statistical rate monotonic scheduling. In proceedings of the 19th IEEE Real-Time Systems Symposium, pages 123-132, 1998. [10] L. Abeni and G.Butazzo. Qos guarantee using probabilistic deadlines In proceedings of the 11th Euromicro Conference on Real-Time Systems, pages 242-249, 1999. [11] I.Broster, A.Burns, and G.Rodriguez-Navas.Probabilistic analysis of CAN with faults. In proceedings of the 23rd Real-Time Systems Symposium, 2002. [12] G.Bernat, A.Colin, and S.Petters.WCET analysis of probabilistic hard Real-Time Systems Symposium, pages 279-288, 2002. [13] A. Burns, S.Punnekkat, L.Strigini, and D.R.Wright.Probabilistic scheduling guarantees for fault-tolerant real-time systems. In proceeding of the 7th International Working Conference on Dependable Computing for Critical Applications, pages 339-356, 1999. [14] G.de Veciana, M.Jacome, and J-H.Guo. Assessing probabilistic timing constraints on system performance. Design Automation for Embedded Systems, 5(1):61-81, February 2000. [15] M.K. Gardner.Probabilistics Analysis and Scheduling of Critical Soft Real-Time Systems. PhD thesis, University of Illinois at Urbana- Champaign, 1999. [16] M.K. Gardner and J.W.S.Liu.Analysing Stochastic Fixed Priority Real-Time Systems, pages 44-58.Springer, 1999. [17] X.S.Hu, T.Zhou, and E.H.M.Sha. Estimating Probabilistic timing performance for real-time embedded systems.IEEE Transactions on Very Large Scale Integration Systems, 9(6):833-844, December 2001. [18] A.Kavavade and P.Moghe. A tool for performance estimation of networked embedded end-systems. In Proceedings of the 35th Design Automation Conference, pages 257-262, 1998. [19] J.Kim and K.G.Shin. Execution time analysis of communicating tasks in distributed systems.IEEE Transactions on Computers, 445(5):572-579, May 1996. [20] T.S.Tia, Z.Deng, M.Shankar, M.Storch, J.Sun, L-C.Wu, and J.W.S.Liu. Probabilistic performance guarantee for real-time tasks with varying computation times. In Proceedings of the IEEE Real-Time Technology and Applications Symposium, pages 164-173, May 1995. [21] T.Zhou, X. (S.) Hu, and E.H.M.Sha. A probabilistic performance metric for real time system design. In Proceedings of the 7th International Workshop on Hardware-Software Co-Design, pages 90-94, 1999. Appendix Appendix In this chapter we present the timing diagrams of the schedules provided by some real-time scheduling algorithms, namely the earliest deadline first, the rate-monotonic and least laxity first algorithms, on given sets of tasks. The timing diagram of task t1 before scheduling The timing diagram of task t2 before scheduling The timing diagram of task t3 before scheduling Considering a system consisting of three tasks and that have the repetition periods, computation times, first invocation times and deadlines are defined in above table. The tasks are preemptive. Earliest Deadline First Algorithm As presented in below , the uniprocessor real-time system consisting of the tasks Set defined in Table 3 is not EDF-schedulable, because while the execution of the first invocation of the task t2 is not finished yet; the new invocation of the task arrives. In other words, an overrun condition happens. Rate Monotonic Algorithm As shown in below , the uniprocessor real-time system consisting of the tasks set defined in above table is not RM-schedulable. The reason is that the deadline of the first invocation of the task t3 is missed. The execution of the first invocation is required to be finished by time 6, but the schedule could not make it. Least Laxity First Algorithm Below presents a portion of the timing diagram of the schedule provided by the least laxity first algorithm on the tasks set defined in above table. As shown in the , the deadline of the third invocation of the task t1 cannot be met. we conclude that the uniprocessor real-time system consisting of the tasks set defined in table is not LLFschedulable.

Thursday, December 19, 2019

Eating Disorders And The Media - 799 Words

Eating Disorders and Their Relationship to Images in the Media: Anorexia and Bulimia People around the world are suffering from different eating disorders. Some people simply can’t stop eating which causes overweight. Others, controversially, don’t eat at all causing themselves to end up with hardly treatable eating disorders such as anorexia and bulimia. Such eating disorders are mainly caused by the mass media including advertisements, magazines television and internet. In today s existence, images in the media has huge influence on people and their eating behavior. The mass media has become an indispensable part of our daily lives. People read newspapers, magazines, own television, computer or (and) have access to the internet, so in†¦show more content†¦She can’t and doesn’t want to stop losing weight, and her weight in relation to growth is reduced to dangerous limits. Low weight is maintained by malnutrition or excessive movement. Diagnostic criteria for anorexia nervosa are, among others, a strong fear of weight gain, weight loss below normal BMI (Body Mass Index), a persistent rejection of weight gain and the cessation of menstruation in women. Anorexia nervosa patients often have compulsive ways of organizing nutrition and physical activity. They can, for example, eat only certain foods and strictly avoid the others, and exercise too much. Sometimes the disease with depression precedes the development of anorexia nervosa and even leads to suicide. â€Å"The truth is that when women or girls with severe anorexia attempt suicide, instead of using the action as a possible cry for help or a plea for attention, they genuinely want to die. Therefore, there may be fewer attempts, but far more deaths† (Kofod). Symptoms of bulimia nervosa are repeated bouts of gluttony and the subsequent violent vomiting. Bulimia nervosa is also characterized by an increased fear of spreading and concentrating on weight control. During binge eating, a person with bulimia nervosa feels that she is unable to stop eating or can ‘t control the amount eaten. With the development of technology and the dissemination of mass media, an increase in eating disordersShow MoreRelatedMedia Eating Disorders1607 Words   |  7 Pagesreview is to describe the main causes of eating disorders among teenagers aged 12 to 18 years old in high schools globally, and to also explain to what extend do some of these causes influence eating disoders. Recent studies have indicated a major increase in the eating disorder habits and body dissatisfaction in adolescence over the past few decades. This crisis seems most prevalent in females`` than males with 20 percent high school females exhibiting poor eating habits and about 60 pe rcent undergoneRead MoreEating Disorders and the Media941 Words   |  4 PagesAccording to the National Association of Anorexia Nervosa and Associated Disorders, â€Å"the body type portrayed in advertising as the ideals is possessed naturally by only 5% of American females.† (â€Å"ANAD†) Body image has been a controversial theme because of the influence of the media. It is a widely known fact that eating disorder cases are on the rise. The concept of body image is a subjective matter. The common phrase, â€Å"Beauty is in the eyes of the beholder,† holds true meaning in this sense. One’sRead MoreEating Disorders And The Media3374 Words   |  14 PagesEating Disorders and the Media Eating disorders have become a major problem throughout the world, specifically in the United States. The key factor that has an influence on eating disorders is the media. Including people of all ages and genders, up to twenty-four million people suffer from an eating disorder in the United States (ANAD np). This is a huge problem in the world today but what makes it so much worse is the fact that it can be prevented and it is in our control to change it. Young adultsRead MoreMedia Is The Blame For Eating Disorders844 Words   |  4 Pagesfacebook, snapchat. Today’s media has dominated the way young women see themselves. Young women are constantly comparing themselves to Kendall Jenner, Kim Kardashian, or even their best friend. b. Relevance statement: i. Many people can relate to media being the blame for eating disorders because they’ve either dealt with this or know someone who has had an eating disorder due to what the media says you should look like. c. Thesis statement: i. When thinking of how the media can manipulate your ideaRead MoreThe Effects Of Media On Eating Disorders1034 Words   |  5 Pagesmeal will be. This being said, an estimated 70 million people worldwide suffer from some sort of eating disorders as of 2015 with 30 million being made up of Americans. Eating Disorders can be defined as any eating habit that negatively affects ones overall health. Media has had a large impact on how both males and females see their bodies. A majority of the people who suffer from eating disorders are young adults and teenagers. This can be linked to the pressure put on them to have what societyRead MoreEating Disorders and the Media Essay1287 Words   |  6 PagesEating Disorders and the Media American writer Allen Ginsberg once said: Whoever controls the media-the images-controls the culture. Nothing could be truer, the media has always influenced fashion and body shape. But whats remarkable now is how much the media affects body image, and how willing and eager people are to mess with Mother Nature. (Underwood, par.2) Although there are other factors that contribute to eating disorders the media can partially be blamed for the millions of peopleRead MoreEssay on Eating Disorders and the Media2815 Words   |  12 PagesEating Disorders and the Media Question: How does the media alter the perceptions of adolescents body image? How does this exposure to the ideal body lead adolescents to develop eating disorders? Hypothesis: Media exposure creates an ideal body image that is not easily maintained by most adolescents and causes adolescents to be dissatisfied with their bodies and leads to unhealthy diet habits and other more sever eating disorders. Logic of Study: What if the media was limitedRead MoreMedias Influence On Eating Disorders1767 Words   |  8 Pages â€Å"Dying to be Perfect†: Medias’ Influence on Eating Disorders Poet Allen Ginsberg once said that â€Å"whoever controls the media-the images-controls the culture†, and nothing could be truer than this. Media plays a larger role in society within this generation more than many of us are aware of. It can easily impact people’s lives through aspects such as sports, fashion, movies or hobbies, but unfortunately, one of these impacts is how we view our body. Media constantly posts images and messagesRead MoreEssay on Eating Disorders and the Media6828 Words   |  28 PagesEating Disorders and the Media Doctors annually diagnose millions of Americans with eating disorders. Of those diagnosed, ninety percent are women. Most of these women have one of the two most common types of eating disorders: anorexia nervosa and bulimia nervosa (National Council on Eating Disorders, 2004). People with anorexia nervosa experience heart muscle shrinkage along with slow and irregular heartbeats and eventually heart failure. Along with their heart, their kidney, digestiveRead MoreThe Media Is Responsible For The Increase Of Eating Disorders1452 Words   |  6 Pagesdemonstrate different viewpoints on how the media plays a role in today’s era. My research will study the influence of media on eating behaviors and the significant studies regarding this topic. My paper will also cover the outcomes of media portraying unhealthy body images, weight loss ads, and the influence of the internet encouraging eating disorders. Based on the research, it can be clear that the media is responsible for the increase of eating disorders in today’s society. Therefore, it is important

Wednesday, December 11, 2019

Great Expectation Essay Introduction Example For Students

Great Expectation Essay Introduction In the novel Great Expectations by Charles Dickens, three people have a very firm hold of Pip’s future. The first of these characters is Joe, the kind-hearted young man, who loved Pip very much. Second, Estella, who is the attractive, cold-hearted young lady whom makes Pip love her all his life. Last, Miss Havisham, the lady who raises Estella, and makes her hurt all men, and break their hearts. These three people have much to do with Pip’s destination or expectations as it is so eloquently put. Joe always stood up for Pip. He married Pip’s sister, Mrs. Joe, only because he wanted to have Pip with him. Joe withstood all of Mrs. Joe’s meanness just to be with Pip, even though Pip does not show love towards Joe. Joe is not very intelligent, but he is a strong man. He takes satisfaction in being a blacksmith, and he has pride in himself. He believes in integrity, and he always treats people politely. An example of how Joe treats people is in the beginning of the story, when Pip’s criminal is apprehended. When the criminal says that he is sorry for eating the pie, Joe says, â€Å"God knows you’re welcome to it-so far as it was ever mine!†. Joe helps Pip with anything and he is always with Pip when needed. Joe is one of the characters in this story, that Pip will always recollect. Miss Havisham persuades Pip to tell her what he thinks of Estella, and then taunts him. Her view of love is â€Å"Blind devotion, unquestioning self-humiliation, utter submission, trust and belief against yourself and against the whole world, giving your whole heart and soul to the smite, like she did†. She tells Pip to love Estella. She makes Estella physically attract Pip. Miss Havisham pushes Estella to the limit, and ends up hurting Estella and herself as well. Miss Havisham is the one person in the story that can honestly be called evil.Estella made Pip want to become a gentleman. Miss Havisham had Pip come to her house and play cards with Estella, when he was young. She also, made Estella hurt Pip. She took Estella’s heart, and made her have no feelings at all. Pip continues his visits, until he is apprenticed to Joe. Estella is ashamed of her background and the life that she is living. Miss Havisham has instructed her to hurt the entire male race. Estella says that her heart is cold. She is infatuated by beauty, and is loyal for a time to Miss Havisham. When she wants something, she usually gets it. She uses Pip, to get other men. She also uses other men. Estella thinks of the men hovering around her as, â€Å"Moths and all sorts of ugly creatures hover about a lighted candle. Can the candle help it?. She marries Pip’s rival, Mr. Drummle, who beats her, and lives a hard life. When Estella and Pip meet again, it is at the â€Å"Satis† House. Estella has learned how to love, and what it feels like to be hurt. In conclusion, you can see why these characters emotionally, mentally and physically, controlled Pip’s expectations in life. This novel not only expresses how people had an effect on Pips life, but also give insight to how our friends and family can affect our own expectations in life. In essence this novel is a great learning tool to how we can set our own expectations in life.

Tuesday, December 3, 2019

Refugee blues free essay sample

Refugee blues In this poem, the author have used a ballad form. This poem is lyrical which means it is a lyrics to a song. The poem have two rhyming lines of each stanza with the third line which got repetition and this develops the theme. The title refugee blues holds an emotional intensity, shows the critical of society which the people who doesnt belong to that country. In the first stanza, the word souls shows that it is something holy and valuable and they should be treated all the same like everyone else. The word my dear shows that they are married. However, we dont know whether the wife or the husband is talking. In the third stanza, the sentence in the village churchyard these grows an old yew contrasts with the sentence old passports cant do that, my dear, old passports cant do that as the tree could go through the natures cycle while once the passport is lost, it can never be recovered. We will write a custom essay sample on Refugee blues or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page In the forth stanza, the sentence if youve got no passport youre officially dead shows fear, humiliation and threat. In the sixth stanza, the sentence if we let them in, they will steal our daily bread the word daily bread allusions to the prayer Our Father . The sentence he was talking to me , my dear shows intimate and close. Meanwhile, in the ninth and tenth stanza, the refugee highlights the ridiculous of the situation that they are in by contrasting it with the freedom of the fish swimming in the ocean and the birds singing in the trees. they had no politicians and they werent the human race This poem is a good example of the role poets and their works can play in social change. Auden not only makes readers aware of the refugee plight, but also requires us empathize with understandings. Refugee Blues free essay sample Both Auden and Gray create a sincere illusion of reality to promote the refugee’s alienation and suffering in both stories ultimately bringing the two gripping tales to life. Both Auden and Faulks use imagery as an extremely strong literary device to create alienation towards the refugees in their two stories. Immediately Auden introduces the reader to the impossible situation that the characters that they find themselves in. Auden manipulates social structure and the feeling of alienation towards the refugees with the use of natural imagery. Lines such as â€Å"saw a door opened and a cat let in† and â€Å"Thought I heard thunder rumbling in the sky; †¦ they must die†. These two lines not only show the manner in which the refugees have been regarded as completely inferior but also that they are willed to die, disregarding the concept of escape. In Faulk’s ‘The Last Night’, though not as frequently, also uses natural imagery to highlight the distressing solitude of the refugees and their impossible situation. We will write a custom essay sample on Refugee Blues or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page â€Å" Though none of the scraps reached as far as the enclosure. The word ‘enclosure’ emphasizes how the Jews had been cast aside as ‘social dirt’ as animals are normally associated as being hoarded into an enclosure by human beings. The two pieces ‘Refugee blues’ and ‘The Last Night’ differ significantly in the way that they are written. In Auden’s ‘Refugee Blues’ the story of the refugees is told through a poem with three lines in each stanza. Whereas in Gray’s ‘The Last night’ the structure follows more of a story and is written in the third person. Auden’s poem is written to the tune of blues music, which was very popular and fashionable at the time the poem was written. Say this city has ten million souls, some are living in mansions, some are living in holes. The rhythm created throughout provokes a melancholy atmosphere to be interpreted by the reader enticing compassion towards the refugees and further discriminating and separating the Jewish characters and their race from the rest of the world. Unlike Gray, Faulks writes the ‘The Last Night’ in the form of a historical fiction indicating the lack of a particular rhythm in which the story can be read. These contrasting rhythms though seem to create to same feeling of sadness and empathy towards the characters. Faulk’s choice of diction and literary techniques match with the rhythm and tone of ‘Refugee Blues’ and create a huge similarity between the way the two poems are written to create alienation towards the refugees. Auden and Faulks use foreshadowing both subtly and palpably early on in each text to show what will happen in the near future of the two stories. Faulks in particular manipulates this technique to show upcoming events. In the opening statement â€Å"Andre and his brother Jacob†¦ to a concentration camp† presented in bold for added effect, Faulks immediately introduces the reader to the ignorance and innocence of the children not being able to fully understand their predicament because they are both at such a young age. They do not realise the harsh reality that has befallen them and the rest of the Jews in Europe. As orphaned children they have already been split up from their parents and this can be interpreted as a model for other families who are situated with the two boys. That pain and sorrow will be felt and loneliness endured by all the children going to the concentration camp. Additionally, in the second paragraph of Faulk’s text he speaks of a woman handing out food and people having â€Å"food for the journey†. This can be deduced by the reader as another use of foreshadowing. It was believed that Adolf Hitler was of the Christian religion. This scene of people eating food before the tragic events that ensue are similar and almost mirror that of the last supper, the Christian fable that exists in the bible where Jesus was last before he was crucified and sent to his imminent death. It is seen as the ultimate betrayal in the bible when Judas sold out Jesus to the Romans for thirty silver coins. The connection between the two estranged events though shows that, just like Jesus, the ignorant children are completely unaware of the fact the food being handed out represents to the reader that the end is near as did the last supper for Jesus. This could be seen as the Faulk’s demonstration of Hitler’s somewhat extreme impiety displaying him as Judas even though Hitler was of Christian religion. In ‘Refugee Blues’ Auden writes in his first paragraph â€Å"Yet there’s no place for us, my dear, yet there’s no place for us. † Auden exploits the predicament of the refugees to emonstrate that they are completely alone and segregated from society and they are regarded as substandard population and presages what is to come for the Jews at the conclusion of the poem. With the use of Irony Auden ends the poem on the line â€Å"Looking for you and me, my dear, looking for you and me. † After so much suffering was brought to the refugees by being neglected by people who thought to be superior human beings, they were finally being sought after but only to taken to their inexplicably to their death, meaning that there is still no place for them in the society that they will no longer live in. In conclusion Both W. H. Auden and Sebastian Faulks tell the tragic tales of Jewish Refugees who find themselves in an impossible situation. Their attention to detail is impeccable allowing the reader to be engulfed in the story and empathise with the characters and live the story. Both manipulate certain ideas, themes and literary devices using similar and contrasting ideas to ultimately create a sense of great alienation towards the refugees in each tale.

Wednesday, November 27, 2019

Execution Of Juveniles Essays - Legal Procedure, Trial As An Adult

Execution Of Juveniles Adult Punishment and Juvenile Justice Day after day in this country there is a debate going on about the death penalty and whether we as people have the right to decide the fate of another persons life. When we examine this issue we usually consider those we are arguing about to be older men and women who are more than likely hardened criminals with rap sheets longer than the height we stand (Farley & Willwerth, 1998). They have made a career of crime, committing it rather than studying it, and somewhere along the line a jury of their peers decided enough was enough. They were handed down the most severe and most final punishment of them all, death. Behind all of the controversy that this issue raises lies a different group of people that are not so often brought into the lime light, juveniles. This proposes a problem entangled with another; if we do decide to carry out death sentences, what is the minimum age limit? Can we electrocute, lethally inject, or gas any one who commits a crime that is considered capital? In this paper the issue of capital punishment for juveniles will be discussed, basically laying out a comprehensive look at the matter. First we will briefly look at the history of both juvenile justice and the history of the death penalty in regards to juveniles. Secondly we will take a short look at the two major court cases that dealt with this issue in the United States. Next this paper will present the factual statistics of the death penalty for juveniles and also take a look at our countrys stance on the issue in the international arena. We will then spend a short time looking at some views on the juvenile death penalty, reasons for the death penalty itself, and the arguments for and against the death penalty for juveniles. Lastly we will conclude with a few thoughts about the issue and the implications that we might have to consider. The history of the death penalty being imposed on juveniles spans all the way back to almost the beginning of our country. In 1642, Thomas Graunger of Plymouth Colony, Massachusetts, was the first juvenile, to be sentenced to death and executed in our country for a crime that he committed (Executions, 2000). Since the start of capital punishment (or the recording thereof) in 1608, there has been around 19,200 executions in the United States of all ages. Of that total number, experts believe approximately 356 of them were juvenile executions, meaning that the crime that the individual was sentenced for took place before the offender was eighteen years of age (Gonnerman, 2000). This accounts for about 1.8% of all executions from the start of capital punishment to present (Executions, 2000). Since 1973 there has been 196 death sentences handed out to juveniles and seventeen of those have ended in actual execution (Streib, 2000). Table 1 lists those seventeen individuals that have been executed since 1973, their date and place of execution, their race, and their age both when they committed their crime and when they were executed. The juvenile justice system was born in 1899 at which time it was recognized as separate from the regular justice system that dealt with adult offenders (Ricotta, 1988). At the start, the stated objectives of the juvenile justice system was ...to provide measures of guidance and rehabilitation for the child and protection for society, not to fix criminal responsibility, guilt, and punishment (Ricotta, 1988). By the stated objectives it would seem as though rehabilitation would be one of the most important goals of the juvenile system. So how are we able to decide now that a teenager is past the point of rehabilitation and deserves the final punishment? Or does the obligation to protect society become more overwhelming and leave us with no other option but to put someone to death? These are just a few questions that one might ask about our present goals in comparison to the initial goals that were established from the start. Next we will discuss the two pivotal court cases that set the precedent for our current juvenile death penalty statutes. William Wayne Thompson, only fifteen years of age, and three older persons were all found guilty of first degree murder back in December of 1983. He was convicted of murdering his brother-in-law in a most heinous, atrocious, and cruel (Ricotta, 1988) way. After the district court decided that their was no reasonable prospects for rehabilitation (Ricotta, 1988) it was decided that he would be tried as an adult. The Supreme Court of the United States had to decide

Sunday, November 24, 2019

Alcoholism Example

Alcoholism Example Alcoholism – Term Paper Example Your full full May 02, Alcoholism Alcoholism or Alcohol Dependence Syndrome is a type of chronic disease which is associated with excessive use of alcohol. â€Å"Alcoholism, also called alcohol dependence or alcohol addiction, is a destructive pattern of alcohol use that includes tolerance to or withdrawal from the substance† (Dryden-Edwards). Some of the main elements of alcoholism include craving, physical dependence, tolerance, and loss of control. According to Butcher, Mineka, and Hooley, a person suffering from this disease loses self-control at times, as well as creates various psychological problems for himself/herself. Some key symptoms of alcoholism include shakiness, sweating, neglecting home and job responsibilities, and uncontrollable need for alcohol. Researchers have proved alcoholism to be the major cause of violence and increase in the number of car accidents all over the world. A number of factors make people consume alcohol. Some of those factors include into xication, social influence, mental relaxation, nice taste, and decrease in depression and boredom. The level of intoxication associated with alcohol and the relaxation that people get through alcohol are two of the major factors that make people alcohol addict.Although stopping alcohol addicts from taking alcohol is difficult, but there exist some treatment methods that can be used to make people come back to normal life by leaving alcohol. Some of those methods include relapse prevention, individualized drug counseling, cognitive-therapy techniques, motivational enhancement therapy, and use of stimulus control and urge control techniques. The outcome of these treatment methods is positive most of the times as alcohol addicts start changing their life patterns by stopping or reducing the use of alcohol and alcoholic products.Butcher, James, Susan Mineka, and Jill Hooley. Abnormal Psychology. 14th ed. Boston: Allyn & Bacon, 2009.Dryden-Edwards, Roxanne. â€Å"Alcohol Abuse and Alcoh olism.† Medicinenet.com, n.d. Web. 02 May 2012.

Thursday, November 21, 2019

Hero Essay Example | Topics and Well Written Essays - 1500 words - 1

Hero - Essay Example Major Stryker approaches the two individuals and offers them to join his elite group of mutants, team X. After his first mission, James is not happy of the murders committed by his team-mates and he quits his commando job and falls in love with a local teacher, Kayla Silverfox. He works as a lumberjack and changes his name to Logan. After six years, Logan is approached to rejoin team X, but he declines the offer. In attempting to convince Logan, Stryker sends Victor. To seek Logan’s attention, Victor kills Kayla, and now Logan is seeking revenge. The protagonist in this film is James Logan. In the movie X-men origins: Wolverine, the vengeful and ferocious James Logan presents himself as a tragic hero. First, he was born of noble birth; he was the second son of a rich landowner. Furthermore, he lost his family in a tragic manner. Also, Logan made a poor choice by agreeing to work with Major Stryker. He was desperate to get better than Victor so that he can avenge Kayla’s death. The modification Logan had was definitely a flaw that led to his downfall. The end of this work brought about sympathy for Logan’s condition. The literary work X-men origins: Wolverine screenplay was written by David Benioff and Skip Woods. The plot revolves around the beginning of Wolverine and his driving force of vengeance which leads him to do terrible things like altering his mutation to become stronger and indestructible via a government squad weapon agency (X-Men Origins: Wolverine Trailer). The hero is Logan also known initially as James and later on as Wolverine. The three things that Wolverine does are all driven by emotion due to the life stress that he has gone through. In the movie, Logan does three things all driven by his emotions. They include: killing Thomas Logan; joining a government commando group and after a mission quits it, seeking Victor for revenge of Kayla’s death and allows Stryker

Wednesday, November 20, 2019

Research essay Example | Topics and Well Written Essays - 1500 words

Research - Essay Example While every religion has its claims to salvation all of them contradict each other. Hence either all are wrong or one of them is right since they all cannot be true as well as this would violate the law of non-contradiction thereby making religious pluralism invalid. We can however base the truth of Jesus being the only way to salvation with proof of history, documented reliability of the bible and the resurrection of Christ. The world situation today certainly brings us to a point where we are left to contemplate on our ways and create new means of holding on to our sanity through religious means. This brings us to look upon someone who can show us the way and enlighten us with the truth. Who else can fit the role precisely other than Jesus Christ who has been acknowledged through the ages as the savior of the world. People try to follow their accepted religion with fervor and hope, it is when they fail to attain the peace and happiness that they so long for, that they look for guidance. When they realize that with their own ways and means of adhering to rituals and rites cannot gain satisfaction they reach out to other means of salvation. There are many prophets and teachers who have enlightened the human race with their concepts and ways. But this has failed to change the attitude of people who rebel against religion itself. In the name of religion there has been a phenomenal effort put into creating our own gods and god men who have laid down the rules and rituals to encourage their religion with dynamic zeal all through history. While the pluralistic world has great appeal to most people for its wide tolerance and defiance to back any religion, this is another way for person to live his life without restrictions and boundaries. It is difficult to relate to very different religion like atheistic Buddhism to the monolithic Islam or Christianity. Judging the beliefs and aspects of each

Sunday, November 17, 2019

Answer the Questions Essay Example | Topics and Well Written Essays - 2500 words

Answer the Questions - Essay Example 5) Another advantage is that inter-departmental communication is improved that leads to greater group collaboration and mutual agreement. Organisational harmony and unity is also enhanced because of excellent relationship building. 6) The structure is very much beneficial in problem-solving and decision making because problems related to different operations are resolved by the concerned department personnel. For example, marketing personnel will resolve the issue of declining sales whereas production department will focus on issues about product designing and prototyping. 2) Secondly, the organisation becomes rigid and less adaptable to changes in external environment. Indeed, it may not be possible to make immediate innovations because of delayed approvals from strategic planners. 3) Next, the key decisions by top managers are delayed because information about specific operations flows from down-to-up and up-to-down that wastes sufficient business hours. Staggering losses are incurred in some instances. 6) Employees are not provided general administrative training and thus they can not adjust themselves other than their specific area of interest. For example, a marketer may not be able to perform administrative / management duties even for temporary periods because he is not trained by employers. 1) The internal efficiency within an organization increases in a rapidly changing business environment that demands immediate adjustments. The human resources are used more effectively. As a result, a business organisation becomes highly flexible and adaptable. Customers do not have any inclination to purchase a substandard product because they demand value and satisfaction for money they spend on various goods and services. In fact, every potential buyer is interested in purchasing high quality products to meet its needs / desires and to attain satisfaction. Quality, therefore, can be defined as the ability of a product that meets or exceeds

Friday, November 15, 2019

Human rights education for indian armed forces

Human rights education for indian armed forces HUMAN RIGHTS EDUCATION FOR INDIAN ARMED FORCESCHAPTER INTRODUCTION AND METHODOLOGY When asked what should be done about human rights, the French philosopher Voltaire answered:- â€Å"Let the people know them!† Over the years there has been considerable deterioration in the internal security environment in various parts of our country. JK and NE states have been the theatre of ethnic, regional and state sponsored turmoil for decades for various reasons, the primary one being isolation of the region from rest of the country and the lack of social and economic development of the area. The rise in the law and order problems and failure of the government to control the situation eventually led to the long drawn involvement of the armed forces in the region. The efforts of the security forces to control insurgency and terrorism in the area have brought up the issue of violations of human rights by the security forces. The paradoxical situation now is that while there is an increasing and widespread concern for observance of human rights by the security forces operating in the environment, gross violations of the same by the militant organisations continue unabated. â€Å"Extremist organisations find terror desirable to attract attention whereas counter measures by security forces are restrained when militants blend into the local population, making it impossible to attack their bases or personnel without collateral damage. Here in lies the dilemma for the security forces to conduct operations effectively within the constraints of ethics and the need to respect human rights. (Jasjit Singh) Terrorism and human rights cannot co-exist. They are mutually destructive of each other. Where there is terrorism there cannot be human rights. One of the greatest threats to the future of democracy is terrorism which is increasingly becoming a way of life in the disturbed states. Low intensity conflict operations today includes in its gambit operations against insurgents, militants, terrorists, and any other non state actors that jeopardises national security and sovereignty. The armed forces are being increasingly used in Low Intensity Conflict Operations (LICO) or Counter Insurgency (CI) Operations, which brings it in the media lime light. Certain restrictions have to be imposed on the basic rights of people when combating terrorism, but those restrictions have some norms to be followed. The principles of humanity suggest that military action should not cause unnecessary or disproportionate damage or suffering. When entrusted with a task of this magnitude, human rights violations do take place, but what is important is that the state remains fully aware of its obligations to eradicate the occurrence of such instances and takes prompt measures against the erring personal. It becomes imperative on part of the organisation to educate and train the personals involved in such duties with the basic rights of an individual as a human being and the steps to prevent its violation. METHODOLOGY Statement of the Problem This paper aims to formulate and suggest the Institutionalised Human Rights Education and Training as a means to reduce Human Rights Violations by the Armed Forces operating in low intensity conflict environment. Justification of the Study Human rights now constitute the common heritage of humankind; accordingly, human rights education is a means of accessing that heritage through the universal commitment to the dignity and worth of each human. The evils of injustice, exploitation, impoverishment, tyranny, civil strife, genocide, abuses of power, and catastrophic state failures have plagued humankind from time immemorial and produced humiliation and despair. They also spur action for social and economic transformation, which human rights education helps to define and put into practice. Human rights education reinforces the human rights to peace and to development, that is, the rights of human beings and nations to be free from aggression or other unlawful use of armed force and from mass impoverishment. Genocidal practices and other massive human rights violations are a particular challenge for human rights education. Every human being should be empowered through human rights education to expose and undermine the very possibility of such practices before they emerge and to join with others in ending such practices and holding the perpetrators accountable for their deeds and those who could help accountable for their silence and inaction. The dedication of nation-states and of the United Nations system to human rights education is a first step and the modest efforts pursued during the first United Nations Decade for Human Rights Education (1995- 2004) and this effort must be redoubled by the Armed Forces as a responsible organisation to build stronger solidarities through the message of the dignity and equal worth of every human person. Scope This study focuses on establishing a framework of Human Rights Education and Training to the armed forces in low intensity conflict operations environment. It also attempts to suggest functional parameters that will assist in adopting a universal, holistic and integrated approach to Human Rights. Methods of Data Collection The source of data has been the abundant literature on the subject available in the College Library. A bibliography is appended at the end of the text. In addition to it, explicit use of means of mass media including internet has been made. The thought process of eminent personalities and experts on the subject, both in India and internationally, have also been incorporated as they manifested in Interviews and public shows. Organisation of the Dissertation It is proposed to study the subject in the following manner:- Chapter I. Introduction and Methodology. Chapter II. Human Rights A basic Study. Chapter III. Interplay of Human Rights and Armed Forces in LIC Environment. Chapter IV. Relevance of Human Rights Education for Armed Forces. Chapter V. Approach to Human Rights Education. Chapter VI. Effective Human Rights Training. Chapter VI. Conclusion. CHAPTER II HUMAN RIGHTS A BASIC STUDY Human Rights Evolution of the Concept. In the simplest of terms, human rights could be regarded as involving all those aspects which add to dignity and free existence of human beings. Historians credit the origin of this concept to MAGNA CARTA, AD 1521. On scrutiny however, it would emerge that this document actually was a petition urging the king to concede certain rights to a particular section of his people. It neither had a direct reference to the common mans basic freedom nor the required range of application. The term â€Å"Human Rights† was introduced in the United States Declaration of Independence in 1776 and the US constitution embodied a â€Å"Bill of Rights†. The French resolution later on in 1789, ushered in the Declaration of Rights of Man and Citizen. Much later in 1929, the Institute of International Law, New York, USA, prepared a Declaration of Human Rights and Duties. In 1945, the Inter American Conference passed a resolution seeking the establishment of an international forum for the furtherance of human rights of the whole mankind. The World War II was probably the turning point, which drew the required attention towards human rights. The atrocities committed on ethnic grounds by the axis powers shocked the conscience of the international community. The allied powers then vowed to usher in a world order for promoting respect for the observance of Human Rights and fundamental freedom. The United Nations charter, in its preamble declared, â€Å"we the people of the United Nations Organisation†¦Ã¢â‚¬ ¦..reaffirm faith in the fundamental human rights, in the dignity and worth of human person, in the equal rights of men and women and the Nations large and small†¦..†. The charter then went on to declare that the purpose of the United Nations is, â€Å"to achieve international cooperation in solving international problems of an economic, social, cultural or humanitarian character and in promoting and encouraging respect for human rights and for fundamental freedom for all, without distinction based o n race, sex, language or religion†. The United Nations proclaimed the universal declaration of Human Rights in 1948. The United States defined Human Rights in a policy document in 1978 , which includes the following aspects:- â€Å"Freedom from arbitrary arrest and imprisonment, torture, unfair trial, cruel and unusual punishment and invasion of privacy, rights to food, shelter, health care, education, freedom of thought, speech, assembly, religion, press, movement and participation in Government†. Human Rights The International Endeavour. The United nations Organisation in keeping with its charter to promote respect for fundamental freedom and Human Rights for all without any distinction, came out with an International bill of Human Rights consisting of the following:- Universal Declaration of human Rights, 1948. The International Covenant on civil and Political Rights, 1966. The International covenant of Economic social and cultural rights, 1966. The optional protocol (1966) providing for the right of the individual to petition international agencies. The principles on which this bill was based on are as under:- All human beings have been brought within the scope of this bill, without any distinction. Equality of application without any distinction of race, sex, language or religion. Emphasis on international cooperation for implementation of the bill. UN Declaration of Human Rights. The UN General Assembly on 10 December 1948 approved and accepted the Universal Declaration of Human Rights. Further on 16 December 1966, two covenants were also approved by the UN General Assembly on â€Å"Economic, Social and Cultural Rights† and â€Å"Civil and Political Rights†. These covenants are legally binding and came into force in 1976. Some of the important aspects of UN Declaration are as under:- Right to life, liberty and security of person (Art 3). Right against slavery or servitude (Art 4). No one shall be subjected to torture, cruel, in human or degrading treatment or punishment (Art 5). Equality before Law and equal protection under law (Art 6 and 7). (e) Right to effective remedy against violation of Fundamental Rights (Art 8). Right against arbitrary arrest, detention or exile (Art 9) Right against interference with individuals privacy (Art 10 and 11). Right to a free and fair trial (Art 12). Right to freedom of movement, residence and nationality and to seek asylum in other countries (Art 13, 14 and 15). Right to marry and to form a family (Art 16). Right to property (Art 17). Right to freedom of thought, religion, freedom of opinion and expression (Art 16 and 18). Right to work, reasonable working conditions and to receive equal pay for equal work (Art 23, 24). Right to freedom of peaceful assembly and association and to be a member of a society (Art 20 and 22). Right to a standard of living, conducive for health, well being and social protection (Art 25). Right to education (Art 26). Right to participation in cultural life of community (Art 27). Right to a social and international order in which the right and freedom set forth in this declaration can be fully exercised (Art 28). Human Rights The Scenario in India. India does not have a known convention on human rights. However, India is a signatory to the various conventions proclaimed by the United Nations organisation. Traditionally, Indian culture has always stressed the observance of human rights. Our constitutional founders have given this aspect the due prominence in the form of fundamental rights, which has been embodied as Directive Principles of State Policy. The important aspects are as given below :- Right to equality (Art 14). No discrimination against any citizen based on religion, race, caste, sex etc (Art 15). Right against untouchability (Art 17). Right to freedom. Right to freedom of speech and expression (19(i)(a)) Freedom to assemble peacefully without arms (Art 19(i)(b)). Freedom to form associations (Art 19(i) (c)). Freedom to reside and settle in any part of country (Art 19(i) (f). Freedom in choice of profession (Art 19(i) (f)). Right not to be compelled to be a witness against himself (Art 20(2). Protection of life and personal liberty (Art 21). Protection against arrest and detention (Art 22). Right against exploitation by traffic in human beings, beggary and other similar forms of forced labour (Art 23 and 24). Right to freedom of Religion (Art 25 to 26). Right to move Supreme Court for enforcement of fundamental rights (Art 32). CHAPTER III INTERPLAY OF ARMED FORCES AND HUMAN RIGHTS IN LOW INTENSITY CONFICT ENVIRONMENT â€Å"When the soldier is fighting against an adversary in war, considerations of Human Rights are secondary principles. Practices and usage of war are the best guide. But during peace time employment, in addition to the guidelines laid down in various conventions, it is essential that the environment that the soldier has to operate is clearly understood. -Army Training Note S/1/95 Six decades after our independence, country finds itself beset with terrorism and insurgencies in many states simultaneously. The security forces have been actively involved in counter insurgency operations in Nagaland, Manipur, Mizoram, Tripura, Jammu and Kashmir and more recently, Naxals in as many as twelve other states. Involvement of non state actors in promoting insurgency in our border states is also well established. The insurgencies and terrorism are quite different from a full scale conventional war and thus demand the utmost attention of a government and the people. The counter insurgency operations must differ materially from regular warfare for which armies train and equip themselves. Environmental Realities in LIC More often than not the armed forces are deployed for operations at a very belated stage, when the situation is almost out of control. The prevailing environment that is likely to be encountered by the army therefore assumes a great degree of importance. Some of the salient aspects of the environmental realities are given in the succeeding paragraphs:- Public. There is a prevailing sense of in-security among the general public. People tend to either silently obey the militants or to migrate to safer places. They are very reluctant to cooperate with the security forces. Militants. There is an overpowering cult of the gun and defiance of authority. They acquire sophisticated and lethal weapons by establishing nexus with powers inimical to the state. They have no desire for peaceful negotiations, unless the government out rightly succumbs to their demands. Bureaucracy, Politicians and Judiciary. These come under tremendous pressure because of the constant threat of retribution. Police/Paramilitary Forces. Militants endeavour to induce fear in them through intimidation, and other forms of retribution. This coupled with inadequate equipment and training has adverse effects on the morale and efficiency of these forces. As a result their credibility gets eroded and they fail to induce any confidence among the people. Media. The official media and some of the national dailies are viewed as the mouth piece of the government and its credibility with the masses is usually low. Reporters have scant knowledge of LICO and tend to sensationalise events. Civil Administration. The general conditions prevailing amounts to the civil administration being ineffective and the authority of the government gets eroded with the writ of the militants running supreme. Law of the Land. The law of one state is not always applicable in the other states. This facilitates the militants shifting their bases and operating from areas where they can escape the law. Once certain special laws are enacted, these are portrayed as draconian in a democratic society, thereby providing sufficient cause for propaganda and also drawing attention of the Human Rights Organisations. The militants also thrive on the various existing lacunae in our legal system. Neighbouring States. Inimical neighbours exploit the instable situation to the full extent and resort to waging a proxy war. The Nexus. Militants tend to establish a nexus with identical anti government movements. Even some religious fundamentalist extends their direct support. State and Central Agencies. There is a plethora of state and central agencies operating in such an environment. They usually lack unity of purpose and operate at cross purposes. Impact of Environmental Realities. All these environmental realities given above have an impact on the operations carried out by the army. These are as given below:- The army gets involved when things have gone out of hands of the police/para military forces to handle thereby making their task much more difficult. Operations tend to become long drawn and the army gets involved over protracted periods to effectively neutralise the militants potential. The resources required are also out of proportion invariably. The army invariably has to operate in an intelligence vacuum. Barriers of language pose additional problems. Militants also manage to infiltrate various civil and police organisations compromising security. There is often an absence of clear cut political directive, making it difficult for the army to understand the charter and to evolve its aims, objectives and plans n a long term perspective. There is inadequate cooperation from the local public, bureaucracy and the politicians. Media gets exploited by the militants to discredit the army, thereby imposing great caution on operations by the army. There is a lack of integration between various agencies, thus making problems of coordination acute. Where the militants enjoy public support, willing or forced, it is difficult to sift and isolate the militants from the public. Law of the land often provides great immunity to the militants and imposes numerous constraints on conduct of military operations. Where the inimical neighbours provide active support to the militants, a great deal of effort is diverted to check infiltration of such support. Where Armed Forces Go Wrong. It is now evident that the whole problem is intensified due to proximity of civilians to the area of operations. The following issues form part of the media campaign and cause concern to various Human Rights Organisations:- Curbing of Fundamental Rights. Operations of cordon and search, vehicle checking etc, cause harassment to people. As these operations cannot be done away with, it must be ensured that these operations are done on firm intelligence only to avoid any unwanted fallout. Rape/Molestation. Reports appearing in the media are a min of actuals and the malicious propaganda being launched by militants. Illegal Detention. As per rules, any offender is required to be handled over to the police within 24 hours of apprehension, for filing of a case. Problem arises when due to mistaken identity an innocent citizen is detained by an enthusiastic unit and the legal formalities get delayed due to efforts to extract information by that unit. Fake Encounters. Stage managed encounters in the vicinity of population centres come to the knowledge of human rights organisations. Attack on Civilians. Bomb blasts, proxy actions in populated areas and seemingly intentional killing of civilian population in hostile territory, becomes a media headline, and draws adverse propaganda. Custodial Deaths. In a bid to extract information, no suspect should be tortured. Failure to carry out a medical check up before handing over to the police authorities, could result in reasons for an eventual death of the individual at the hands of the police, being attributed to alleged torture by army prior to handing over. Compensation. All victims should be compensated at the earliest. Rules should be framed on various contingencies and offenders if any should be made to pay compensation, and punished as well. Special powers to the Army. Special powers conferred should be understood in its totality. Legal constraints like carrying police representative for cordon and search operations, frisking of women by women police, signing of â€Å"No Claim† certificates etc have to exercised with due care. Cross Fire Tactics. Militants employ this tactics of firing from a crowd or putting civilians in front of them as shields. Indiscriminate reaction by armed forces will not go well with the media and public at large. Prolonged Operations. Our experience of operations in North Eastern states have amply proved that when units are pressed to achieve quick results and prolonged operations conducted, instead of achieving tangible results, what actually took place was alienation of the population, besides causing discomfort to own troops. â€Å"To extricate information from an apprehended insurgent/militant regarding their crime, intentions, information regarding operations in progress and whereabouts of their bases, some force is required to be used against the norms of human rights. No individual will ever divulge information if treated well.† Lt Gen (Retd) VK Sood, PVSM, AVSM Human Rights Record of Army Indian army has achieved a great degree of success in this genre of conflict due to the highly successful operational style and technique adopted. This is based on a very humane approach of psychological dissuasion and winning the hearts and minds of the population. It is a â€Å"discriminate† approach, in as much as it relies upon large scale application of trained manpower as imposed to indiscriminate use of heavy fire power and airpower. Operations in LIC are complex. The difficulty in identification of the militants and their affinity to the local population, make the task of security forces difficult. In such operations, therefore, a certain amount of human rights violations are likely to take place. The Indian Army however, takes such incidents very seriously, not only because of the violations by themselves being criminal acts, but also due to the fact that it adversely affects the units discipline. ‘The Pledge We are the human rights generation We will accept nothing less than human rights. We will know them and claim them, For all women, men, youth and children, From those who speak human rights, But deny them to their own people. We will move power to human rights CHAPTER IV RELEVANCE OF HUMAN RIGHTS EDUCATION AND TRAINING TO ARMED FORCES Increased awareness of human rights over the last thirty years has led to new standards for state actors in peace and war. Since the Cold War, democratic governments have promoted constitutional reforms aimed at subordinating the military to civilian control and preventing human rights abuses.Militaries have also undergone a self examination to adapt their roles and missions to the changing strategic environment. By and large they have endorsed democratic principles and human rights. In India, we have a commitment by the armed forces to remain subordinated to civilian authority, act within constitutional bounds, and respect human rights. Reflecting changes in national security strategy, the Indian Armed forces need to play a critical role in promoting democracy and human rights. Rooted in a belief that there is an affinity between democratic systems and free market economies, and that democratic states are less likely to go to war with each other, this strategy aims to ensure that regimes consolidate democratic institutions and increase respect for human rights. The incorporation of democracy and human rights as national security policy objectives has been accompanied by operational changes in the role and mission of the forces as per our military doctrine. Existing Human Rights Safeguards Historical Legacy This Humane characteristics of the Indian Army and its soldiers have been exemplified in the history : During the Police Action against Razakars in the state of Hyderabad in 1948. Gen J N Choudhry, commander of the Indian Forces, reminded the Indian troops that they should be absolutely humane while dealing with the local population as they were their own countrymen particularly the woman, children and the infirm. (b) Similarly, in December 1961, after the military operations in Goa the then Chief of the Army Staff in a message to the troops said ‘ In Goa, you are in India and with your compatriots. Your duty is at home. Go and protect the people. Let no one suffer violence. At the end of the operations the then Prime Minister, Pandit Jawaharlal Nehru in his message to the operating forces said â€Å" You, and officers and men serving under your command in Goa Operations, have my warmest congratulations on the splendid way all of you have carried out the allotted task- with efficiency, courtesy and humanity†. (c) As mentioned earlier 93,000 Pakistani troops surrendered in 1971 Bangladesh operations. At the time of surrender Lt Gen J S Aurora gave a solemn assurance that â€Å" The personnel, who surrender, shall be treated with dignity and respect that soldiers are entitled to in accordance with the Geneva Convention and protection shall be provided to the foreign nationals, ethnic minorities and the personnel of West Pakistan origin†. The Indian Army has stood the test of time as regards the Human Rights issue wherever and whenever deployed for counter insurgency or conventional operations. History is on its side to prove the point. After the end of 1971 Indo-Pak war, 93,000 Pakistani soldiers surrendered. While treating the POWs, the Indian Army not only complied meticulously with the Geneva Conventions on POW, but also gave them free access to their friends and relatives in West Pakistan. It also gave them freedom to celebrate their religious festivals. The Indian Army is fully aware of the pitfalls, nuances, implications of Human Rights violations and the resultant adverse effect on its operational efficiency and morale. It has therefore taken comprehensive measures at all levels to safeguard and prevent Human Rights violations in Jammu and Kashmir. The measures undertaken at the macro level to the grass root level of troops operating in LIC operations in Jammu and Kashmir are enumerated in the succeeding parag raphs. Humane Fibre of Indian Soldiers By and large, the basic instinct and reaction of an Indian soldier in most of the situations is to protect the Human Rights and uphold human dignity. The factors responsible for development of this attitude and reaction to a large extent are military discipline, compassion and camaraderie and apolitical entity. Indian Army in Peace-keeping Operations Outside India The contributions of the Indian Army to the Humanitarian cause in United Nations peacekeeping operations outside India is well known, appreciated world wide and well documented. The Indian Army has earned for them the praise and admiration of the warring factions, the United Nations and the Government of their own country. Peacekeeping operations in Korea, Gaza, Congo, Somalia, Cambodia, and Rwanda are some of the shining examples of the legacy of the Indian Army to the Human cause. 30. Human right training has been intensified and efforts to reform military justice in Indian Army have been introduced. While these initiatives have lowered the decibel level between human rights advocates and the military, there is no consensus on their effectiveness. Two crucial dilemmas arise in attempting to harmonize such efforts with other objectives. First, training has met obstacles that limit its impact. The backgrounds of many militaries have afforded them considerable freedom from civilian control while portraying them as guarantors of the state. Another dilemma involves threats such as drug trafficking, organized crime, and terrorism. In most mature democracies responsibility for dealing with such threats falls to civilian institutions. But in much of the country, these challenges have overwhelmed new democratic governments, leading to a call for the army to play a central role. The democratic transition in many nations removed the armed forces from internal security op erations; thus human rights organizations and democracy activists fear that proposed roles and missions will reinforce impunity and lead to a return to violations. There is a greater focus required on incorporating human rights issues in operational training exercises and developing more pragmatic and mission related arguments for respecting them. The Army needs to sponsor a collegium or working group which could compose of representatives of various international and regional organizations and officials with responsibility for human rights training. It will need to produce a consensus document that specifies objectives for doctrine, education and training, internal control systems, cooperation with external control systems, and the delineation of police and military functions. Deliberations earlier have highlighted possibilities and difficulties of reaching a consensus between civil and military representatives on advancing human rights. On the positive side, a relatively detailed consensus does exist. At the same time there are major differences over priorities. Military officers stress education and training as key to improving performance. They acknowledge the importance of incorporating support for democracy and respect for human rights in doctrine. Civilian participants, on the other hand, emphasize the need for both internal and external control mechanisms to ensure accountability for violations. New Threats, Ancient Rights