Sunday, January 26, 2020

Performance Analysis Of Election Algorithm Computer Science Essay

Performance Analysis Of Election Algorithm Computer Science Essay Distributed systems are the systems consisting of multiple processors that connect through a network to communicate. To manage the communication between different nodes and the exchange of data between them, a leader among them is required. In our project we implement the various Election algorithms for choosing the leader in Distributed Systems thus solving the coordinator election problem. We are also comparing the performance of each of these election algorithms. First we implemented the Election algorithms using the message passing interface(MPI). Then we measured and compared the performance of each of these election algorithms and simulated the results. Finally we modified the distributed leader election algorithm to suit the mobile ad-hoc networks. Key Words: Distributed Systems Election algorithms Unidirectional ring algorithm Lelanns algorithm Chang Roberts algorithm Bidirectional ring Leader election Mobile Adhoc Networks Introduction Distributed system It is a group of processors where the memory or a clock is not shared. Every processor has its own associated memory and the information is exchanged through communication networks. Distributed algorithm A distributed algorithm is an algorithm run on such a distributed system assuming the non-existence of central coordinator in these systems. So these algorithms require one process to act as a coordinator. There is no way to select one of them to be leader if all the processes are alike without different characteristics. One of the processes has to take this special responsibility, no matter which process takes it. This problem in which a leader has to be elected is termed as the coordinator election problem that is how to choose a process among the different processors to make it a central coordinator. Election algorithm An election algorithm is used to solve the coordinator election problem in these distributed systems. Any election algorithm must be a distributed algorithm by the nature of the coordinator election problem. The most important feature in election algorithm is it assumes every process has a Unique ID. It votes a process from among the different processors which can act as the initiator, sequencer and monitor in detecting and solving situations like Deadlock, Mutual Exclusion etc. Thus electing a leader process has become a major issue in wired and ad hoc networks. The goal of election algorithm is to see that when an election begins it ends with all processes by an agreement as who has to be the new coordinator. ELECTION ALGORITHM ON RINGS : A ring is formed by the processes in ring algorithm. In this each process sends only messages to the next process in the ring. It can be classified into two categories Unidirectional Bidirectional The messages are sent only in one direction in unidirectional and in both directions in Bidirectional ring algorithms. To compare the performance of these algorithms, the different criteria taken into consideration are Total number of messages passed Complexity of the messages used Time elapsed by the algorithm 2. Implementation Software We have used the message passing interface (MPI) for implementing our algorithms which are discussed below. It is a standard specification for communication through messages among different processes. It is independent of any language. It is used in parallel computing to write programs for group and point to point communication between nodes. We used the C language to implement the election algorithms. The MPIs routines are directly callable in C. The main MPI calls used in our program are MPI_Init: Before communicating, all instances of the code should call this so as to prepare the MPI implementation for the communications environment. MPI_Finalize: For exiting the communication, this is called by all the instances of the code. MPI_Comm_size: To learn about the number of processors which are using MPI environment to communicate, this routine is called. MPI_Comm_rank: Each of this process assigns an integer to the communicating process. MPI_Send: To send a message to another process, this is called. MPI_Recv: This call allows to receive a message from a process. 3. Unidirectional Ring Algorithms The ring algorithm consists of processes arranged in the form of a ring consisting of a token. The token is passed between processes and the process which has the ring can send a message. The election problem can be implemented using the ring algorithms Lelanns algorithm Chang Roberts algorithm 3.1 LeLanns algorithm In this we assume that all the processes are physically and logically ordered. In LeLanns algorithm whenever the coordinator is lost, the initiator sends a token to the other processes in the ring by adding its id. Nodes cannot initiate any messages once they receive the token. After circulating the token, if the process receives back its id then it is chosen to be the leader since it knows that others cannot become leaders as it knows all the ids of the other processes and it has the least id. The message complexity of LeLanns algorithm is O(N2). ALGORITHM: Step 1: begin Step 2: send the token to neighbours with id of current process as i Step 3: add current process id j and forward to neighbours Step 4: if process P receives back its id then Step 5: leader is P Step 6: else return null Step 7: end Message Complexity: Every initiator sends N messages. So the worst case time complexity is N2. The algorithm is implemented using MPI and the message complexity and time complexity given by the MPI program is No.of processes Messages Real time User time System time 5 25 1.195 0.025 0.023 10 100 1.292 0.027 0.024 15 225 1.446 0.030 0.027 20 400 1.551 0.034 0.030 25 625 1.654 0.036 0.030 Table 1: LeLanns algorithm 3.2 Chang Roberts algorithm This is similar to lelanns algorithm but with a little change. When a process receives a token with an id greater than the current process id, it drops that particular token as that process cannot be a leader . Hence it forwards the token with an id less that itself. In this way it saves time by discarding the unwanted messages. The worst case message complexity of Chang Roberts algorithm is O(N2) and the average case message complexity is O(N logN). ALGORITHM: Step 1 : send message with identifier = I to other processes Step 2 : if identifier J of current process > I then send the message to neighbours with identifier I Step 3 : else drop message with identifier I and send the message with identifier J to neighbours Step 4 : continue this process until a particular process receives back a message with its identifier. Step 5: if a process receives a message with its id then process= leader. Step 6: else return null Step 7:end Message Complexity: The best case time complexity is 2N-1. The process with largest id sends N messages and other N-1 processes send one message each. The algorithm is implemented using MPI and the message complexity and time complexity given by the MPI program is given in the table 2. No.of processes Messages Real time User time System time 5 9 1.189 0.024 0.023 10 19 1.299 0.027 0.024 15 29 1.412 0.029 0.026 20 39 1.531 0.033 0.028 25 49 1.650 0.036 0.031 Table 2:Robert Changs Best Case Algorithm The worst case time complexity is N(N+1)/2. The process with largest id sends N messages and other N-1 processes send messages from 1à ¢Ã¢â€š ¬Ã‚ ¦N-1. No.of processes Messages Real time User time System time 5 15 1.186 0.024 0.023 10 55 1.301 0.027 0.025 15 120 1.414 0.030 0.027 20 210 2.511 0.034 0.029 25 325 1.654 0.035 0.030 Table 3: Robert Changs Worst Case Algorithm 4. Bidirectional Ring Algorithms 4.1 Leader election algorithm for Bidirectional Ring In these bidirectional ring algorithm messages can be sent or exchanged in any direction. We have used the algorithm mentioned in [2] An improved upperbound for distributed election in bidirectional rings of processors. J.Van Leeumen and R.B Tan. Distributed Computing(1987)2:149-160 for implementing it with the MPI. The name (identifier) of a large processor is contained in the register ID which is maintained by the processor and a (Boolean) register DIR that has a direction on the ring in which there are processors that still have a smaller processor up for election. A smaller candidate which is still alive when the messages( the ones having the name of a Large candidate) are created, have them being sent out in its direction. Processors that begin a chase are known as active, and the left over processors are observant. To get rid of the smaller candidate and force agreement on the larger candidate is the main idea behind a chase. After the current active processors have begun the chase, the observant processors basically relay messages onwards unless they notice an unusual situation on the ring only. As the algorithm proceeds, there are two unusual situations that can arise at the location of an observant processor. They are (i) The processor receives a message of the current phase, say through its left link, that contains a value which is less than the current value in its ID register. The processor turns active, increments its phase number by 1, and initiates a chase with the value its current ID in the direction of the message that was received, i.e., out over its left link. (ii) Two messages of the same phase are received by the processor from opposite directions. The processor turns active, increments its phase number by 1, and initiates a chase with the largest value contained in the two messages in the direction of the smallest. As the algorithm proceeds, several active processors that can arise in a phase rapidly decreases, and at the end a single processor will be left precisely. This processor will be familiar that it receives two messages of the same phase from opposite directions that hold same values and is elected because either it receives a message of the current phase with a value exactly alike to the one it sent out (and stored in its ID register) or it receives two messages of the same phase from opposite directions that hold same values. ALGORITHM [2]: The algorithm describes the actions of an arbitrary processor on a bidirectional ring with half-duplex links as required for electing a leader 1) Initialization a) Let u be the executing processors identification number. Send message to both neighbors and phase number Pnum:=0; b) Wait for corresponding messages and to come in from two neighbors c) Compare u1 and u2 and set ID to max(u1,u2)and Dir to the min(u1,u2) and goto Active state else Observant state. 2) Election A processor performs in either active or observant state. a) Active A processor enters the active state with some value v stored in its ID register and a phase number p. The phase number p is either stored in Pnum or it is an update stored in temporary register. The phase number Pnum is incremented by 1 and a message is sent in Dir direction and goes to observant state. b) Observant In this state a processor receives messages and passes them on, unless an unusual situation is observed that enables it to initiate a new phase. Receive messages from one or both directions. Discard any message received with p less than Pnum. i) If the number of messages left are zero then go to observant state. ii) If the number of messages left is one then { Let the one message received be where necessarily p>=PNUM.} if p=PNUM then v = ID:goto inaugurate; v DIR:= direction from which the message was received; goto active state v > ID:begin goto observant else PNUM = p; ID =:v; DIR:=the direction in which the message was going Send message to direction DIR; goto observant iii) If the number of messages left is one then{Let the two messages received be and ,necessarily from opposite directions and with p>=PNUM} if v1=v2 Pnum := p; goto inaugurate else v1!=v2; ID:-=max(v1,v2); DIR:=the direction of min(v1,v2); goto active 3) Inauguration A transfer to this final phase occurs when the algorithm terminates and the ID register contains the identity of the unique leader. Message complexity: The message complexity of the bidirectional algorithm is 1.44NlogN + O(N). MPI is used implementing the algorithm. The Time and message complexity given by the MPI program is No.of processes Messages Real time User time System time 5 14 1.186 0.024 0.022 10 29 1.302 0.027 0.024 15 44 1.417 0.030 0.026 20 59 1.534 0.033 0.028 25 74 1.661 0.036 0.030 Table 4: Leader election algorithm for Bidirectional Ring 4.2 Leader election algorithm for Mobile Adhoc Networks A mobile ad hoc network is dynamic in nature. It is composed of a set of peer-to-peer nodes, that exchanges the information within the network through some wireless channels directly or through a series of such links. A node is independent to move around as there is no fixed final topology. The nodes move freely in a geographical area and are loosely bounded by the transmission range of these wireless channels. Within its transmission range, a mobile node communicates with a set of nodes thus implying all of them have to be in a network. These set of nodes are also known as the neighbors of the communicating node. The mobile nodes act as intermediary routers to direct the packets between the source and the destination nodes (i.e., the set of neighbors). A node is designated as a leader to coordinate the information that needs to be exchanged among nodes and to be in charge of their data requirements. The identification problem of a leader is termed as the leader election problem. Why do we need to select this leader? When the nodes are set out, they form an adhoc network between them within which the whole communication happens. If the topology of the network changes dynamically, a node may suspend its communication with the previous node, just like in distributed networks. So there has risen a need for a leader so that the maintenance of the network and the clock synchronization within it can be done. Also a new leader has to be chosen every time the members of the group are getting updated while communication is taking place. When the communicating nodes move freely and if they are not within the transmission range of each other, then the wireless network fails . Similarly the formation of wireless links happen only when the nodes which are separated and are too far and to communicate, move within the transmission range of one another. The network topology may change rapidly and unpredictably over time since the nodes are mobile. So developing efficient distributed algorithm for adhoc networks is a challenging work to be done. The largest identity node is chosen to be the leader using minimum wireless messages in this approach. A mobile ad hoc network can be considered as a static network with frequent link or node failures, which can be thought of as a mobile node of an adhoc network going out of reach. To cover all the nodes in the network we use the diameter concept. While distance is described as the shortest path between the nodes, diameter is defined as the longest distance between any two nodes in the network. The number of hops will be the taken for measuring the distance and the assumption is that the network becomes stable after a change happens during leader election process and there are only a limited number of changes in the network. A network having N nodes are considered here. Since the topological changes are considered during the leader election, this algorithm takes more than diameter rounds to terminate. If however, the topological changes are not considered diameter rounds are taken to elect the leader. We have used the algorithm mentioned in [3]An Efficient Leader Election Algorithm for Mobile Adhoc Networks Pradeep Parvathipuram1, Vijay Kumar1, and Gi-Chul Yang2 for implementing it with the MPI. Leader Election Each node propagates its unique identifier to its neighbors and a maximum identifier is elected as a leader in every round. This maximum identifier is propagated in the subsequent rounds. All the rounds need to be synchronized. idlist (i) identifies identifier list for node i, which consists of all the neighbors for node i. Lid(i) =max(idlist(i)) Termination At (rounds >= diameter), for each node i, If all identifiers in idlist are the same(i) the node i stops sending the maximum identifier further and chooses the maximum identifier in the idlist(i) as the leader. The algorithm gets terminated if for each node i the elements in idlist (for each node) are the same. The termination may not be at the final part of the diameter rounds, If all identifiers in the idlist as the leader. ALGORITHM [3]: Each node i in the network has two components a) idlist identifier list b) Lid(i) leader id of node i. 1) Each node say node i transmits its unique identifier in the first round and Lid(i) in the subsequent rounds to their neighbors and all these ids will be stored in idlist. Lid(i) = max (idlist(i)); 2) A unique leader is elected in diameter rounds, if there are no topological changes in the network. The algorithm is modified to incorporate topological changes in between the rounds and below is the description of how the algorithm is modified. Case 1: If a node has no outgoing links then lid(i) = i; Case 2: If a node leaves between the rounds, then the neighbors would know this. Suppose node i leaves the network after round r and let its neighbors be j and k. neighbors of i (i.e. j, k). 1) Delete (ilist, idlist(j k)) // delete ilist from idlist ilist contains the group of identifiers that node i has sent to its neighbors before round r along with i The ilist information is also deleted from all the neighbors of j and k if the ilist identifiers have been propagated in the previous rounds. This process continues until all the nodes in the network are covered. 2) Repeat while (round > = diameter), // Termination condition Compare all the identifiers present in idlist(i) for each node i. If all the identifiers in idlist(i) are equal, node i stops propagating its maximum identifier and elects the maximum identifier as the leader. Case 3: If a new node i joins the network in between the rounds say round r then the neighbors will update its idlist. 1) If neighbors of i say node j is the neighbor for node i. Add (i,idlist(j));The normal algorithm continues (the ids are propagated), nodes keep exchanging the information till diameter rounds. 2) Repeat while (round > = diameter),For all nodes in the network (node j) receives an identifier i at diameter round. IF i is greater than the maximum identifier node j has propagated in the previous round (diameter-1). a) Propagate node i to all the neighbors of j. b) Also propagate the node i information to all the neighbors of neighbors i until the whole network is covered, if the above condition satisfies. Else do not propagate the information to nodes in the network i) Compare all the identifiers present in idlist(i) If all the identifiers in idlist(i) are equal, node i stops propagating its maximum identifier and elects the maximum identifier as the leader. ii) All nodes in the network follow this process and a unique leader is elected connected component. The time taken for the algorithm to elect a leader will be O (diam + Άt) where Άt is the time taken for all the nodes to converge and Άt depends on the topology changes. Message complexity The message complexity of this algorithm depends on the number of rounds. In each round it sends 2N messages if we consider a ring topology as every node has 2 neighbors. So message complexity is 2N* No. of rounds. This algorithm is implemented using MPI and the message complexity and time complexity given by the MPI program is No.of processes Messages Real time User time System time 5 30 1.187 0.023 0.022 10 120 1.301 0.026 0.024 15 240 1.421 0.030 0.027 20 440 1.541 0.032 0.029 25 650 1.752 0.037 0.031 Table 5: Leader Election Algorithm for Mobile Adhoc Networks 5. Simulations Message Complexity with respect to number of processes Time No.of Messages Transferred Sno Algorithm N=5 N=10 N=15 N=20 N=25 N=5 N=10 N=15 N=20 N=25 1 LeLanns 1.195 1.292 1.446 1.551 1.654 25 100 225 400 625 2 Chang Roberts 1.189 1.299 1.412 1.531 1.65 9 19 29 39 49 3 Bidirectional Ring 1.186 1.302 1.417 1.534 1.661 14 29 44 59 74 4 MobileAdhoc 1.187 1.301 1.421 1.541 1.752 30 120 240 440 650The message and time complexity of each of these 4 algorithms for different number of processes is implemented in our programs and the results are as shown in table 6. All the above simulations are plotted on the graph so as to analyze the way different algorithms message complexity varies with the number of processes on which it executes. 6. Conclusions Table 6: Simulation ResultsComparing the results, we can conclude that the Lelanns algorithm is the most fundamental algorithm and requires large number of message exchanges among the four algorithms. Changs and Robert algorithm made considerable changes to Lelanns algorithm however in the worst case that algorithm also requires O(N2). For leader election in ring topology these are the two unidirectional algorithms that are to be considered. The bidirectional algorithm requires less messages than the worst case Changs and Roberts algorithm. It requires O(N logN) messages. It takes less time to discover the leader when compared to unidirectional algorithms since the messages are sent in both the directions. The final algorithm is put into effect for mobile adhoc networks and is run in many rounds. The messages complexity depends on number of rounds. It guarantees that there is only one leader at a time but however it handles the partition in the network and requires more number of messages .

Saturday, January 18, 2020

A Wilderness Station Essay

In â€Å"A Wilderness Station† the character of Annie Herron is presented through a series of letters and memoirs. These documents tell us some of the events surrounding the death of her husband, Simon. These letters and memoirs are written by different people in Annie’s life, such as George Herron (Simon’s brother), Reverend McBain, James Mullen, Christena Mullen and by Annie herself. In a memoir published in the Carstairs Argus newspaper Fiftieth Anniversary Edition, George Herron wrote his version of the circumstances of his arrival to Carstairs and he also gives his version surrounding the accidental death of his brother. Annie, on the other hand, gives conflicting stories of the day her husband died. She tells two different versions of what occurred on the day her husband died. She tells Mr. Mullen that she killed her husband when she first arrives at the Gaol and then tells her friend Sadie Johnstone in a letter that her brother-in-law killed Simon. Given t hese conflicting stories we are unable to determine what really happened to Simon Herron. In George’s memoir we get the impression that George didn’t really want to go to Carstairs with Simon. After the death of their parents, George went to live with a schoolteacher and his wife where he had a very happy home. Simon, was not so lucky, he lived with his mother’s cousin Archie Frame and was never sent to school. Simons upbringing was not as comfortable as George’s, so when he was nineteen, he and George left Halton and went towards Huron and Bruce to find their fortune. Soon after the leave Halton, Simon marries Annie and a few months later he is killed in what seems like an accident. According to George, in April of 1852, he and his brother were chopping down trees on the far corner of their property when a branch mysteriously falls and his Simon on the back of the head, killing him instantly. George then drags his brother’s body towards the house. Since there was a really bad storm passing, he and Annie are unable to call the Reverend to give Simon proper funeral, the pair bury him near the house. Soon after, George leaves the shanty and he eventually marries his neighbor’s daughter, Jenny Treece. Five months later Annie leaves the shanty and heads towards Walley Gaol. In a letter responding to Reverend McBain’s initial letter, James Mullen reports  to him that Annie Herron had indeed arrived at the Gaol. He writes that her story â€Å"all accords pretty well with what you told me. Events in her account begin to differ only with her husband’s death†(200). In her first version, she claims that she â€Å"picked up a rock and threw it at him (Simon), hitting him on the head†(200) ultimately killing him. When Mr. Mullen disputed her story she changed it, saying that she did not throw a rock but picked up a large rock smashing it down on his head. Mr. Mullen decided to admit her to the Gaol pending her getting charged with insanity. After trying to write to her friend Sadie Johnstone several times, Annie sews a final letter in a curtain, posted to find Sadie in Toronto. In this letter Annie gives a different account of the death of her husband. Again the story is similar to that of George’s except for the way Simon is killed. According to Annie, she says that George told her the story of the branch falling and hitting Simon, but notices when she is cleaning his body â€Å"where the axe had cut†(209). She goes on to tell her about how they buried him and about the dreams she had of Simon or George chasing her with an axe. The facts in the story are distorted several times and we are not really sure how Simon is killed. It is difficult to believe Annie because she doesn’t seem stable and has changed her story several times after her arrival at the Gaol. It is much easier to believe George Herron, because his state of mind was never in question and after all, his entire memoir was published in a newspaper. The final letter that Annie writes to Sadie makes me believe that this is the true account of Simon’s death. Annie has no reason to lie to Sadie because she probably fells that Sadie will never actually receive the letter, making her feel safe in revealing the truth.

Friday, January 10, 2020

Child Abuse in Vietnam

Banking Academy of Vietnam International Training Program (ITP) ——-o0o——- CHILD ABUSE IN VIETNAM Course Title:Academic writing Advisor: Student: Class: Hanoi, July 2012 1 ABTRACT In many countries, children are considered as the future of nation and should be provided with the best things, best condition for the development and nutrition. This is quite true and in fact, in developed countries such as the United States of America, France, Britain, Austria, etc. , children are always ranked as the highest priority more than other people.As â€Å"the future of country†, they must be protected far away from violence, infringement and exploitation. However, in contrast to developed countries, children in developing countries are not provided with good conditions and sometimes they are affected from something called abuse. Vietnam is also one of those countries suffering from this situation. So what is the real situation, causes and which solutions could best deal with that problem are what this paper will look into. Moreover, through it is expected that through the research the awareness of people regarding children could be much improved.Key words: child abuse, violence, infringement, exploitation, neglect, physical abuse, emotional abuse. CHAPTER I. INTRODUCTION 1. Research background: In Viet Nam, child abuse is a very hot topic and attracts a lot of attention from public. As a developing country, children in Vietnam are not provided with good condition and sometimes they are also considered as a kind of labor force. That could be happened everywhere from the city, mountainous areas, or countryside. 2. Research purpose: This research will identify the situation of child abuse in Vietnam and their causes, consequences as well as relevant solutions.Through it, reader may have better understanding of the situation and further contribute to the prevention of child abuse, at least in their family. 3. Definition of the key terms: In t his research, key terms are used and understood as follows: †¢Child abuse: child abuse or maltreatment constitutes all forms of physical and/or emotional ill-treatment, sexual abuse, neglect or negligent treatment or commercial or other exploitation, resulting in actual or potential harm to the child’s health, survival, development or dignity in the context of a relationship of responsibility, trust or power. Child neglect: Neglect is the failure to provide for the development of the child in all spheres: health, education, emotional development, nutrition, shelter, and safe living conditions, in the context of resources reasonably available to the family or caretakers and causes or has a high probability of causing harm to the child’s health or physical, mental, spiritual, moral or social development.This includes the failure to properly supervise and protect children from harm as much as is feasible †¢Physical abuse: Physical abuse of a child is that which results in actual or potential physical harm from an interaction or lack of an interaction, which is reasonably within the control of a parent or person in a position of responsibility, power or trust. There may be a single or repeated incidents. Emotional abuse: Emotional abuse includes the failure to provide a developmentally appropriate, supportive environment, including the availability of a primary attachment figure, so that the child can develop a stable and full range of emotional and social competencies commensurate with her or his personal potentials and in the context of the society in which the child dwells. There may also be acts towards the child that cause or have a high probability of causing harm to the child’s health or physical, mental, spiritual, moral or social development.These acts must be reasonably within the control of the parent or person in a relationship of responsibility, trust or power. Acts include restriction of movement, patterns of belittling , denigrating, scapegoating, threatening, scaring, discriminating, ridiculing or other non-physical forms of hostile or rejecting treatment. †¢Sexual abuse: Child sexual abuse is the involvement of a child in sexual activity that he or she does not fully comprehend, is unable to give informed consent to, or for which the child is not developmentally prepared and cannot give consent, or that violate the laws or social taboos of society.Child sexual abuse is evidenced by this activity between a child and an adult or another child who by age or development is in a relationship of responsibility, trust or power, the activity being intended to gratify or satisfy the needs of the other person. This may include but is not limited to: ? The inducement or coercion of a child to engage in any unlawful sexual activity; ? The exploitative use of child in prostitution or other unlawful sexual practices; ? The exploitative use of children in pornographic performances and materials. Exploitat ion: Commercial or other exploitation of a child refers to use of the child in work or other activities for the benefit of others. This includes, but is not limited to, child labor and child prostitution. These activities are to the detriment of the child’s physical or mental health, education, or spiritual, moral or social-emotional development. (Source: World Heal Organization) 4. Significance of the research: As children will be the people who make up the future, when they are not provided with good conditions, that could lead to serious consequences to family and society.The situation will worse when they are abused, the research, therefore, is aiming at find out the root causes, identify the possible consequences and solution. It can help readers to better understand the problem and have right behaviors such as: helping other children, having better behaviors to children. The best results could be raising awareness of the whole society and decreasing the child abuse in V ietnam. 5. Methodology: In this research, the following methods are used: Data collection from books, magazines, internet to get statistics, data and general understanding of child abuse in Vietnam as well as to review other researches in this topic and identify which aspects are still missed. †¢Questionnaires have been distributed to 100 of people of over 20 years old to collect their opinion and understanding about child abuse as well as to find some suggested solutions. Procedures: At first, researcher finds books, magazines and all sources of information related to child abuse to get statistics, data about the problem.From this activity, researcher has identified what is child abuse, its consequences, and the existing situation. Further more, it can help researcher to determine which aspect is still missed and needed to be studied more. After that, questionnaires are developed and distribute to 100 people from the age of 20 to identify their understanding about child abuse and also to collect some suggestions for the solutions. The questionnaires provides the researcher with practical point of view to compare with those written in book or magazines. CHAPTER II. RESULTS AND DISCUSSIONS 1. Situation of Child Abuse in VietnamFor children, family is the most solid and quiet shelter in their early years. To live with their parents and relatives and enjoy love as well as physical and mental care are the inalienable rights of every child. However, in fact, there are many children in Vietnam, who can't live like that. Even though Vietnam is one of the first members of the International Convention on the Rights of the Child, the situation of children affected by violence still occurs at serious level. It has actually become an anxiety for both society and family and does occur with not only girls but also boys.For our country, the situation of violence against children or child abuse in recent years tends to increase in both number and extent. Here are some st atistics on the media: From 2008-2009, there were 5956 cases of child abuse (an average of 3,000 cases a year), over 100 child murders and 50 kidnappings, child trafficking were detected and processed. Many children suffered from violence from their parents, family members, teachers, employers and the persons responsible for foster care. (em tim them mot so dan chung, so lieu ve lam dung tre em o Vietnam nhe) 2. Causes:Through collection of information and conduct of questionnaires, the following causes of the child abuse in Vietnam has been identified: Poverty Insufficient legal system Inappropriate teaching method Family break (em tim them mot so nguyen nhan nua nhe) Two main reasons are the same thing repeated: -First, The law is not sufficient deterrent. -Second, despite the law, but we do not comply in. Article 110 of the Penal Code on charges of torturing other people who have defined cruelty with an audience of dependent children shall be subject to warning, non-custodial ref orm for one year to three years.This is the sentence too light. While child abuse cases are often repeated in a long time that children not only affected physically but also mentally affected very badly, sometimes those that haunt the children for life. – At school, the punishment by using whips from customs, cultural traditions from the previous generation to the â€Å"Trade for the whip, to jump. † Under the old way of thinking of Vietnam, the teacher is very powerful, the idea that parents â€Å"should be the new hit†. So, should the majority support him, his teacher spanking children as a punishment to help them know the next time the error does not recur again.In addition to the teacher, the teacher with the indifference of pedagogy, the lack of knowledge of social, legal, psychological †¦ These factors led to the application of whips or insulting words to physical and spiritual children. – At home, along with the traditional view â€Å"Trade f or whip, to jump†, the parents reported that the use of whips children is their right, largely due to the education of children, with family present from 1 to 2 children, the parents are expecting children, investing heavily in education leading to heavy pressure with the children, using whips to force the children to achieve results as your parents want.Besides, there are many different reasons for parents to use whips for children, husband and wife hit me angry, angry with her husband also hit me, hit me daughter in response to her husband, son in law does not by his mother and wife also brought me out to battle †¦ in addition, a form of violence in the family, it is the excessive demand for their age and development of children and with words or actions that cause children to be mental damage, outraged, abandoned, rejected love . There are also many cases of children being beaten by parents' own childhood by their parents also lead to violence so traumatic and they als o teach children to use violence. The boys live in family violence, father or mother type . Long days also affected the character of father . (nhung ly do em neu o day chua thuyet phuc, em tim lai nhe) 2. Consequences: (tim lai cac hau qua, anh huong cua child abuse, phai ro rang theo tung muc vi du nhu: anh huong len gia dinh, anh huong len xa hoi, anh huong len giao duc, anh huong den tinh mang cua tre em, vv.. Violence against children is traumatic for children in psychiatric severity. The psychological research on children indicates that children are not cared for and caring will be taught psychological deviations unruly freedom, prefer to use violence. – The boys live in family violence, father or mother type †¦ Long days also affected the character of father. Many children are growing up and harsh, rude, even cruel to women like father or the child is more violence against women published. aking crime when enticeme. For girls, the most often aloof, afraid of men, a fraid of marriage, illness self-esteem, depression, panic neurological †¦ that is, the girls would be difficult to integrate with the community than the boys. – Both boys and girls often witnessed violence in the family, make sure the child is likely to have violence, poor education, may be arising negative intentions, and psychological operations are passive, there be prone to headaches, stomach pain and neuralgia style schizophrenia. Vulnerable age group is 5-10 years old †¦Domestic violence causes mental trauma in children, injuries that can last a lifetime, causing deep wounds in the minds of children â€Å". 3. Solutions The cases sexually abused children, domestic violence recently has once again sounding bells, there should be drastic measures to protect children. Along with that, in the current situation, policy system, legal protection, child care need to be completed quickly. Crimes against the immediate future, especially violence against children is to be heard with strict penalty, more closely.Need to build inter-sectoral coordination mechanisms at both central and unified basis in the detection, treatment, intervention, help abused children, domestic violence. Propaganda and dissemination of policies and laws of the State and measures to prevent and combat violence against children should be taken regularly to the executive committee, government, communities, schools, families and children. To ensure that in future, prevent and gradually reverse the violence, child abuse should focus on the weaknesses in the coordination of activities between ministries, sectors, localities and communities society.They also need to be urgently overcome the weaknesses in the overall investment structure and the overall budget for child protection; research established the National Commission on children to contribute to prevention of violence against children in the future. The authorities and relevant agencies should also consider the problem as a factor in the development of local society. Moreover, we should focus on building child protection system in which to strengthen and consolidate the team of civil servants, social workers engaged in the protection, care and forming services social protection young to be systematic and professional.System policies and laws on the protection and care for children should be completed quickly, clearly defining the responsibilities of all levels and branches in this area, can even study the construction of the law. For localities should do better propagation and dissemination of knowledge and education on violence against children and raise awareness of parenting for parents. Parents also must quickly try to correct the pragmatism that is affecting families, such as overly pampered children or children at the mercy †¦ And each family member should review yourself, do not blame each other.Need to devote more time to stay inside their loved ones, to understand and share with each o ther, especially when conflicts occur. Despite many difficulties and challenges, but in the next period by the resolution of legal, judicial, administrative and other measures of education, social conformity to stop and eventually reverse the violence power, abuse of children. In summary, to prevent violence against children requires the close coordination, synchronization between the three family environment, school and society. CHAPTER IV. CONCLUSION ReferencesAppendix Questionnaires used for the research: That survey researches about child abuse in Vietnam. This survey questionnaire aims to find out your knowledge child abuse. Therefore, your help is not only useful for me to complete my research, but also useful for futher this problem. Please complete all the following questions. Thanks you for your help! I. Personal Information (Please circle your choice) NAME: †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. DOB:†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1. Gender? Male Female 2. What is your age-group? 18-23 24-54 over 54 II.Multiple choice: Choose and circle the best answer 1. What do you think about reality child abuse in Vietnam? Very serious Normal Other answer 2. Who did talk to you about the event about child abuse in Vietnam? The mass media People around me Don’t pay attention 3. If you are in one of the child abuse. At this time happen, did you feel? Always calm (Luon binh tinh ) feeling scared It never happened to me 4. If you suspect or know of a child being abused. What would you do? Nothing Intervene and dissuade (Can thi? p va ngan c? n) Report to political power (Bao cao v? quy? n l? c chinh tr? ) 5. Child abuse- who is having responsibility about child abuse? Family and Social Themselves Both A and B III. Short answered questions: Give short answer of these below questions 1. In your opinion, what is cause of child abuse? 2. What should you do if you are young and you think you are being abuse d by your parent? 3. What do you say to a teen who is telling you that they are being abused? 4. Many parents think that spare the rod, spoil the child. What do you think about that opinion? Do you agree or disagree? Why?

Thursday, January 2, 2020

The Theory Of Deviant Behavior - 1608 Words

In this essay, I will critically assess that deviant behaviour is likely, related to the strength of social bonds. The Control Theory is the criminological theory, which is mostly driven by classicist beliefs, similar in the freedom of choice, and the ability to stop ourselves from committing a crime. It is a theory of why individual’s do not commit the crime? (Hirschi,1969) The theory was popular in the 1950’s/1960’s, as this was a new way of thinking since other theorists were interested, why do people commit a crime? and the control theory begins to explain the social controls/bonds to their society, which can insulate an individual from deviance. As it is presumed the majority of people would commit the crime if they had the chance. It†¦show more content†¦(Newburn, 2012: p236). Sykes and Matza’s (1957) theory was that delinquents do not usually believe in delinquent behaviour all the time, they conform most of the time and believe in community values. However, when delinquent behaviour is apparent, offenders deny responsibility, by saying â€Å"something came over me† (Sanderson, 1994: p94) Most delinquents grow out of their behaviour as they mature (Vold, Bernard and Snipes, 2002: p 182) Travis Hirschi ‘social bond’ theory (1969) theory insinuates that we all have the ability to commit the crime, but the stronger social bonds we have with intuitions like school and family, the more probable to conform. Hirschi recommended 4 categories of social control. Firstly, ‘Attachment’ this is the strength of the ties with family and friends. â€Å"Lack of attachment is directly conductive to delinquency because the unattached child does not have to consider the consequences of his actions for his relations with his parents†. (Hirschi, 1969: p98), which implies that individuals who are not in a secure relationship with their parents are more likely to endeavour in delinquency. However, not all unattached children break the law. Secondly, ‘Commitment’ this is how much of an individual’s time they are willing to invest in education. â€Å"Most, people simply by the process of living in an organized society, acquire goods, repu tations prospects thatShow MoreRelatedTheories for Sexually Deviant Behavior3637 Words   |  14 PagesIntroduction Each one of us, at some point in our lives, witness or come across people who have a behavior that cannot be termed as being normal. Depending on the severity of the deviant behavior that some people possess, they are labeled as offenders or criminals. However, it should be noted here that every criminal is some kind of an offender. The general broad terms that are used to categorize the aforementioned people are sexual offenders, violent offenders and substance abuse offenders. TheseRead MoreDifferential Opportunity Theory Of Deviant Behavior1334 Words   |  6 PagesDifferential Opportunity Theory Sociologists have created many theories to explain deviant behavior, how we learn it, and why we do it. The theory of anomie, differential opportunity, and general strain will be discussed throughout this paper to explain how a person is led to deviant behavior. Deviant behavior can be learned through many aspects of life however, there are many theories explain how this occurs. The anomie theory refers to the lack of normal ethical or social standards however; DurkhiemRead MoreDeviant Behavior / The Social Learning Theory1751 Words   |  8 Pages 2014 Social Behavior Final Paper – SOC 3380 Sherri Nichols DEVIANT BEHAVIOR, THE SOCIAL LEARNING THEORY, AND SOCIAL REACTION â€Æ' A person would be considered to be acting in a deviant manner within a social setting if they are violating the established social â€Å"norm† within that particular culture. What causes a human being to act in certain ways is a disputed topic among researchers. There are three types of researchers that have tried to answer this question. ThereRead MoreDeviant Behavior Essay1674 Words   |  7 PagesDeviant behavior refers to behavior that does not conform to norms, does not meet the expectations of a group of a society as a whole. After birth, children begin to experience situations with others. They are taught what he or she should and should not do, what is good or bad and what is right or wrong. Learning habits that conform to the customs and traditions of the groups into which the child is born develops a system of values. These values provide justification and motivation or for wantingRead More Deviant Behavior Essay1653 Words   |  7 PagesDeviant Behavior Deviant behavior refers to behavior that does not conform to norms, does not meet the expectations of a group of a society as a whole. After birth, children begin to experience situations with others. They are taught what he or she should and should not do, what is good or bad and what is right or wrong. Learning habits that conform to the customs and traditions of the groups into which the child is born develops a system of values. These values provide justification and motivationRead MoreThere Is A Wide Array Of Theories About The Cause Of Crime1102 Words   |  5 PagesThere is a wide array of theories about the cause of crime ranging from predisposition to environmental factors. Research and development of these delinquency theories have progressed and been categorized by biological, psychological, and sociological theories. A major biological theory is Richard Dugdale’s theory of inheritance. There are several psychological theories with two of them being intelligence t heory and Sigmund Freud’s personality trait theory. Sociological theories includes Emilie Durkheim’sRead MoreDeviance Theory Analysis Essay1564 Words   |  7 PagesDeviance Theory Analysis - Identify Deviance for situations and explain Within any given society, individuals are expected to behave and or conduct themselves in a given acceptable manner. However, there are instances when particular individuals act contrary to the set standards and violate the cultural norms. Such acts may include acts of crime, theft, defiance, breaking of rules, and truancy just to mention a few. Deviance could thus be viewed as the intentional or accidental violation of theRead MoreSocial Deviance : A Sociological Perspective On Deviant And Criminal Behavior Within Sociology1160 Words   |  5 PagesSociological theories of deviance are those that use social context and social pressures to explain deviance. You’ll find these in your readings for this week. Think of the diagram for a functionalist approach to deviance: Great post! You did a nice job defining deviance as a whole. A theory closely associated with this term is labeling theory. Labeling theory is one of the most important approaches to understanding deviant and criminal behavior within sociology. Labeling theory begins with theRead MoreDeviance Essay911 Words   |  4 Pagesï » ¿Theories Of Devaince Presented In There Are No Children Here The four theories of deviance are The Learning Theory, The Strain Theory, The Social-Bond Theory and the Labeling Theory. These theories alone can explain the reasoning behind someone’s deviant behavior. But, in There Are No Children Here we see all of these theories being demonstrated. This lets us have an understanding of exactly why we are seeing the deviant behavior that we are. This learning theory is basically the idea thatRead MoreThe Behavior Of Deviant Behavior976 Words   |  4 PagesNext, Hirschi explains commitment. Commitment may be hard for a person with deviant behavior. If you commit to want to do well you may succeed. But if you do not commit to anything then you may be involved in delinquency. Reason for this is that you do not have anything to lose. When you really do not have much to lose in life, then you tend to have a negative outlook on life. Commitment involves the time, energy and effort. For example, commitment on getting a great education involves putting your