Saturday, April 4, 2020
Scholarship Essay Shit Essays - Central Processing Unit,
Scholarship Essay Shit No greater contribution can be made to a specific field than research that leads to the development of a new and superior technology. Universities and businesses constantly attempt to remain on the cutting edge of new design, manufacturing, and application systems through research and development. If I were given the opportunity to conduct my own research, I would dedicate my efforts to the design of computer processing chips with the goal of increasing their speed and computational ability. It is now possible to construct memory chips almost atom by atom, allowing for nearly infinite circuitry capacity. My research would attempt to design a chip that could process data faster, and with more accuracy, than is presently possible. This chip could then handle more complex software, process data from CD's, and handle Internet applications at a faster rate, allowing for equalization with the increase in speed of CD ROM drives and modems. The procedure for this research would entail first learning as much as possible about the design of present chips, the specific materials that I might want to include as conductors, and which metals are easiest to manipulate. Next I would lay out the chip and attempt to construct it with existing technology. Finally, I would need to test it in an effort to make modifications and improvements in the original design. The computer age presents wonderful opportunities, and any research that promotes the facile use of PC or network systems will help advance this cause. For this reason, I would dedicate my year of research to improvements in the design of central processing units. Acceptance Essays
Sunday, March 8, 2020
Ballad Of A Soldier Essay Example
Ballad Of A Soldier Essay Example Ballad Of A Soldier Essay Ballad Of A Soldier Essay Grigory Nuamovich made the movie Ballad Of A Soldier (1959) very intriguing, suspenseful and informative of the Soviet Union between the year 1939-1945, because of the various filming techniques that he utilized. For example, he perfected the most difficult shot in film making; the long shot. In addition, the various themes and sound effects made the movie were very fascinating. Mr. Nuamovich also made the characters more real by utilizing the reaction shot, medium shot and close up shot. Furthermore, the lighting by cinematographer really worked for this movie.Similar to most Russian Cinema, Grigory Nuamovich clearly displayed the beauty of the land by utilizing the long shot. For example when Alyosha Skvorstov rides on the train and reminisces of Shura, there is a long shot of the woods. In addition, the village shots, where Alyosha is driving around looking for his mother, clearly depicts the life style of a Russian farmer in a small village, that is secluded from everything else and can only be reached by one dirt road. The scene where the tank is chasing Alyosha on the open land is also the long shot working at its best. The extreme long shots of the tanks really gave the audience a feel of open land combat and it kept the viewer on the edge of the seat due to the suspense. In addition, the aerial shot also really worked in the tank chasing Alyosha scene.The various themes and sound effects really worked in this movie. The music during the tank scene kept the audience in high suspense. In addition, the scene where the lieutenant allows Alsyosha vacation time and random gunshots rang out shows the audience that although, the soldiers are inside and seem safe, there is no safety on the battle field. Furthermore, the various themes through out the movie kept the movie flowing very well.Mr. Nuamovich made the characters more dramatic and believable with the use of reaction shots. For example, Vergenty Urtanskiy (the one leg soldier), reaction shots showed how miserable he truly was when everyone was laughing and he was not. Furthermore, the reaction shot of the girl at the ticket counter scene, when the one leg soldier said that he does not want to go home. Her reaction shot really made his decision look foolish to the audience. Also when the one leg soldier was walking away and thought that his wife didnt show up and she screamed his name, the scene was intensified with the reaction shot of the one leg soldier. Another reaction shot that really intensified a scene is when Alyosha is telling the Shura that; Alyosha thought that Shura was the lieutenant when she first walked into the train cart. Furthermore, the reaction shot of the Ukranian girl hoping that what she heard was lightning on the train and not a bomb also strengthened the scene. The audience was shown again that during wars nothing is safe. In addition, Alyoshas reaction when he finds out that another train wont come for another two hours, also worked very well, because it r eminded the audience that his time is limited.The medium shot also worked very well for this movie the various scenes of Alyosha and Shura on the train really made this movie a love story. In addition when the one leg soldier was holding his wife in his arms the two shot made the audience feel the love.The various framing techniques that Grigory Nuamovich utilized made this movie work. For example, the train scene where Alyosha and the one leg soldier are riding with their comrades, they were tightly framed directly in the middle of the scene, because the scene was about them. In addition, the scene where Shura first came into the cart and began running around and screaming, because she was petrified by Alyosha. Alyosha was framed slightly in the middle of the screen and Shura was framed at the edge of the screen to show that she is on the edge of her fear of Alyosha.The cinematographer also did a wonderful job in using lights and darks inside the train cart. For example, in the sce ne where Shura fell asleep, the cart was dark; however her face had a spotlight. In addition, the whole time that Alyosha and Shura are in the train wagon its dark, however most of the time they have a spotlight on their face. Another example, of the cinematographers excellent work is when Shura is chasing the train that Alyosha is on and he is trying to give her his address.I really enjoyed Ballad Of A Soldier because not only is it thrilling and intriguing, because of the various filming techniques that Grigory Nuamovich used, but it also shows the beauty of the land and the mindset of the Russian people during that time period. Everyone worried about their kids and loved ones on the battle field. In addition, the train scene in which Alyosha was riding with his comrades shows Russian hummer at its best. (Hard to explain) Furthermore, the scene in which the fat soldier that lets Alyosha on the train really shows how soldiers abuse their authority during the war.
Friday, February 21, 2020
Opportunity Essay Example | Topics and Well Written Essays - 1000 words
Opportunity - Essay Example Success does not depend on how hard a person works but how appropriate a person works. Opportunities therefore present us with chance to work appropriately in order to meet our objectives and responsibilities. This essay will therefore discuss the availability of opportunities in America with emphasis on American students. As a country, America started with the American dream that was initiated by the great pioneers and founders of the nation. Through the American dream, the country has been able to achieve its current success and global position. Working towards a sustainable nation was part of the American dream that has helped the country attains its global position as the most prosperous nation and the country with the strongest economy. How much the country has lived the dream is questionable due to the current economic difficulties experienced in the country (Colombo, Cullen, & Lisle, 1992). These economic difficulties not only affect the country but also the entire world since America is a symbol of global economy. Americans and specifically the American students have the chance to prove to the world that America is capable of living the American dream. Currently there are numerous opportunities for the people and specifically the students to make this reality. Presently the country is recoveri ng from a financial crisis and it is a concern to the government and the world. The recession presents an excellent opportunity to American students to defend the American dream. Knowledge is strength; students have acquired a lot of knowledge from their school and education. Although most of this knowledge is theoretical, students have the ability to utilize this knowledge to solve the current financial problem. Finding a solution to the recurring financial crisis is important to the countryââ¬â¢s economy as well as the global economy and hence an
Wednesday, February 5, 2020
International Managment Essay Example | Topics and Well Written Essays - 3000 words
International Managment - Essay Example Zen meditation is all about focusing, inward, looking at yourself, your own soul and become one with oneself. This experience is a whole new philosophy that anyone can apply to any aspect of oneââ¬â¢s life. Zen art has shown me the way, the true way to wisdom and knowledge and Iââ¬â¢m not going to stop at any demented or passive thought of abandoning the journey of my life enlightenment. Zen is not just about seeing things as they are; mountains as mountains and rivers as rivers, it is much more than that (Borup, 2008). The second activity worth mentioning is giving an insight to others about my own country, Saudi Arabia. This time, I analyse my country as an outsider and see it in a different light. And show what secrets it holds for the people who are unfamiliar with this land that was once nothing but desert cones. But now the world knows Saudi Arabia as one of the key players in the world energy sector. There is so much more to discover in Saudi Arabia other than deserts an d oil. There is only a little that the world knows about the people of Saudi Arabia, its culture, religion, food, the way people live and communicate with each other, and how recent developments have changed the life of Saudis. This is how it should be; people should recognize a country for its diversity and not for just a specific thing or two. A country is not its products, its natural resources but its people. Activity I: New Cultural Experience The Zen Meditation Impression It would be better to introduce Zen before delving into the details of its meditation. Zen is one of the many schools of Buddhists teachings, called Mahayana Buddhism (Zen.rinnou.net). China was the birthplace of this meditation but now this practice is world popular. Zen is the key to the great wisdom of Asia (Johnston, 2003), an inner art and ââ¬Å"design of the Orientâ⬠(Reps & Senzaki, 1998, pp. 17-18). The art of Zen awakens the student to the art of formless (Merton, 1968, pp. 6-7), which also mea ns not pondering at the pointed finger but observing what is being pointed at (Johnson, 2000, pp. 21-22). I have joined the Sydney Zen Center in Annandale, NSW. Iââ¬â¢ve attended two gatherings there or more than two hours each. It has turned out to be a great cultural experience for me. I have come to know about the Chinese Buddhist culture and how it resonates in the life of an individual. The Zen philosophy is all about attaining inner peace, also known as enlightenment. The main focus is developing an insight into the Buddhist teachings. So it is not merely reciting some verses, or visiting the temple, it is about applying the principles of Zen in oneââ¬â¢s life and seeing how it creates a difference in the everyday living. The first lesson given by the teacher was to defeat duality. I later read in book that the most important lesson of Zen is not to be dualistic (Suzuki, 2010). The feelings I experienced were incredible, I have never felt an inward observation towards my soul. Zen is magical and whoever journeyââ¬â¢s it finds whatever they seek (Arokiasamy, 2005). The feelings were mostly of calm and peacefulness as if eliminating the negative energy out of oneââ¬â¢s mind and filling it with the pure white energy. This white energy also fills the mind and the eyes, and that is how one starts to feel and see the world differently. The calmness of this energy put me to a state of mind where I stopped resisting and fighting for useless objectives. After the meditation session was over I felt as if we all engage in many
Tuesday, January 28, 2020
Triple Des Against A Brute Force Attack Computer Science Essay
Triple Des Against A Brute Force Attack Computer Science Essay Over the last few years, the Internet has evolved into a ubiquitous network and inspired the development of a variety of new applications in business and consumer markets. So, Multiprotocol Label Switching is another Challenge and a versatile solution to address the problems faced by present- day networks. Main objective of MPLS is to provide Security in the data exchanged. So, In this paper we have implemented Encryption Algorithms like AES, DES and Triple DES to provide sufficient levels of security for protecting the Confidentiality of the data in MPLS Network. This Paper also analyzes the Performance of these algorithms against Brute-Force Attack implemented in the MATLAB environment to protect the MPLS Network MPLS stands for Multiprotocol Label Switching, is a technology proposed by Internet engineering Task Force (IETF) it was designed to facilitate several problems areas in the internet including routing performance and is increasingly being adopted by service providers in their core networks. MPLS solutions are to be used with Layer2 and Layer 3 Protocols. MPLS has emerged as a potential solution for addressing traffic engineering, security and survivability for IP networks. So, a label is assigned to a packet when it enters the MPLS network at ingress Label Switched Router [1]. So, a label is a short fixed length identifier which is of 20 bits ranging from 0 to 19 that is used to forward the packets. Within the network the labels are used to route the packets without regard to the original packets header information. So, in this paper to secure the data which is attached with the label, various Encryption algorithms like AES, DES and Triple DES has been implemented on MPLS network. Ou r technique does not require any hardware, it is totally based on software.Following Sections discusses the proposed scheme. Section 2 discusses the Security Requirements of MPLS network. Section 3 gives the quick overview of the various encryption algorithms used in this technique. Section 4 walks through the used setup environment and the settings for the encryption algorithms on MPLS. This section also illustrates the performance evaluation methodology chosen settings to allow for a better comparison. Section 5 gives a thorough discussion about the implementation results. Finally, Section 6 concludes this paper by summarizes the key points and other related information. 2. Security Requirements of the MPLS Network Network Managers have many options for site to site connectivity like Traditional leased lines, ATM based connectivity and frame relay. But other two types of modern VPNs i.e MPLS and IPSec are becoming increasingly attractive to network managers [2]. In pure IP network it is easy to spoof IP addresses which is a key issue in Internet Security. But, because MPLS works internally with labels, instead of IP addresses, so it not so easy to breach the security. The very fact to make concept clear is that it is not possible to insert packets with wrong labels into the MPLS network from outside, since the customer edge(CE) is unaware of the MPLS core and thinks that it is sending IP packets to the router [3]. The intelligence is done in (PE) provider edge device where based on the configuration, the label is chosen and prepended to the packet. So, MPLS is more secure than normal IP addressing technique. But, the spoofing here can also be possible. The attacks like brute force attack can break the security, although it is not so easy, but it can do so. MPLS alone cannot provide security, it can be combined with IPSec to provide sufficient levels of secu rity. So, various encryption and hashing algorithms are used to maintain the confidentiality of the data. IPSec requires each side to authenticate with the other, so privacy is maintained in IPSec VPN through the use of encryption. A secure MPLS network provides the following facilities to its users [2]: Data Confidentiality: IPSec VPNs provide data confidentiality through robust encryption algorithms. It seeks to ensure data confidentiality by defining a single path between physical sites on a service provider network. This prevents attackers from accessing transmitted data unless they place sniffers on the service provider network. Though MPLS minimizes the chance that data may be intercepted, IPSec provides better confidentiality through encryption. Data Integrity: IPSec uses hashing algorithms to ensure data integrity. There are inherent methods as such to provide data integrity within MPLS VPNs. However, the odd of data being shared by a man-in-the-middle attack is low due to the separation address space and routing information provided by MPLS VPNs. Data Availability: IPSec relies on the Internet for transport. Although an attacker could not read the data, but it could DOS an IPSec VPN by entering false routes into the Internet Routing tables. MPLS VPNs rely on LSPs i.e. Label Switched Paths for transport and since LSPs have local significance only, spoofing is difficult to accomplish. Thus MPLS, can provide better data availability in this regard. Service Reliability: MPLS has the ability to protect the communication session against denial of service attacks. 3. REQUIREMENT OF ENCRYPTION ON LABELS IN MPLS NETWORK In this paper encryption on labels in MPLS network is proposed using AES, DES and Triple DES encryption algorithms. For implementing and evaluating above encryption algorithms we have done the following steps: Encrypt the data with one of the above mentioned algorithms. Encode the data according to MPLS. Brute Force Attack has been done. Time taken to find a correct key is measured against different key lengths. Data Label Encrypt Label Data MPLS Decrypt Secret Key Brute Force Attack Figure 1. Data Encryption This paper analyzes the effectiveness of AES, DES and Triple DES encryption algorithms against brute force attack on MPLS network. The comparison has been conducted by running brute force attack program against these algorithms. 3.1 Implementation Setup This section describes the implementation environment and the used system components. The implementation of DES, Triple DES and AES uses classes available in JAVA package javax.crypto. Separate functions for encryption and decryption have been implemented in MATLAB using JAVA cryptography API. Figure 2 JAVA Cryptography Package Brute Force program is implemented in MATLAB environment. This implementation is thoroughly tested and is optimized to give the maximum performance for the algorithm. 3.2 Methodology Used This Section will discuss the methodology and its related parameters like: system parameters, experiment factors and experiment initial settings. 3.2.1 System Parameters The experiments are conducted using Intel 64-bit processor with 32 GB of RAM. The program is written in MATLAB. The experiments will be performed couple times to assure that the results are consistent and are valid to compare the different algorithms .The brute force attack has been done using single PC. It can be enhanced by the use of parallel computers with high computational powers to decrease the time required to find the key for the above algorithms. 3.2.2 Experiment Factors In order to evaluate the performance of the compared algorithms against brute force program on MPLS networks, the experimental factors must be determined. The chosen factors here to determine the effectiveness of encryption algorithms are the key length and the time taken to breach an algorithm by brute force program. 3.2.3 Experimental Initial Setting We started the attack with 8 bit of key length and extended upto 64 bit. It can further increased upto supported key length of AES algorithm i.e 256 bits. But for this high computational power is required in terms of parallel computers to breach the algorithms. 4. Results and Discussions This Section will show the results obtained from running the brute force program on AES, DES and Triple DES. The results of implementation have been shown below in the form of graphs. The time of launch of brute force attack is shown at the start of the program as in Fig. 3. Figure 3 Screenshot of running brute force program The program exits on success of the attack on the encryption algorithm which is shown below in fig. 4 Figure 4. Screenshot of cracked algorithm The time required to break the encryption algorithm, actual encrypted string and the label applied, all are shown in fig. 5 Figure 5 Screenshot of various factors like time to break, actual encrypted string and the label applied It is highlighted here that the implementation has been performed assuming that the user has arrived at all the correct values of the key and only two values of the key is to be cracked. This has been done to save the time required. The key length can be optimized to reduce the time taken for encryption and decryption process so that it does not slow down the system. i) Effect of key length variation We compare the change in security performance by using different key lengths for encryption algorithms. Graphs are plotted between the time required to find the correct key and different key lengths. We have taken six different scenarios by increasing the length of the key. Table 1 DIFFERENT KEY LENGTHS Scenario Key length (Bits) 1 8 2 16 3 24 4 32 5 40 6 48 7 56 8 64 Following are the graphs for scenarios stated in table1. These graphs show the number of seconds required to breach the corresponding algorithm against brute force attack. Figure 5 Number of seconds required with key length of 8 bits Figure 6 Number of seconds required with key length of 16 bits Figure 7 Number of seconds required with key length of 24 bits Figure 8 Number of seconds required with key length of 32 bits Figure 9 Number of seconds required with key length of 40 bits Figure 10 Number of seconds required with key length of 48 bits Figure 11 Number of seconds required with key length of 56 bits Figure 12 Number of seconds required with key length of 64 bits The above graphs show the time taken to find the key by the brute force program on DES, Triple DES and AES for different key lengths. From these graphs it is analyzed that time taken by brute force attack increases exponentially with the increase in key length. It is clear from the graphs that in case of AES algorithm, brute force attack takes more time to find a key. Therefore, it has a better security than DES and Triple DES. i) Effectiveness of algorithms against brute force attack The results of the iterations of brute force program have been shown in the below figure in Table 2. This graph is plotted in MATLAB environment. The above data and graph represents the effectiveness of AES, DES and Triple DES algorithms against brute force attack. It is evident from the data presented that AES proves to be of better security against the brute force attack than DES and Triple DES for securing MPLS network. Figure 13 Effectiveness of AES, DES and Triple DES against brute force attack Table 2 Number of seconds required to breach DES, Triple DES and AES KeyLength (bits) DES (Seconds Triple DES (Sec) AES (Sec) 8 0.27 0.31 0.55 16 39.59 52.11 110.44 24 1442.52 4575.13 17443.22 32 3085.02 10534.81 36758.31 40 7765.12 21435.13 78252.12 48 15229.91 44671.11 156277.81 56 30118.73 89212.15 330115.42 64 65416.91 122294.54 775313.21 5. CONCLUSIONS The presented results showed that AES has a better security than DES and Triple DES against brute force attack since AES takes more time to break by brute force program for a given key length. Time taken by AES algorithm to break the security considerably increases with the increase in key lengths. respectively.
Sunday, January 19, 2020
Eulogy for Father :: Eulogies Eulogy
Eulogy for Father "I have been having a lot of feelings since my father's illness and death and we will see how long the feelings will allow me to speak. By far the biggest feeling I have had has been gratefulness. Gratefulness to have stood in the shade of my father's tree. Because to me my father was like a tree in many ways. An oak tree. An oak who's taproot was anchored in faith and in the Divine, and with branches and leaves that act as a home for those around. I stood in that home and for that I am so grateful. It's an experience that I wish I could condense into a couple of words and then tell you. People I talk to say sometimes "I guess you can't expect your family to be like the Brady Bunch." I don't have the heart to tell them that I wouldn't ever trade my family for that, nor for anyone. It was an incredible experience to grow up in my family with my mother and father. My fatherââ¬â¢s tree was stable, you couldn't push it, and it was strong. It was a place for everyone around him to glow. He wanted others to glow. He enjoyed and reveled in the glow of everyone around him...not only his own. It is a beautiful thing for a man to be able to do that. I honor him for that. And boy, do I feel a little dwarfed by comparison. A couple of weeks ago I told him, "Dad, you have always done things so deliberately and calmly you have been a great role model for me. I just feel so overwhelmed by trying to follow in your footsteps." He looked at me and motioned with his hand as if throwing a ball at me and said, "Oh you're all right." Somehow that "oh you're all right" was the biggest blessing. He had told me many times that he loved me, that he was proud of what I did, but this sunk deeply into me and I felt it as a blessing from him like I had never received before. All the times my father told me of his love for me, or how he was proud of what I was doing or what ever, were still with me but this simple phrase moved me in a unique way. I think I can speak for all of my siblings when I say that we always knew within our family that we were loved.
Saturday, January 11, 2020
Discrimination in US Judicial system
America judicial system has been accused of discrimination especially when it comes to mandatory sentences. There has been a serious disparity as far as sentences are concerned with some groups seemingly being favored by the law while others have been treated harshly. This state of affair is sad for this country as it seems to divide the country in classes especially on racial basis. The minority groups, the African American, Latinos and women have been seriously affected making human rights groups to agitate for the change of laws to apply equally among all the groups.These inequalities in the application of the laws seem to be retrogressive as far as our endeavor to make America an all equal country is concerned. The judicial system seems to be applying the law unfairly making some feel less American than others. This does not auger well for the national cohesion as the disadvantaged group may feel that this is an attempt to sideline them on various lines and they may opt to solve the problem in whatever means available to them including violence therefore affecting the America stability.These disparities not only affect the guilty but also the innocent who are harshly sentenced for the crimes they did not commit. (Kinzie, M 2002) This may be detrimental for the fight against crime. If we continue punishing so harshly and furthermore seem to discriminate, the crime rates will only rise as people especially those who are directly or indirectly affected by this discrimination in justice register their dissatisfaction on the unfair treatment opting to use violence. To fully address the disparities in sentencing in our judicial system, causes of this unfair treatment by our system need to be addressed carefully.Police Department which is charged with the role of apprehending the law offenders has been identified as on of the areas where the discrimination is so rampant. Many Americans have reported being searched or even arrested for the crimes the have not commi tted only because they had a different color or spoke with a different accent from that of the arresting officer. I t is the police who arrest and align the suspected law breakers to the court. I f they are biased in terms of race or other aspects the suspects may not feel that they will receive a fair treatment.The treatment may further be extended to the sentencing itself, therefore making the victims lose confidence on our judicial system. (Jeremy, K. 2004) Human rights groups have reported that there have been more arrests as far as minority groups are concerned. This has created a perception that the minorities commit crime than their white counterparts, this perception has even been extended to our judicial system with our judges being biased when a case involving a person from a minority, instead of looking critically at the facts laid down the issue of race clouds the system making him or her rule a harsh treatment.We may not entirely blame the police and the judges alone fo r the unfair treatment of the subject but our law system have failed to address the issues at hand. The laws seem to be biased from the word go and this perhaps is where the problem lies. Judges base their sentences on the law; the law prescribes a certain punishment on a particular crime committed. There are some of the laws that seem to be lenient on some offenders. Althugh this may not be directly proved there exists some disparities as far as sentences prescribed are concerned.Looking at the punishment through a social perspective one may not fail to notice that there is some form of discrimination of certain groups. A good case at hand is the issue of drugs, cocaine is one of the drugs that is abused by Americans of all walks of lives be they poor, rich, black, white and Latinos. Surprisingly the sentences prescribed differ when it comes to the type of cocaine in question. There are two types of coaine; the powdered form and the crack which is cooked in baking soda. Crack is ma inly used by the black and the Latinos populations while the powdered cocaine is mainly consumed by the rich whites.When the congress was passing this law on drug abuse there was a wrong indication that crack was more addictive than the powdered form and it resulted to more violent among its users therefore heavy punishment for its users as opposed to powder users who got lesser sentences. This law based on this argument, though good to deter the drug users have not addressed the issue at hand as it has been accused of discriminating on the lines of race and social classes. (Wolf, D 2006) American society can also be largely blame for the state of affairs that prevail in our judicial system.The laws are made by our representatives whom we elect, therefore the law makers represents our views and if we do not agree with them there are channels of addressing the issue. Our society is molded in such a way that segregation in terms of race class and other aspects is embraced therefore ou r judicial system just reflect who we are as a society. This does not mean that the status quo must prevail,we should embrace a situation where all are treated equally regardless of the race, creed or even the social class one occupies.This calls for the sensitizing of the masses on the need to look at each other as either brother or sister. This will go along way in creating equality in the society which will eventually been reflected in our laws hence implementation by our judiciary system. ( Hurst, C. 2001) Judicial department has a great role as long as equality in law is concerned, this department is mandated to interpret the law made by our legislators and if they seem to contravene the supreme constitution of our land the department has a responsibility of quashing these laws and advise the lawmakers on the shortcomings of these legislations.The laws which are discriminative in nature not only cause a great division in this nation but also cause great suffering to the victims as they are subjected to harsh treatment sometimes for the crimes they may have not committed but due to their inability to hire competent lawyers they fail to defend themselves therefore being punished. The judicial department should ensure that the judges who handle cases where discrimination may be cited are competent individual and have no history of racial prejudice.The department needs to empower the judges with skills that will ensure they handle such type of cases with seriousness they deserve as it is only through this way that our judicial system will be seen to serve all equally regardless of their race, creed or even the social status they hold in the society. Selection of juries is another area that needs to handled with a lot of caution some of them may be compromised to vote on a certain way which promotes the already existing disparity .The judiciary should make sure that men and women who are selected in the jury are people of high integrity, those who are not bias ed and show high respect for the all people regardless of diversity. Judges need to set precedent on application of the law equally, precedence that should be authoritative such that the whole system will adopt to ensure all who are brought before them are treated with fairness as required by the natural justice and our constitution as well.The judicial department needs to ensure that systems are in place for those who feel they have been discriminated to register their complaints and the necessary remedies taken. The appellate court should be fully empowered to address this issue comprehensively and in a manner that all will be satisfied and justice will have prevailed in such systems. (Murray, F 2003) With the responsibility of interpreting the laws being vested on this department by our constitution.The judicial system should uphold this responsibility and advise the congress to look at all those laws which seem to apply selectively. These laws need to be changed without deviatin g from their initial course of making them, which was to fight crime. They should be applied equally to all. We should not have some groups being treated leniently yet the magnitude of the crime is the same. The judiciary system can save this nation from the agony of going through another era of discrimination in our society.If it upholds the responsibility bestowed by the citizens of America through the constitution it can cement the gains we have so far made as far as eliminating segregations in our community is concerned. Criminals need to be treated equally and fairly, no one should receive punishment which is not equivalent to the crime committed neither should be there lesser punishment for a crime committed. It is only fair application of justice that this department will be viewed in the lenses of equalizing all the America as far as law is concerned. The department cannot accept failing as this will be doom for America as a nation. References Kinzie, M (2002) Product liability and litigation. Clifton Park, Newyork. Jeremy, K. (2004) Discrimination in our laws. American perspective. Straus and Graux.Newyork Wolf, D (2006) Law and the racial politics. Harper Collins, Newyork. Hurst, C. (2001) Crime and the law: social perspective.W.W.Norta, Newyork. Murray, F (2003) American judicial system. Sierra club books, Sanfrancisco
Subscribe to:
Posts (Atom)