Wednesday, June 5, 2019
Digital signature
Digital ratifyatureI. IntroductionThe main role of digital signature primitive is to preserve the data honor of electronic archive and to accomplish the requirement of authentication and cheque. Only one signer using his/her hidden get wind generates an ordinary digital signature precis. However, in some practical application, a document requires on the whole(a) free radical members to generate a signature together. These designs are called digital multisignature schemes 2, in which all group members sign the kindred document by using their cloistered keys. The multisignature scheme has three characteristics, summon to 2, 4. For generating an efficient multisignature, the verification cost and the size of a multisignature might be almost as same as that of an ordinary signature. In the past decade, several multisignture schemes were proposed establish on the factorization, discrete logarithm problems or a confederacy of both. Moreover, there are a few schemes proposed based on the identity-based cryptosystem. A normal multisignature scheme is called a multisignature with undistinguished signing authorities, as each group member has the same responsibility for signing the document. However, there are some situations when each member should have his/her own distinguished signing authority 4, 5, 7, and 15. In this case, the multisignature scheme is called a multisignature scheme with distinguished signing authorities For constructing a multisignture scheme with distinguished signing authorities, Harn 4 proposed the first scheme come out with this characteristic. In this scheme, each member only has his/her distinguished signing responsible for his/her subdocument. The partial tone contents can be easily verified without revealing the whole meat. However, Li et al. 9 claimed that Harns scheme is not secure against insider encounter. Moreover, Hwang et al. 7 pointed out that, in the Harn scheme, no evidence could be used to distinguish the signing authorities this is due to the fact that all individual signatures and multisignatures are produced on the same hash digest of all the partial subdocuments. In the same paper, Hwang et al. 7 proposed a scheme based on the Harn scheme. In the expose, they claimed that their scheme overcomes the weaknesses of the Harn scheme. However, this is increasing the cost of generating multisignature. Huang et al. 6 proposed two multisignatures with distinguished signing authorities for sequential and broadcasting architectures. One year later, Yoon et al. 15 showed that Huangs scheme is unsecure since an attacker can do a substance abusers closed book key and forge the multisignature of the scheme on arbitrary message. All of those schemes are based on the factorization or discrete logarithm problems or a combination of both. In 1998, Shamir 12 introduced the concept of an identity-based (ID-based) cryptosystem to simplify the key management problem. In general, the main idea of identity-ba sed cryptosystem is that the public key of a user is inferred from his/her identity. Each user needs to register at a private key generator (PKG) by identifying his/herself before joining the network. Later, the PKG will generate a secret key for that signer which is related to his/her identity. The secret key is sent to the user via a secure channel. Shamir proposed an ID-based signature (IBS) scheme from RSA primitive 11. The security of IBS was not proved or argued until Bellare et al. 1 proved that the IBS is secure against forgeability at a lower place chosen-message attack. In the literature, there is only one ID multisignature with distinguished signing authorities for sequential and broadcasting architectures based on the identity-based cryptosystem. Wu et al. 14 proposed two ID-based multisigntures with distinguished signing authorities, relying on the Wus 13 ID-based multisignature scheme, which however is shown to be unsecure 8. Chien 3 showed that Wu et al. 14 two ID-ba sed multisignatures have the security weakness by two attacks insider attack and partial document substitution attack. More recently, Harn 5 proposed a refreshing efficient ID-based RSA multisignature relying on IBS. Their scheme has constant signature length and verification time independent of the procedure of signers. They proved that their scheme is secure against multisignature collusion attack, adaptive chosen-ID attack and forgeability under chosen-message attack.In this paper, we propose an efficient ID-based multisignature with distinguished signing authorities based Harns multisignature 5. We characterise the Harns scheme to be suitable as a mutlisignature with distinguished signing authorities for broadcasting architecture. We use Wus mechanism of generating a multisignature with distinguished signing authorities only for broadcasting architecture. We suppose that the signing group U1, U2,, Ul , to l the number of signers, want to generate the multisignature for the do cument D which can be divided to meaty subdocuments d1, d2,, dl . The member Uj is only responsible for signing partial subdocumentdj, forj=1,2,,l.The rest of this paper organized as follows. In section 2, we review of Harns multisignature scheme. Section 3, we refer our proposed scheme. The security analysis of the proposed scheme is discussed in section 4. The paper is concluded in section 5. II. Review of Harns efficient identity-based RSA multisignatureA. PKG keysThe PKG picks two random large primes, p and q by run probabilistic polynomial algorithm Krsa, then calculates n=p.q, afterward that chooses a random public key e such that gcde,n=1 and computes the private key d=e-1 modn.B. Multisignature generation1) Signer secret key generationIn this algorithm, the signer gets a copy of his secret key from the PKG through a two-step process1. A signer submits his identity to the PKG.2. The PKG, with its private key d and the corresponding public key e, signs the message digest of the identity, denoted as ij, by generating a secret key gj, such that gj=ijdmod n. 2) Message signingTo generate an identity-based multisignature, each signer carries out the followings steps1. Chooses a random integer rj and computes tj=rje mod n2. Broadcasts tj to all the signers.3. Upon receiving of tj, j=1,2,,l, each signer computes t=j=1ltj mod nand sj=gj.rjh(t,D) mod n4. Broadcasts sj to all the signers.5. After receiving of sj, j=1,2,,l the multisignature component s can be computed as s=j=1lsj mod nThe multisignature for a document D is =t,s.C. Multisignature verificationTo verify a multisignature =t,s of a document D of signers whose identities are i1, i2, , il one verifies the following se=i1.i2.il . th(t,D) mod n (1)If it holds, the identity-based multisignature is valid, otherwise it is invalid.III. Our proposed schemeOur proposed scheme as same is the same as Harns scheme in the model description which follows the model proposed in Micali et al. 10. In our modificatio n, there are two new players a document issuer (DI) and a document collector (DC). The DI is responsible of dividing the document into l smaller subdocuments such that D=d1d2dl and the DC is responsible of accumulate the partial signature and issue the multisignature. A. PKG KeysThe PKG picks two random large primes, p and q by run probabilistic polynomial algorithm Krsa, then calculates n=p.q, after that chooses a random public key e such that gcde,n=1 and computes the private key d=e-1 modn.B. Extract Signer key generation Through this algorithm, a signer collects his private key by dealing with PKG in two steps1. A signer submits his identity to ij the PKG.2. The PKG, with its private key d and the corresponding public key e, signs the message digest of the identity, denoted as ij, by generating a secret key gj, such tha gj=ijdmod n. C. Message signingTo generate an identity-based multisignature with distinguishing signing authorities, each signer carries out the followings step s1. Chooses a random integer rj and computes tj=rjemod n2. Broadcasts tj, htj, djto all the signers and DC. 3. Upon receiving of tj, j=1,2,,l, each signer computes t=j=1ltjhtj, dj mod n H=h(t,D)And generats hisher partial signature sj=gj. rjH.h(tj,dj) mod n4. Broadcasts sj to all the signers and DC.5. DC verifies all partial signatures by retentivity the following sje=ij . tjH.h(tj,dj) (2)5. After that for all sj, j=1,2,,l the multisignature component s can be computed as s=j=1lsj mod nThe multisignature for a document D is =t,sD. Multisignature verificationTo verify a multisignature =t,s of a document D of signers whose identities are i1, i2, , il one verifies the following se=i1.i2.il . tH mod n (3)If it holds, the identity-based multisignature is valid, otherwise it is invalid.E. Correctness s=j=1lsj= j=ilgj. rjH.h(tj,dj) mod n s=g1.g2.gl .j=1lrjH.h(tj,dj) mod nse=g1e.g2e..gle.j=1l. rjH.e.h(tj,dj) mod n se=g1e.g2e..gle. j=1ltjhtj, dj Hmod n se=i1.i2.in.tHmod nIV. Security Analy sisOur proposed scheme is an efficient improvement on Herns multisignature (IBMS), which is suitable to meet the property of distinguishing signing authorities. Therefore, the proposed scheme construct based on Shamir identity based signature (IBS) scheme. Without lost generality, both scheme are proved secure based on RSA cryptosystem, refer to 5, 12. Our proposed scheme inherits the security aspects from its root schemes therefore, those aspects are still applicable and approvable to our scheme.Next, we will discuss some potential and essential attacks against our scheme. Attack 1. An existential forgery under adaptive chosen-message attack, which an adversary attempts to forge a multisignature or a partial signature for a chosen document or subdocument adaptively without knowing any private key.Essentially, the standard Shamir IBS scheme is secure against forgery under adaptive chosen-message attack, according to Berllare et al. 1. Thus, it is easy to get the proposed scheme secu re against this type of attack, due to both schemes having the same identical forms and assuming one-wayness of the underlying RSA crypotsystem. Attack 2. The adaptive chosen-ID attack, which an adversary (adversaries) tries to adaptively choose identity (identities) and forge private key from the PKG, therefore, it can forge a multisignature or partial signature.Harn et al. 5 introduced the concept of the adaptive chosen-ID attack and proved that their IBMS scheme is secure against this attack. Our scheme resembles Harns scheme, this result in our scheme also secure against adaptive chosen-ID attack.V. completion We have proposed an efficient ID-based RSA multisignatures with distinguished signing authorities for broadcasting architecture based on Shamirs IBS scheme and Hern et al. IBMS scheme. The proposed scheme is secure against forgeability under adaptive chosen-message attack and adaptive chosen-identity attack.
Tuesday, June 4, 2019
Advantages of RTL, DTL and TTL Logic circuit
Advantages of RTL, DTL and TTL Logic turnIntroduction of Logic GatesA transparent system accession performs a system of logical operation on one or more logic stimulations and produces a single logic output. The logic normally performed is Boolean logic and is most commonly found in digital laps. Logic gates be primarily implemented electronically victimisation diodes or transistors, scarce jackpot also be constructed using electromagnetic relays, fluidics, optics, molecules, or tear down mechanical elements.In electronic logic, a logic take is represented by a voltage or up-to-the-minute, (which depends on the type of electronic logic in single-valued function). Each logic gate requires power so that it fuck source and authorize menstruums to achieve the correct output voltage. In logic lick diagrams the power is non shown, but in a full electronic schematic, power connections are required.Resistor-Transistor Logic (RTL)Resistor-transistor logic gates workout Tra nsistors to combine multiple infix signals, which also amplify and invert the resulting combined signal. Often an additional transistor is include to re-invert the output signal. This combination provides clean output signals and either in stochastic variable or non-inversion as needed.RTL gates are almost as simple as DL gates, and remain inexpensive. They also are handy because both normal and inverted signals are often available. However, they do draw a signifi faecal mattert amount of current from the power supply for individually gate. Another boundsation is that RTL gates cannot switch at the high speeds used by todays computers, although they are still useful in slower applications.Although they are not designed for linear operation, RTL merged lots are abouttimes used as inexpensive small-signal amplifiers, or as interface devices among linear and digital circuits.RTL Logic CircuitResistor-transistor logic (RTL) is a class of digital circuits built using resistors as the input network and bipolar pairing transistors (BJTs) as switching devices. RTL is the earliest class of transistorized digital logic circuit used other classes include diode-transistor logic (DTL) and transistor-transistor logic (TTL).Advantages of RTL Logic circuitThe primary returns of RTL applied science was that it involved a minimum number of transistors, which was an important consideration before integrated circuit technology (that is, in circuits using trenchant components), as transistors were the most expensive component to produce. Early IC logic production (such as Fairchilds in 1961) used the same approach briefly, but quickly transitioned to higher-performance circuits such as diode-transistor logic and then transistor-transistor logic (starting 1963 at Sylvania), since diodes and transistors were no more expensive than resistors in the IC.LimitationsThe obvious disadvantage of RTL is its high current dissipation when the transistor conducts to overdrive the ou tput biasing resistor. This requires that more current be supplied to and heat be removed from RTL circuits. In contrast, TTL circuits minimize both of these requirements.Lancaster says that integrated circuit RTL NOR gates (which have one transistor per input) may be constructed with any reasonable number of logic inputs, and gives an example of an 8-input NOR gate.A standard integrated circuit RTL NOR gate can drive up to 3 other similar gates. Alternatively, it has enough output to drive up to 2 standard integrated circuit RTL buffers, each of which can drive up to 25 other standard RTL NOR gates.Diode-Transistor Logic (DTL)By letting diodes perform the logical AND or OR course and then amplifying the result with a transistor, we can avoid or so of the limitations of RTL. DTL takes diode logic gates and adds a transistor to the output, in order to provide logic inversion and to restore the signal to full logic levels.Diode-transistor logicDiode-Transistor Logic (DTL) is a class of digital circuits built from bipolar junction transistors (BJT), diodes and resistors it is the direct rootage of transistor-transistor logic. It is called diode-transistor logic because the logic gating function (e.g., AND) is performed by a diode network and the amplifying function is performed by a transistor (contrast this with RTL and TTL).OperationWith the simplified circuit shown in the picture the negative bias voltage at the subject is required to prevent unstable or invalid operation. In an integrated circuit version of the gate, two diodes replace R3 to prevent any subject current when one or more inputs are at low logic level. Alternatively to improver fan-out of the gate an additional transistor and diode may be used. The IBM 1401 used DTL circuits almost identical to this simplified circuit, but solved the base bias level problem mentioned above by alternating NPN and PNP based gates operating on different power supply voltages instead of adding extra diodes.Adv antages of DTLOne advantage of digital circuits when compared to analog circuits is that signals represented digitally can be transmitted without degradation due to disagreement. For example, a continuous audio signal, transmitted as a sequence of 1s and 0s, can be reconstructed without error provided the noise picked up in transmission is not enough to prevent identification of the 1s and 0s. An hour of harmony can be stored on a compact disc as about 6 billion binary digits.In a digital system, a more precise representation of a signal can be obtained by using more binary digits to represent it. While this requires more digital circuits to process the signals, each digit is handled by the same kind of hardware. In an analog system, additional resolution requires fundamental improvements in the linearity and noise charactersitics of each step of the signal chain.Computer-controlled digital systems can be controlled by software, allowing new functions to be added without changing hardware. Often this can be done outside of the pulverisation by updating the products software. So, the products design errors can be corrected after the product is in a customers hands.Information storage can be easier in digital systems than in analog ones. The noise-immunity of digital systems permits data to be stored and retrieved without degradation. In an analog system, noise from aging and wear degrade the information stored. In a digital system, as long as the total noise is below a certain level, the information can be recovered perfectly.DisadvantagesIn some cases, digital circuits use more energy than analog circuits to accomplish the same tasks, thus producing more heat. In portable or battery-powered systems this can limit use of digital systems.For example, battery-powered cellular telephones often use a low-power analog front-end to amplify and tune in the radio signals from the base station. However, a base station has grid power and can use power-hungry, but very flexible software radios. Such base stations can be slow reprogrammed to process the signals used in new cellular standards.Digital circuits are sometimes more expensive, especially in small quantities.The sensed populace is analog, and signals from this world are analog quantities. For example, light, temperature, sound, electrical conductivity, electric and magnetic fields are analog. Most useful digital systems mustiness translate from continuous analog signals to discrete digital signals. This causes quantization errors. Quantization error can be reduced if the system stores enough digital data to represent the signal to the desired distributor point of fidelity. The Nyquist-Shannon sampling theorem provides an important guideline as to how much digital data is needed to accurately portray a given analog signal.In some systems, if a single piece of digital data is lost or misinterpreted, the meaning of large blocks of related data can completely change. Because of the cliff effect, it can be difficult for users to tell if a particular system is right on the edge of failure, or if it can tolerate much more noise before failing.Digital fragility can be reduced by designing a digital system for robustness. For example, a parity bit or other error management method can be inserted into the signal path. These schemes help the system detect errors, and then either correct the errors, or at least ask for a new copy of the data. In a state-machine, the state transition logic can be designed to catch groundless states and trigger a reset sequence or other error recovery routine.Embedded software designs that employ Immunity Aware Programming, such as the practice of filling unused program memory with interrupt instructions that point to an error recovery routine. This helps guard against failures that corrupt the microcontrollers instruction pointer which could other than cause random code to be executed. Digital memory and transmission systems can use techni ques such as error detection and correction to use additional data to correct any errors in transmission and storage.On the other hand, some techniques used in digital systems make those systems more vulnerable to single-bit errors. These techniques are acceptable when the underlying bits are reliable enough that such errors are highly unlikely.TTL Logic CircuitTransistor-transistor logic (TTL) is a class of digital circuits built from bipolar junction transistors (BJT) and resistors. It is called transistor-transistor logic because both the logic gating function (e.g., AND) and the amplifying function are performed by transistors (contrast this with RTL and DTL).TTL is notable for being a widespread integrated circuit (IC) family used in many applications such as computers, industrial controls, test equipment and instrumentation, consumer electronics, synthesizers, etc. The designation TTL is sometimes used to mean TTL-compatible logic levels, even when not associated directly with TTL integrated circuits, for example as a label on the inputs and outputs of electronic instruments.*TTL contrasts with the preceding resistor-transistor logic (RTL) and diode-transistor logic (DTL) generations by using transistors not only to amplify the output but also to isolate the inputs. The p-n junction of a diode has considerable capacitance, so changing the logic level of an input connected to a diode, as in DTL, requires considerable time and energy.As shown in the top schematic at right, the fundamental concept of TTL is to isolate the inputs by using a common-base connection, and amplify the function using a common emitter connection. Note that the base of the output transistor is driven high only by the forward-biased base-collector junction of the input transistor. The second schematic adds to this a totem-pole output. When V2 is off (output equals 1), the resistors turn V3 on and V4 off, resulting in a stronger 1 output. When V2 is on, it activates V4, driving 0 to t he output. The diode forces the emitter of V3 to 0.7 V, art object V4 base-emitter junction and V2 collector-emitter junction pull its base to a voltage 0.7, turning it off. By removing pull-up and pull-down resistors from the output stage, this allows the strength of the gate to be increased without proportionally affecting power consumption.TTL is particularly well suited to integrated circuits because the inputs of a gate may all be integrated into a single base region to form a multiple-emitter transistor. Such a highly customized part might increase the cost of a circuit where each transistor is in a separate package, but, by combining several small on-chip components into one larger device, it conversely reduces the cost of implementation on an IC.As with all bipolar logic, a small current must be drawn from a TTL input to ensure proper logic levels. The total current drawn must be within the capacities of the preceding stage, which limits the number of nodes that can be con nected (the fanout).All standardized common TTL circuits operate with a 5-volt power supply. A TTL input signal is defined as low when between 0V and 0.8V with respect to the ground terminal, and high when between 2.2V and 5V (precise logic levels vary slightly between sub-types). TTL outputs are typically restricted to narrower limits of between 0V and 0.4V for a low and between 2.6V and 5V for a high, providing 0.4V of noise immunity. Standardization of the TTL levels was so ubiquitous that complex circuit boards often contained TTL chips made by many different manufacturers selected for availability and cost, compatibility being assured two circuit board units off the same assembly line on different incidental days or weeks might have a different mix of brands of chips in the same positions on the board repair was possible with chips manufactured days (sometimes over a decade) later than original components. Within usefully broad limits, logic gates could be treated as ideal Boo lean devices without vex for electrical limitations.Advantages of TTL Logic circuitAdvantages of TTL logic family, one should have a basic idea about RTL, DTL etc. Diode logic (DL) uses diodes to implement logical functions like AND and OR. But the disadvantage is that it can not perform NOT operation. As AND and OR are not complete functions by themselves, they can not perform several logic functions without NOT. Hence, there was a need for some device which can perform a NOT function as diodes can not. That device is a transistor. Then came the DTL which uses a transistor along with diodes. As a transistor can act as an inverter, NAND (NOT-AND) NOR (NOT-OR) operations can be performed. But this logic uses several diodes which will slow down its operation. Due to the delay offered by them, the logic levels may sometimes change i. e. 0 t0 1 or 1 to 0. Then came TTL. This logic uses a multi emitter transistor, a transistor with many emitter terminals. As every emitter is nothing bu t a diode, this logic eliminates the use of all diodes. This is the major advantage.As transistor becomes ON and OFF much rapidly than a diode, switching time will be faster.TTL, or Transistor-transistor logic replaced resistor-transistor logic, and used much less power. The TTL family is very fast and reliable, and newer faster, less power-consuming, etc. types are always being developed.In TTL (Transistor-Transistor Logic), think that the device using this technology is made from several transistors. Another advantage is that many more chips employ thisREFRENCESwww.wikipidia.comwww.google.comwww.sparnotes.com
Monday, June 3, 2019
Introduction To Bulk Carriers And Cargo Operations Engineering Essay
Introduction To people Carriers And Cargo cognitive operations Engineering EssayIntroduction to great deal CarriersBulk Carriers argon designed primarily for the transportation of solid bulk weightes. Leading bulk loades are coal, iron ore, phosphate, nitrate and grains such as wheat. The rigging of load in bulk reduces packaging costs and freightage and unloading operations can be speeded up.In m whatever reasons bulk freight ratees are plunge in countries away from where they are postulate.Bulk carriers are built to various sizes and classified as Handymax/Panamax/Cape-sized bulkers etc. They also vary in causas analogous accommodate bulkers, self-unloaders, combination carriers etc.Bulk carriers today form a high percentage of world trade. Bulk cargoes carried by them are subject to hazards because of which there are various codes in place for the risklessty of operating Bulk Carriers. They comprise of the BC Code, International Code for the Safe Carriage of Grain in Bulk (International Grain Code). Like the original grain rules, the Code is to pr level(p)t the particular qualities of grain threatening the stability of moves when it is carried in bulk.The revised BC Code deals with types of cargoes which whitethorn liquefy, materials which be possessed of chemical hazards, and materials which f alone into n both of these categories but whitethorn nevertheless cleave separate dangers. The Code highlights dangers associated with authorized types of cargoes giving information on their properties and how to allot them. Various test influences are stated as well to determine properties of the cargo.The Code also lays importance on how cargoes should be properly distributed so as not to overstress the structure and detect an adequate standard of stability. each(prenominal) bulk cargoes when loaded turn over an angle or repose which determines if the cargo is devoted to defect. Unlike high dense cargoes such as iron ore cargoes like grai n have a low angle of repose whereby the code states precautions to see so that the cargo movement does not affect the vessels stability.For cargoes with low angle of repose, the Code states that such cargoes should be trimmed reasonably and the holds should be filled full as far as possible with bechance out resulting in excessive weight on the supporting structure.Thetrimming also military services to cut oxidation by decrease the surface area unresolved to the atmosphere thus preventing spontaneous combustion.The code states dangers related with different types of cargoes, like some cargoes are liable to oxidation where as others may emit toxic fumes without oxidation or when compress. The code gives details of precautions that should be taken for these types of cargoes.The Code also gives details of the various have procedures and tests which should be used before transporting concentrates and similar materials and also recommended test procedures to be used by laborator ies. A list of cargoes, which may liquefy is contained in vermiform appendage A to the Code, maculation appendix B gives an extensive list of materials possessing chemical hazards. Appendix C deals with bulk cargoes which are neither liable to liquefy nor possess chemical hazards. More detailed information concerning test procedures, associated apparatus and standards, which are referred to in the Code are contained in appendix D. indispensability Schedules for those materials listed in appendix B are contained in appendix E. Recommendations for entering cargo spaces, tanks, pump rooms, fuel tanks and similar enclosed compartments are shown in appendix F. Procedures for gas observe of coal cargoes are contained in appendix G.Works CitedIsbester, J (1993), Bulk Carrier PracticeIMO, (2004), BC CodeShip/Shore Safety checklist for loading or unloading dry bulk cargo carriersDate.Port.. Terminal/Quay..Available depth of weewee in berth..Minimum air order of payment.Ships name.Arri val draught (read/calculated).Air draught....Calculated departure draught..Air draught....The master and terminal manager, or their representatives, should terminated the checklist jointly. Advice on points to be considered is condition in the accompeverying guidelines. The safety of operations requires that all questions should be answered affirmatively and the boxes ticked. If this is not possible, the reason should be given, and agreement reached upon precautions should be taken between channelize and terminal. If a question is considered to be not applicable write N/A, explaining why if appropriate.SHIP TERMINALIs the depth of the water at the berth,And the air draught, adequate for theCargo operations to be completed?Are mooring operations adequate forall local effects of tide, current,Weather, traffic and craft alongside?In emergency, is the enthral able to leavethe berth at each time?Is there safe access between theShip and the wharf?Tended by ship/terminal(cross out as a ppropriate)Is the concur ship or terminalcommunications arrangement operative?Communication methodLanguageRadio transmit/phone numbers.SHIP TERMINALAre the liaison contact persons duringoperations positively identified?Ship contact personsShore contact person(s).. office..Are adequate crew on board, andadequate staff in the terminal, foremergency?Have every bunkering operations beenadvised and agreed?Have any(prenominal) intended repairs to wharf orship whilst alongside been advisedand agreed?Has a procedure for reporting andrecording damage from cargooperations been agreed?Has the ship been provided with copiesof port and terminal regulations,including safety and pollutionrequirements and details ofemergency services?Has the shipper provided the masterwith the properties of the cargo inaccordance with the requirements ofchapter VI of SOLAS?13. Is the atmosphere safe in holds andenclosed spaces to which access maybe required, have fumigated cargoesbeen identified, and has the ne edfor monitoring of atmosphere beenagreed by ship and terminal?Have the cargo handling capacityand any limits of travel for eachLoader/unloader been passed tothe ship/terminal?Loader.Loader.Loader.Has a cargo loading or unloading planbeen calculated for all stages of loading/deballasting or unloading/ballasting?Copy lodged withSHIP TERMINALHave the holds to be worked been clearlyidentified in the loading or unloading plan,showing the sequence of work, and thegrade and tonnage of cargo to betransferred each time the hold is worked?Has the need for trimming of cargo inthe holds been discussed, and have themethods and finis been agreed?Do both ship and terminal understand andaccept that if the ballast programmebecomes out of step with the cargooperation, it will be necessary to suspendcargo operation until the ballast operationhas caught up?Have the intended procedure for removingcargo equilibriums lodged in the holds whileunloading, been explained to the shipand accepted?20. Have th e procedures to adjust the final trimof the loading ship been decided andagreed?Tonnage held by the terminalconveyer systemHas the terminal been advised of the timerequired for the ship to prepare for sea, oncompletion of cargo work?THE ABOVE HAS BEEN AGREEDTime DateFor ship. For terminal..Rank.. Position/Title.Works CitedIMO, (1998), BLU Code, pp.22-25GYPSUMA natural hydrated calcium sulphate. Insoluble in water. It is loaded as a ticket powder that aggregates into lumps. Average moisture content is 1% to 2%.CharacteristicsAngle of reposeBulk density(kg/m3)St. Factor (m3)N.A.1282 to 14930.67 to 0.78SizeClassGroupUp to 100mmN.A.CHazardNo special hazard.This cargo is non-combustible or has a low fire-risk.Hold cleanlinessNo special requirement.Weather precautionsThis cargo is to be kept as dry as possible. It shall not be handled during precipitation. All non working holds in which the cargo is loaded or to be loaded to be kept closed. encumbranceTrim in accordance with sections 4 5 of the IMSBC CODE.PrecautionsNo special requirements.VentilationNo special requirements.CarriageNo special requirements.DischargeNo special requirements.Clean upPrior to washing of this cargo, decks and cargo spaces should be shovelled and swept clean because washing of the cargo is difficult.Loaded voyageHatch covers should be secured battened pop out for sea and water tight.Booby hatches holds ventilation flaps to be secured and should be water tight.Works Cited(2009), IMSBC Code, pp. 176Information Provided by ShipperPrior to loading of any cargo the shipper provides the master with information necessary for the safe prep and supervision of loading of the cargo. A declaration is made by the shipper related to the cargo in compliance with the recommendation of the BC Code. Along with the MSDS, information provided consists ofShippers nameReference numbersConsigneeDescription of cargo (type of material/particle size etc.)Stowage conveySpecification of cargo (IMO class, Ems N o. Etc.)Angle of reposeChemical propertiesRelevant special properties of cargoAdditional security systems, if required such as TML and moisture content, unsusceptibility certificate etc.Works CitedIMO, (1998) BLU Code, pp. 32MSDS FOR GYPSUM1. Product IdentificationSynonyms Alabaster, Gypsum stone, Land plaster, Calcium Sulfate Dihydrate, Native calcium sulphate.CAS No. 13397-24-52. Composition/Information on IngredientsIngredient CAS No Percent HazardousGypsum 13397-24-5 90 99% No3. Hazards IdentificationToxic Harmful by inhalation (contains crystalline silica).Mineral Formulae CaSo42H2OEmergency OverviewIt is an off white, odourless powder. It is not combustible or explosive. Short term video to the powder poses no hazard.Potential Health Effects-Inhalation may causes irritation to the respiratory tract and choking depending on the degree of mental picture.IngestionDo not ingest. Small quantities are not known to be noxious but large quantities can cause an obstruction causi ng pain in the digestive tract.Skin ContactMay cause irritation, dry scramble and discomfort. warmheartedness ContactMay cause immediate or delayed irritation or inflammation. With large amounts it can cause eye irritation, redness. Eye exposure requires immediate first aid.Chronic Exposure (inhalation)The product contains crystalline silica which with prolonged or repeated inhalation can cause disabling and mortal lung disease.Silicosis (prolonged inhalation of crystalline silica) increases risk of tuberculosis.Some studies show an increased incidence of chronic kidney disease and end stage renal disease in workers exposed to respirable crystalline silica.Medical Conditions aggravated by exposureIndividuals with lung disease can cause aggregation by exposure.4. First Aid MeasuresInhalationRemove to seraphic air. Seek medical upkeep for discomfort or if coughing.IngestionDo not induce vomiting .If conscious have person drink rush of water. Get medical attention.Skin ContactWash with cool water and mild skin detergent. Seek medical attention for rash, irritation and prolonged exposed exposure to wet gypsum.Eye ContactImmediately flush eyes with water for at least 15 minutes, including lower eyelids. Seek medical attention for abrasions and burns.5. Fire Fighting MeasuresFirePoses no fire related hazard.General HazardAvoid breathing trunk.Fire Extinguishing MediaUse any means suitable for extinguishing surrounding fire.Fire fighting EquipmentA SCBA is recommended to limit exposures to combustion products when fighting any fire.6. Accidental Release Measures.Put spilled material in a container. Avoid actions causing it to become mobile. Avoid inhalation and contact with skin. Wear appropriate PPE at all times. Do not wash gypsum subdue sewage and drainage systems.7. Handling and StorageGeneral Keep bulk gypsum dry until used. Engulfment hazard. To prevent burial or suffocation, do not enter imprisoned space. Gypsum can build up or adhere to walls of conf ined space. It can release or fall unexpectedly. Do not stand on stockpiles of gypsum, they may be unstable.Usage Cutting, crushing, sanding or other crystalline silica bearing materials will release respirable crystalline silica.Housekeeping Avoid actions causing the gypsum to become airborne during clean up. Use all appropriate measures of dust control or suppression.Clothing Promptly adjourn and launder clothing that is dusty or wet with gypsum. Wash skin after exposure to gypsum.8. Exposure Controls/Personal ProtectionEngineering ControlsUse local exhaust or other suppression methods to maintain dust levels.Skin ProtectionWear protective gloves, boot covers and clean body-covering clothing. Remove clothing and protective equipment that becomes saturated with wet gypsum and wash exposed areas.Eye ProtectionWear approved safety goggles when handling dust or wet gypsum to prevent contact with eyes. Wearing contact lenses under dust conditions is not recommended.Respiratory Protect ion Under ordinary conditions no respiratory protection is required. Wear a approved respirator when exposed to dust preceding(prenominal) exposure limits.9. Physical and Chemical PropertiesAppearanceWhite or off-white powder.OdourNoneSolubility in waterNegligibleSpecific temperance2.3 g/cm3pH5-8Boiling Point1000 CFreezing PointNone, solidVapour DensityNA.Vapour PressureNA.Evaporation RateNA.10. stableness and ReactivityStabilityStable. Avoid contact with incompatible materials.Hazardous DecompositionDecomposes to sulphur oxide and calcium oxide above 1450 CHazardous PolymerizationNone.IncompatibilitiesGypsum is incompatible with acids. It contains silicates which may react with powerful oxidizers such as fluorine, chlorine trifluoride and oxygen difluoride.11 and 12. Toxicological and Ecological InformationRefer to contact information provided.13. Disposal Considerations slash of waste and containers in compliance with applicable Federal, state, provincial and local regulations.W orks Citedwww.lafarge-na.com (Accessed 16 November 2010)PREPARATION OF HOLDSOn completion of footrace the mate decides on the procedure for clean of the holds on basis of time, manpower and next cargo to be loaded. Some cargoes require certain precautions in relation to cleaning of the holds. Gypsum on the other had requires no special preparation.Prior to commencement of cleaning it should be ensured that minimum amount of cargo is left behind by the stevedores. In the early stages of discharge of cargo like wheat when there are interruptions crew members can be sent into the hold to clean positions high under the deck leave which will not be accessible during the later stages. This should only be done when there is no cargo working in the hold and it has been find that there is no risk to the crew members.Before commencing work it should be ensured the cargo space is fully ventilated and a Permit to Work obtained.All crew to have proper PPE and safety equipment.The holds are t o be swept prior washing in a manner whereby creating minimum dust clouds. The damage should be checked so that no cargo has gotten in to them and if required get out the cargo before the completion of discharge.The stevedores should be requested to remove the sweepings gathered by the crew. If for reasons it is not possible it should then be stored in drums and kept ready for lifting by the ships cranes.When it is clear and permissible(taking account of the weather) to use the ships cranes the sweepings should be hoisted from the holds and stored on deck until such time when it would be possible to tip it overboard.Washing of holds is carried out by using sea water .Hand held hoses are used for this along with a water cannon. This combination uses compressed air to inject more pressure into the water from the mains. This provides a powerful jet which helps in better cleaning reaches high extremities of the holds. The washing sequence starts at the top of the holds and works down t owards. Simultaneously a separate party of seamen will wash the hatch covers and comings with the help of hand held hoses. During this process the water should not be allowed to accumulate on the tank top. The bilges should be run continuously. A slight list to either side and maintaining a stern trim is the most effective method to aid in washing.Communication should be maintained with the bridge or the cargo control room to aid with the above. Once the higher extremities of the holds are washed the tank top is then hosed down to wash off the cargo residue and any dirt. The sounding pipes should also be flushed during washing as neglect of this over time causes the pipes to become blocked.When the salt water washing is complete traces of salt remain on the surface of the hold. If this is allowed to remain it helps in corrosion and is also not acceptable by most surveyors which is why the holds should be rinsed with refreshful water. This rinsing also aids in accelerating the dryin g process.The drying of holds is usually carried out by natural ventilation, time permitting. If vessel is at sea and the waters are relatively calm the hatches can be opened up to speed up the process. The puddles formed by depressions in the tank top are sponged or mopped up by the crew. The water accumulated between the manhole surface and the lid will also have to be dried.The hold bilges should be drained of the unpumpable water, cleaned along with the strum boxes and then dried as well.Once the holds have dried an inspection should be carried out. Loose rust scales if found should be scrapped and cleared. Look for any cargo residue which may be spotted from the hold ladder high up. Bulk heads, tank tops are clean to touch. Look for any residues beneath manhole cover plates and behind pipes.Outlets for the CO2 system should be checked to ensure they are not blocked.If time permits DB tanks can be pressed up to check for any leakages in the holds. Holds to be also checked for d amages in case they were missed out during discharge and if found recorded. to a fault if any maintenance as per the PMS or repair work needs to be carried out should be attended to, time permitting and recorded.A field glass test or a hose test can be carried out to check the water tight integrity of the hatch covers and any repairs if required and then logged.The final preparation would consist of resealing the manhole covers with duct tape. The bilge plate should be bur lapped and replaced to prevent the cargo from falling into the bilge. This system also allows the water to drain in the bilge.In the hold used for heavy weather ballast the gaskets along with the bolting of the watertight cover plate over the ballast suction should be checked.Works CitedSouth Tyneside College Notes.Isbester, J (1993), Bulk Carrier PracticeHAZARDS ASSOCIATING WHEAT GYPSUM PRECAUTIONSWheatIs capable of self combustion due the gases given off. spread out is a major factor as it can affect person nel on deck with regard to respiration and cause irritation if it goes into the eyes.On exposure to wheat dust, personnel may also suffer from wheat rash.It can also affect the ships ventilation system if proper filters are not in place.The free flowing characteristics can reduce stability of a vessel caused by free surface effect (in partially filled holds) similar to liquids in partially filled tanks. Due to movement of the vessel the wheat is likely to shift to a side causing a list or even a possibility of capsizing the vessel.In cases where wheat requires fumigation in the form of pellets, gases or sprays all personnel to be made aware of the poisonous characteristics they pose and precautions to be taken.PrecautionsAll personnel on deck during cargo operations to be donned with proper PPE at all times, including disposable dust masks and safety goggles. despatch to be carried out as low as possible in holds to minimise dust.Wheat cargo has to be kept dry at all times and any f orm of water ingress has to be avoided to prevent damage to the cargo.As far as possible wheat should be avoided world loaded by partially filling holds.Where a vessel has partially filled holds she should be trimmed level in order to prevent shift of cargo.The surface of the partially filled holds should be secured by approved methods as mentioned in the IMO-grain rules. These methods used are strapping, lashing, saucering, over stowing and securing with wire mesh.In case fumigation is to be carried out on board the master is to be provided about details and precautions to be taken. The spaces to be fumigated have to have warning signs displayed. It is to be carried out by competent shore personnel.In cases where ships staffs presence is required during this operation, it has to be ensured that adequate respiratory protection is worn.Ventilation is required to a great extent to prevent condensation and removal of heat.The total weight of wheat should not exceed one-third of the sh ips deadweight.GM of 0.30 meters to be maintained or as given by formulae in the BC Code, whichever is greater.During discharge precautions to be taken by stevedores when using hydraulic equipment and grabs so that oil from such equipment does not damage the cargo.GypsumThis type of cargo is generally not classified as a hazardous cargo.Airborne dust may cause irritation or inflammation to eyes.It could be harmful by inhalation depending on the level and duration of exposure as it contains crystalline silica.It could also cause skin discomfort to a certain level.It poses an engulfment hazard are personnel are advised not to stand on stock piles.It can also adhere to walls and can collapse and fall unexpectedly.PrecautionsAll personnel on deck during cargo operations to be donned with proper PPE at all times, including disposable dust masks and approved safety goggles.Actions to be avoided which can cause gypsum to become airborne.Bulk gypsum is to be kept dry until used as it tends to cake when in contact with water.It is recommended not to wash gypsum down sewage and drainage systems.Works Citedwww.lafarge-na.com (Accessed 16 November 2010)South Tyneside college notesMCA, MGN 284 (M+F)Swadi, D (2nd Edtn.), Cargo NotesIMO, International Grain CodeLIFTING PLANTIn order to have any equipment or machinery working effectively on board vessels a Planned Maintenance System should be in place and in effect. From an inspection of this maintenance record it is easy to keep track of details like when was the maintenance done last, what was done, when is it due next, what materials are required, how many man hours etc.The reason for this planning is so that we have the necessary tools, spares and consumables on board in advance prior to undertaking maintenance. The basic requirements of lifting plants are-To keep the equipment in safe and intelligent working orderTo maintain supporting documentation for the above.The main aspects of lifting plant maintenance areRoutine Inspection and MaintenanceIn addition to statutory inspections routine inspections are to be carried out by a competent person to asses if the plant is safe for continued use looking for problems like cranny at welds.Damaged/Missing grease nipples.Hydraulic oil leakage from motors.Worn or damaged wires.Corrosion.Missing markings.Lack of greasing and oiling.Defects to structure and fittings.Swivels that may not be rotating freely.Loose connection and gap between rails.All maintenance is carried out as per manufacturers instructions which also specify the time period (e.g. Weekly, monthly, p.a. and before and after use).Prior to operation all control units, alarms, limit switches and joysticks should be operated and checked. If the plant is in regular use checks required by the external surveys should be done more by ships competent staff more often than once a year, even thou regulations require only an annual survey.Operation by deft PersonnelAll vessels lifting plant should be op erated by trained and certified personnel to avoid damages and improper use of the equipment. Trained personnel should also be appointed to direct the plant operator using approved hand signals as contained in COSWP.Testing Of Lifting PlantAs per the manufacturers instructions the testing and certification of the lifting plant should be carried out at maximum intervals of 5 years. This testing is initially carried out after manufacture and founding of the plant at the ship yard under supervision of a competent person from the ship yard. The test is carried out using an approved trial impression load exceeding the SWL as specified under the merchant shipping regulations.This test is also required to be carried out ifAny repairs or modifications have been done which is likely to affect the SWL or the strength or stability of the equipment.Prior using any crane which has been idle for more than 6 monthsIf it has been bear on in an accident or mishap.Rigging PlanThe rigging plans shou ld be available at times along with sufficient technical details likeSWL of all fittingsA means of identificationBoom limiting anglesInstructions for replacing wires and sheavesDismantling proceduresErection proceduresCertification and reportsThe master is to ensure that a certificate is on board within 28 days of a statutory test or examination for at least 2 years by-line receipt of next certificate. They are to be kept readily available on board for any dock worker using the ships plant.A point of lifting appliances along with items of loose gear are also kept on board.Works CitedSwadi, D (2009), Cargo NotesDickie Short, Crane Hand book
Sunday, June 2, 2019
Are You Sick, or Do You Just Want Attention? :: Biology Essays Research Papers
Are You Sick, or Do You Just Want Attention?Most of us, in our youth, were probably asked this question in some form or another at least once by our parents and most of us would probably keep back to having faked being sick at least once in our lives. It is interesting, then, to note that there seems actually to be a pathology associated with this kind of behavior known as Munchausen syndrome. What, technically, is Munchausen syndrome? According to the Merck Manual, it is Repeated fabrication of physical illness - usually acute, dramatic, and convincing - by a person who wanders from hospital to hospital for treatment. (1) People suffering from this trouble will even go so far as to inflict physical pervert upon themselves in order to get the attention they want. Generally, it is associated with a gone history of severe neglect and abuse inflicted upon the subject. It is important at this point to differentiate between Munchausen and two other pathological behaviors for which it might be put on unlike hypochondriacs, Munchausen sufferers are conscious of the fact that they are not genuinely sick (2) unlike malingerers (people who fake or induce the symptoms of illness for some out-of-door gain, such as the prescription of painkillers (3)) the behavior of an overwhelming majority of Munchausen sufferers cannot be attributed to conscious motives. (1)A far more alarming variant of this disorder, known as Munchausen syndrome by proxy, has also been documented. In these cases, the subject fabricates the existence of physical illness in another person, usually the subjects child. The same sorts of behaviors occur - faking or simulating the symptoms of illness, resorting to physical harm in order to induce those symptoms. Even though the parent - the Munchausen sufferer - will always appear to be deeply concerned for the childs welfare, her actions will not infrequently result in the childs being severely deformed or even dying. (2) Both variants of this disorde r are highly uncommon.At present, people with any Munchausen syndrome or Munchausen syndrome by proxy are seldom, if ever, treated with drugs. Standard methods of management and treatment include early recognition of the disorder and years of intensive commission many doctors believe that the disorders are not treatable, inferring from the nature of the disorders that giving the subject medical attention would in fact heighten the severity of their pathology. (2) Munchausen syndrome and Munchausen syndrome by proxy are rarely treated successfully.
Saturday, June 1, 2019
symbolaw Symbols and Symbolism - Birds as a Symbol in The Awakening Es
Birds as the Symbol of Bondage and Freedom in The Awakening Birds that ar enclosed in cages indicate solitude and bondage those that roam in the open air above the seas represent independence and happiness. The enslavement or immunity of these animals is the symbolism that Chopin uses to illustrate the captivity Edna experiences from society and the freedom she desires. Through this vivid bird imagery in her novel The Awakening, Chopin elucidates the struggle and freedom Edna encounters. From the beginning of the novel, the source supplies bird imagery to represent captivity and solitude. The green and yellow parrot, which hangs in a cage outside the door of Madame Lebruns home, keeps repeating over and over Allez vous-en, come in (43). The pleas of the parrot parallel with those of Edna, a desire for communication. She longs for a companion to whom she can pour her heart and soul into, without being reminded of the restrictions and cares of Victorian s ociety a relationship that she did not have with her husband, but with Robert. Though E... symbolaw Symbols and Symbolism - Birds as a Symbol in The Awakening EsBirds as the Symbol of Bondage and Freedom in The Awakening Birds that are enclosed in cages indicate solitude and bondage those that roam in the open air above the seas represent freedom and happiness. The captivity or freedom of these animals is the symbolism that Chopin uses to illustrate the captivity Edna experiences from society and the freedom she desires. Through this vivid bird imagery in her novel The Awakening, Chopin elucidates the struggle and freedom Edna encounters. From the beginning of the novel, the author supplies bird imagery to represent captivity and solitude. The green and yellow parrot, which hangs in a cage outside the door of Madame Lebruns home, keeps repeating over and over Allez vous-en, come in (43). The pleas of the parrot parallel with those of Edna, a desire for communication. She longs for a companion to whom she can pour her heart and soul into, without being reminded of the restrictions and cares of Victorian society a relationship that she did not have with her husband, but with Robert. Though E...
Friday, May 31, 2019
The Physics of Judo Essay -- Martial Arts Judo Physics Essays
The Physics of Judo Judo is a martial art that is centered around physics. Even just the concept of realiseing somebody is physics. To practice judo and non create a basic knowledge of physics is insane considering that physics is what makes judo possible. Judo is sport that consist of throws, take downs and over all control. Judo without physics is like have a sandwich with just bread, you dont get much out of it. To understand how physics comes into play with judo we must start with Newtons laws of motion.Newtons kickoff law law of inertia, a net or unbalanced force is needed to change the state of motion of and object. In a judo match, two players try to throw each other by first off-balancing the other player, the fitting their body into a position underneath their foe for a throw, and finally throwing their obstructionist squarely on their back. The key to throwing the other player in the off-balance. Without first off-balancing your opponent, your chance of successful ly completing a throw are slim. Youre also asking to be countered if you dont off-balance first.(1)The first law of motion is important if you want to successfully throw your opponent in a match. For instance, suppose your opponent makes a move to his right in order to make you move to you left. In the instance that you are moving, youre temporarily off-balanced. Rather than letting your opponent keep control of the situation you and take advantage of his motion by using Newtons first law. In this scenario, the statement an object in motion will stay in motion applies. As he is in motion you quickly twist into your opponent enabling you to lift him up with your hips and throw him.(1)Newtons second law F=ma, the acceleration of a b... ...other example would be be if he took a step larger than he normally would. While his foot is still in motion, you sweep his foot in the direction of his advance. In doing this, he will drop because gravitation will be acting directly on him in dow nwards direction.(2)Judo is a martial art that relies on physics to achieve its goals and without physics it would not exist. Everything that judo does consists of physics, such as getting your opponent off-balance, using their momentum to get your opponent moving and using gravity to pull them to the ground. Work Cited1.Internet Source http//members.tripod.com/HappyClould/newton.html2.Internet Source http//members.tripod.com/HappyClould/gravity.html3.Internet Source http//members.tripod.com/HappyClould/momentum.html4.Physics a world view, fourth edition. Kirkpatrick and Wheeler copyright 2001
Thursday, May 30, 2019
The Fate of a Hero in Beowulf Essay -- Epic of Beowulf Essays
The Fate of a HeroFor a brief while your vividness is in bloom/ scarce it fades quickly and soon there lead follow/ illness or the sword to lay you low and death will arrive, dear warrior, to sweep you away(1761-8). Hrothgar bestows his wisdom onto Beowulf after Beowulf has defeated Grendel and his mother. Hrothgar reminds him not to let pride overcome him for everything is ultimately defeated due to the power of fate. This exemplifies a theme woven throughout the story of Beowulf. Beowulf is presented as a valiant hero, slaying beasts with his mighty strength and demonstrating the importance of the balance between wisdom and strength, but as the story unfolds Beowulf slowly loses his vitality until eventually he is defeated. This states the power of fate has on everyone no exceptions. This paper will demonstrate the heroic qualities of Beowulf and show his gradual decline through the approaches and outcomes of his three battles with the monsters. In the beginning of the story, Beowulfs journey brings him to the land of the Danes where he is first intruded upon by a coast guard. now upon seeing Beowulf the coast guard remarks on his impressive appearance. Nor have I seen/ a mightier man-at-arms on this Earth/ than the one standing here unless I am mistaken,/ he is truly noble (247-50). A warrior named Wulfgar, impressed by Beowulf and his men, delivers his request for passage into the land of Denmark from King of the Danes, Hrothgar. His family background and reputation are familiar to Hrothgar, and he eagerly welcomes them to Denmark. Wulfgar reports back to Beowulf, My lord, the conquering king of Danes, bids me announce that he knows you ancestry also that he welcomes you here to Herot (391-3). This scene shows the importance of appearance and reputation, without which Beowulf may never have been admitted to the land of the Danes at all. Once he gains passage into Denmark, Beowulf talks with Hrothgar and his closest followers in the mead hall about how he will subvert this beast or die trying. I meant to perform to the uttermost what your people wanted or perish in the attempt, in the fiends clutches. And I shall fulfill that purpose, prove myself with a proud deed or meet my death here in the mead-hall (634-8).His speech to Hrothgar shows Beowulfs courage and confidence in his abilities. He also chooses not use any weapons or ar... ...e failed his people. His choice to conquer this dragon seems to be the obvious choice for a warrior. He moldiness protect his people. But Beowulf seems so caught up in the surreal threats such as, monsters and dragons, he fails to realize the real peril he has left his people in. Beowulf is certain of his age and uneasy feeling toward his success yet he chooses to take on the dragon anyways. Although the dragon is defeated the Geat people are presented with even great danger of the Sweds who will surely pounce on their nation. Therefore, throughout the story Beowulf is presented as the ultimate hero demonstrating the strength of thirty men in his drudge while also using his powerful insight to avoid unnecessary conflict. His surreal strength and wisdom allow Beowulf to accomplish great feats within his time. He not only saves the land of the Danes form the terrorizing monsters but serves and protects his own people as well. Despite his heroic qualities, his humanity is proven by showing his eventual downfall expressing that even the greatest heroes cannot live forever. Beowulfs heroic qualities can only hold him above the rest until fate takes its toll and he in any case becomes defeated.
Subscribe to:
Posts (Atom)