Sunday, December 29, 2019

Measure Economic Health - Free Essay Example

Sample details Pages: 2 Words: 641 Downloads: 10 Date added: 2017/09/16 Category Economics Essay Type Argumentative essay Tags: Fiscal Policy Essay Did you like this example? Measuring Economic Health Memo Regina Jernigan ECO/212 Principles of Economics September 9, 2010 Terron Khemraj Measuring Economics Economics activity is measured by real Gross Domestic Product (GDP). Real Gross Domestic Product is the output of goods and services by labor and property within the United States (Bureau of Economic Analysis, 2010). Real GDP on average grows about 3. 5% each year and has an impact on the business cycle. The fiscal policy has a tremendous effect on individuals and businesses. The tax and interest rate plays a major role on the success or failure of the economy. The business cycle is measured by changes in real gross domestic product, and therefore, the focus is on changes in output and not input. Changes the government impose on purchases and taxes is aggregate demand can alter the level of real GDP. When government purchases decrease raises taxes, aggregate demand becomes slow and the rate of inflation decreases. Real GDP rises and fall over time, this cycle is known as the business cycle. Changes in federal taxes and purchases made by the government to achieve macroeconomic policy objectives are called fiscal policy (Hubbard and O’Brien, 2010). The several government bodies that determine national fiscal policy is as follows: * Office of the President of the United States – makes decision on changes to the fiscal policy * Department of Treasury – manages and constructs the fiscal policy * Office of Management and Budget – develops and analyzes the fiscal policy * Government Accountability Office – audits the fiscal policy Each member of government plays a critical role in determining the patter and level of economic activity. Congress and the presidents have used fiscal policy to fight recession. If a new fiscal policy takes longer than expected to be approved, this could cause harm. The Federal Open Market Committee can change the monetary policy at any of the eight meetings he ld each year, but the president and the majority of Congress has to agree to change the fiscal policy. This could cause a recession if the process takes too long for approval. When the fiscal policy increase aggregate supply, change taxes, and increase incentives to work and start a business (Hubbard and O’Brien, 2010). A decrease in taxes gives new businesses an opportunity to form, whereas, an increase in taxes makes it harder for business owners to afford to purchase or buy into a business. The pattern of government expenditure affects the potential for future economic growth because the role in public investment. The government decision to expand infrastructure by building bridges or repairing roadway, creates jobs that affects employment by decreasing the unemployment rate. The increase in jobs will cause a domino effect; employees will spend more causing production to increase to supply the demand of consumers. The fiscal policy can determine the level of activity and employment based on their interest rate. When taxes increase it allows consumers to be conscious spenders because they will not spend more with higher taxes. Whereas, when taxes are cut consumers increase their spending to consume more of their needs and wants. If no new jobs, production begins to layoff causing the unemployment rate to increase and consumer spend less. When interest rates increases, credit becomes limited, and production decreases. On the other hand, when interest rates decreases, more money is available and banks loan more and production begins to increase. Businesses availability to expand is favorable when the interest rate decreases. A decrease in interest rate leads to an increase in hiring causing production to increase. The fiscal policy has a negative effect if the tax and interest rate increase causing consumers to spend less and businesses are not able to expand. When tax and interest rate decrease, it has a positive effect allowing more spending of consumers and businesses to expand. References Hubbard, R. G. , OBrien, A. P. (2010). Economics (3rd ed. ). : Prentice Hall https://www. istockanalyst. com/ Don’t waste time! Our writers will create an original "Measure Economic Health" essay for you Create order

Saturday, December 21, 2019

Literary Analysis A Werewolf By Marie De France

A werewolf is someone who changes form into a wolf for a period of time, typically around the full moon. It is unknown when and where the first werewolf myths came to be, but one of the earliest recordings is of Bisclavret by Marie de France. In her story, the protagonist is a baron from Brittany, who has to leave his otherwise normal life for three days each week and roam the woods as a werewolf. As a nobleman in human form, he has conformed to and personified masculine gender norms of the middle ages, yet once he has transformed into Bisclavret, they are abandoned. To be masculine during any age, is to be in possession of the traits or qualities associated with men. The gender norms represented in Bisclavret by Marie de France are so†¦show more content†¦Once the stolen clothes were returned, however, Bisclavret would not transform while others were present. He was ashamed, and refused to be vulnerable and naked in front of others. Only when he has been left alone for a time does he transform from Bisclavret back into the baron, regaining his identity, his masculinity, and his self-worth as he placed the clothing back upon his body. Even though the clothing was the physical object that was used to signify the emasculation of the baron, the loss of his masculinity, self-worth, and identity, occurred on multiple levels. At the point when the clothes are returned to Bisclavret, and he consciously chose to delay the process of morphing back into human form, we can no longer infer that the baron s declaration of his need for clothing to become a man again, was strictly physical. His fear of losing his station within society, by appearing naked in front of others, was greater than that of remaining a beast. How masculine a man was perceived to be by society was based upon how he acted, the things he owned, and the power he possessed. Masculinity in the middle ages was fundamentally intertwined with the chivalric code – the informal and varying codes of conduct for the medieval institution of knighthood – which included courtly love, the honor code, and military etiquette.Show MoreRelated##mal Characters In Bisclavret And The Yellow Wallpaper By Charlotte Perkins Gilman1408 Words   |  6 Pagesconsidered human. Characters with abnormal traits are used to create fear in the reader as they look upon the accounts of strange, crazy and even macabre characters. Two examples of abnormal characters in literature are the knight from â€Å"Bisclavret† by Marie de France and the protagonist of â€Å"The Yellow Wallpaper† by Charlotte Perkins Gilman. Each of these characters represent the opposite ends of the peculiar character spectrum, with the knight representing a monstrous body and the woman from â€Å"The Yellow Wallpaper†

Friday, December 13, 2019

Phospholipids Free Essays

Along with sterol, phospholipids make up 5% of lipids in diet Best know phospholipids is lecithin Has backbone of glycerol 2 of it 3 attachments occupied by fatty acid like those of triglycerides The third space occupied by a phospholipids group and a molecule of choline Soluble in both fats and water Fatty acids make phospholipids soluble in fat Phosphate group allow phospholipids to dissolve in water and this allows the phospholipids used as an Emulsifier to mix with water in products such as mayo and candy. Phospholipids are found naturally in foodsThe richest sources of lecithin are in: Eggs Liver Soybeans Wheat germ Peanuts ACTION OF PHOSPHOLIPIDS: Lecithin’s decrease other phospholipids are important composition of cell membranes Helps lipids move across cell membranes because soluble in both water and fats such as Vitamins Hormones Act as an emulsifiers keeping fat suspended in the blood and body fluids Do not need to take supplement of lecithin because the liver makes lecithin from scratch Large doses of lecithin can cause GI distress, sweating and loss of appetitePhospholipids, including lecithin, have a unique chemical structure that allows them to be soluble in both water and fat. In the body, phospholipids are part of cell membranes; the food industry uses phospholipids as emulsifiers to mix fats with water. We will write a custom essay sample on Phospholipids or any similar topic only for you Order Now A cell membrane is made of phospholipids assemble into an orderly formation called a bilayer. The fatty acid tails orient themselves away from the watery fluid inside and outside of the cell. The glycerol and phosphate heads are attracted to the watery fluid. STEROLS Most common sterol is cholesterol.Cholesterol is made in the body and comes from foods. Derived from both plants and animal contain sterols, animals contain significant amounts of cholesterol. Cholesterol is in dietary foods and blood. The good and bad cholesterol is found in blood only. The chemical structure of good cholesterol and blood cholesterol have the same chemical structure but cholesterol that is made in the body is called ENDOGENOUS, whereas cholesterol from outside the body (from food) is called EXOGENOUS. Vitamin D, a fat-soluble vitamin, is synthesized from cholesterol.Sterols other than cholesterol is found in plants, are structurally similar to cholesterol but plant sterols interfere with cholesterol absorption this lowering cholesterol levels. Margarine is a functional food with plant sterols to help reduce blood cholesterol. ROLES OF STEROLS Many important body compounds are sterols. Among them are: Bile acids Sex hormones, testosterone Adrenal hormones, cortisol Vitamin D Cholesterol itself Cholesterol in the body is the starting material for synthesis of: Bile acidsSteroid hormones such as testosterone, androgens, estrogens, cortisol, progesterone, cortisone and aldosterone. Vitamin D Sterols have a multiple ring structure that differs from the structure of other lipids. In the body, sterols include cholesterol, bile, vitamin D, and some hormones. Animal derived foods contain cholesterol. To summarize, the members of the lipid family include: SUMMARY OF LIPIDS: TRIGLYCERIDES: fats and oils and made up of * Glycerol: 1 per triglyceride * Fatty acids: 3 per triglyceride and fatty acids maybe: * Saturated, no double bonds * Monounsaturated, 1 double bond Polyunsaturated, more than 1 double bond and depending on location of the double bonds polyunsaturated fatty acids maybe: * Omega-3 where 1st double bon d is 3 carbons away from methyl group (CH3)* Omega-6 where 1st double bond is 6 carbons away from the methyl end MAJOR SOURCES OF SATURATED FATS: * Whole milk, cream, butter, cheese * Fatty cuts of beef and pork * Coconut, palm, and palm kernel oils MAJOR SOURCES OF OF CHOLESTEROL * Eggs * Mild products * Meat * Poultry * shellfish PHOSPHOLIPIDS: major one is lecithin STEROLS: include cholesterol In the body, triglycerides: Provide and energy, reserve when stored in the body’s fat tissue * Insulate against temperature extremes * Protect against shock * Help the body use carbohydrate and protein efficiently LINOLEIC ACID is an 18-carbon omega 6 fatty acid, LINOLENIC ACID is an 18-carbon omega 3 fatty acid, and both are essential nutrients. They serve as structural parts of cell membranes and as precursors to the longer fatty acids that can make eicosanoids, a powerful compound that participate in blood pressure regulation, blood clot formation, and the immune response to injur y and infection, among other functions. Because essential fatty acids are common in the diet and stored in the body, deficiencies are unlikely. REVIEW: The three classes of lipids found in the body and in foods are: Triglycerides Phospholipids Sterol The functions of triglycerides are: Carry fat-soluble vitamins Induce satiety Provide body with a continuous food supply Keep body warm Protect it from mechanical shock Serve as starting materials for hormonal regulations The functions of phospholipids and sterols: Con:tribute to cells structures The functions of cholesterol Serves as raw material for hormones, vitamin D, and bileThe features that fats bring to food are: Fats enhance foods aroma and flavor Increase palatability Provide kcal and fat-soluble vitamins The features that distinguish fatty acids from each other are: Essentially and no essentiality Size indicated by number of carbons Saturated versus unsaturated Location of double bonds in unsaturated fatty acids The term omega with the respect to fatty acids is: In polyunsaturated fatty acids, omega refers to the relative place in which the first double bond is located from the methyl end of the chain.The roles of the omega fatty acids in disease prevention is: The structures are important to health as they are essential nutrients used to make hormone like substances that play regulatory roles in the body. Omega 3 fatty acids may lower risk of some cancers and heart disease. Phospholipids differ from triglycerides is that: Phospholipids have a choline or other phosphorus containing acid in place of one of the fatty acids, enabling them to function as emulsifiers in the body. Phospholipids allows the fatty acids to dissolve in water Phospholipids differ from cholesterol:Cholesterol is a sterol, and its C, H, and O atoms are arranged in rings. Cholesterol in the body can serve as starting material for many important body compounds The roles of phospholipids in the body are: Phospholipids are important parts of cell membranes They help lipids mov e back and forth across the cell membranes into the watery fluids on both sides Enable fat-soluble vitamins and hormones to pass easily in and out of cells The roles of cholesterol are: Provides energy Serves as part of cell membranes, bile acids, sex hormones, adrenal hormones and vitamin D The steps of fat digestion, absorption, and transport are:Bile emulsifies fats, allowing the enzymes to gain access to the fat for digestion Products of lipid digestion are packaged with protein for transport The route cholesterol takes in the body is: Cholesterol shuttles back and forth between the liver and the body cells in lipoproteins, and it visits the intestinal tract in the form of bile. Structure and functions of lipoproteins: Composed of triglycerides, cholesterol, phospholipids, and proteins, lipoproteins transport lipids in the body The differences amount the chylomicrons: Are the largest of the lipoproteins,Formed in the intestinal wall following fat absorption They contain mostly triglycerides Describe VLDL, LDL, HDL: VlDL are made in the liver and contains mostly triglycerides LDL contains few triglycerides but are about half cholesterol, bad cholesterol HDL is about half protein and transport cholesterol back to the liver Which of the fatty acids are essential and they are found where: Linolenic acid Linoleic acid Both are found in vegetable oils and meats, grains, seeds, nuts, leafy vegetables, fish Excessive fat intake influences health:Excessive fat intake can contribute to elevated blood cholesterol and other blood lipids, therefore heart disease, obesity, and cancer can occur. Some saturated fats raise total cholesterol and LDL, trans-fatty acids raise LDL and lower HDL. Monounsaturated fats lower LDL without lowering HDL The dietary recommendations regarding fat and cholesterol intake and ways to reduce intake: To consume a diet that is low in saturated fat, trasn fat and cholesterol, limit total fat intake to 20 to 36% of daily energy from fat, consume 5 to 10 of daily energy from linoleic aid and 0. 6 to 1. percent from linolenic acid. To reduce fat intake select lean meats and nonfat milk, eat plenty of vegetables, fruits, and grains, use fats and oils sparingly, look for invisible fat, and read food labels. The lipid include: Triglycerides, phospholipids, sterols The roles of body fat are: Maintain cell structure Protect organs Provide energy Protect lean tissue from depletion The roles of food fat are: Provide palatability Provide satiety Deliver fat soluble vitamins Provide kcalories Triglycerides are made of: Glycerol 3 fatty acids The lipoproteins are: Chylomicron VLDL LDL HDL How to cite Phospholipids, Papers

Thursday, December 5, 2019

Intranet and Extranet Essay Example For Students

Intranet and Extranet Essay Teddy Czech 8/27/10 Module 08 Written Assignment Comparing Networks The intranet network is a collection of private networks within an organization. It uses network technologies as a tool to communicate between people or workgroups. This tool is to help improve data sharing within the business. The intranet network is completely secure and has no portals to the outside world. The intranet network is completely an internal network, which the users maybe an executive team, human resources, accounting and or internal employees. One example for an internet network comes from the web browser; â€Å"Google†. Google has an intranet called: â€Å"Moma†. This is for the Google employees to have access to certain business related information like for payroll, phone numbers, news, and any contact information. The extranet network is a computer network that allows controlled information to be accessible from the outside for business or education. Extranets are not open connections a user must login and have security certificates in order to function correctly. The extranet network is less secure, but new technology makes it more secure with new software and certain firewalls. Users of the extranet network are for companies to share information or data with external users. Some examples are; vendors, suppliers, customers, or business clients. An example of a business using an extranet network is â€Å"AFLAC†. This is to manage, control, and store information which is shared to employees that are external. AFLAC uses an e-business application called â€Å"Livelink†. This is for employees to work efficient in collecting or sending important information to their business or clients. The internet network is a worldwide system of computer networks that share information, email, chat, and has web pages. It is made up of thousands of commercial, academic and government networks. Users of the internet are the public at large, employees, businesses all over the world to share information. Any businesses using the internet will be able to communicate, share meaningful and useful accessible information. The businesses will grow and share to customers, businesses, advertise, employees, and the public at large, all over the world. I think as for running a business it is essential to have and make all three of these networks work in their business. It is important keep have employees collect information internally and externally. Not all business needs an external network, but if it came down to I. S department or I. T. department it is very well needed. This is so the company is watched from external networks hacking away into their business. The internet network is more for the upper management to collect information to push business forward. These are my resources for the Intranet: http://blogoscoped. com/archive/2007-11-28-n25. html â€Å"What the Google Intranet Looks Like† Philipp Lenssen Tony Ruscoe Wednesday, November 28, 2007) http://googlesystem. blogspot. com/2005/12/moma-google-intranet. html MOMA Google intranet ( Alex Chitu, Wednesday, December 14, 2005) These are my resources for the Extranet: http://www. allbusiness. com/technology/software-services-applications-information/6530684-1. html â€Å"AFLAC Uses Livelink Enterprise Wide to Drive Collaborative CRM and Improve Efficiencies† (Business Wir e, Thursday, November 9 2000) My resources for the Internet: http://www. tbchad. com/bususe. html â€Å"Business Uses of the Internet† ( Terry Brainerd Chadwick, 1997)

Thursday, November 28, 2019

Abortion Essays (141 words) - Abortion In The United States

Abortion Essays (141 words) - Abortion In The United States Abortion My view on the abortion is pro-choice so I will debate the issue from the pro-life point of view. Abortion is in a word: murder. There is no way around it , people that have abortions are committing a crime. If one was killing a person who could defend themselves they would go to jail but the people who have abortions just get continue on with their sinful lives. Pro-choice promoters say that it is an embryo and having an abortion is nothing but when the sperm attaches to the egg , life is born. Pro-life wants nothing more than to see life carry on. Abortion is also an advanced form of birth control., it gives people an out when they get in trouble. People can have unprotected sex without consequences. Abortion is horrible and should be abolished.

Sunday, November 24, 2019

buy custom Clasical Mythology essay

buy custom Clasical Mythology essay Hera Zygia - protector of family and marriage (Burkert 184). Consort and queen(Hesiod, the Homeric Hymns and Homerica, 125). Athena - Hippia - tamer of horses (Paus. V. 15. 4). Goddess of wisdom, skill and war (Hesiod, the Homeric Hymns and Homerica, 125). Artemis Orsilochia (Lochia) protector of women given a birth (Orph. Hymn. 35. 3). Goddess of the hunt and the moon and protector of expectant women and the young (Hesiod, the Homeric Hymns and Homerica, 125). Hephaestus Amphigyeeis lame on both feet (Homer, Iliad. I. 599). God of metallurgy and the smith of the Olympian gods (Hesiod, the Homeric Hymns and Homerica, 128). Aphrodite Philommeides a laughter-loving woman. Goddess of love, beauty and eternal youth (Hesiod, the Homeric Hmns and Homerica, 125). Ares Obrimus the mighty worrior. God of war and figure of violence (Hesiod, the Homeric Hymns and Homerica, 124). Iris Aellopus a storm-footed girl. Goddess of the rainbow, messenger to the gods (Ancient Greek beliefs, 96). Poseidon Hippios riding a horse (Paus. I. 30. 4). God of the seas, horses and the earthquakes (Encyclopaedia of the ancient Greek world, (Ancient Greek Beliefs, 275). Zeus Ombrios giver of rain (Paus. I. 32. 3). Father of the Olympian gods and ruler of mankind (Culture and values: A survey of Humanities, (Ancient Greek Beliefs, 33) Define and give an example for the following words. Archetype refers to the original model which acts as aa base to develop all other things of the same kind. For example, a hero, like Prometeus. Humanism is a practice that mainly deals with human values and emphasizes mainly on human being and not divine matters. Secular humanism is a good example, it is against religious knowledge as a basis of uprightness and decision making. Anthropomorphic is an ascribing of the human form, features, or attributes to something or someone, especially a deity, or an animal. All god and goddeses of te Ancient Greek possed human features. Etiology is a general study of causes or origins of certains things or notions, which are usualy explained through mythologic terms; for example, the name Delphi and the deity associated with it. Chthonian is a classical myth or legend of something related to the underworld; for example, legend on Hades the rape of Persephone. Buy custom Clasical Mythology essay

Thursday, November 21, 2019

Development of a Conference Centre in London Essay

Development of a Conference Centre in London - Essay Example Several changes over the past 20 years have made London a fitting venue for international conferences and their development is the subject of this paper. Among these changes are the globalisation of economic sectors, the dominance of the finance and business sectors, interlinked with advances in technology; increased inter-relationship between major economies, internationalisation of investment and trade, developments in telecommunications and transport which has shrunk distances between people, markets, and business decision makers; movement of people across borders with their fresh ideas, new cultures, enhanced skills and access to new markets; growth of incomes and wealth with particularly strong demand for leisure and tourism activities; and the 2012 Olympic and Paralympic Games that will be hosted by the city of London. Greater London, the administrative subdivision of London, England covers the City of London including Middle Temple and Inner Temple, and 32 London boroughs: City of Westminster, Kensington and Chelsea, Hammersmith and Fulham, Wandsworth, Lambeth, Southwark, Tower Hamlets, Hackney, Islington, Camden, Brent, Ealing, Hounslow, Richmond upon Thames, Kingston upon Thames, Merton, Sutton, Croydon, Bromley, Lewisham, Greenwich, Bexley, Havering, Barking and Dagenham, Redbridge, Newham, Waltham Forest, Haringey, Enfield, Barnet, Harrow, and Hillingdon. As of mid-2006, the population of Greater London was at 7,512,400 official residents in an area of 1,579 square kilometers (Reference.com, 2008). According to Yell Limited (2008), there are over 300 conference facilities and services providers in London. This makes it seem like developing a new conference centre within the area would face tough competition. The objective of this paper is to conduct an analysis of the macro-environmental factors which come into play when planning for the development of a conference center, specifically within the Greater London area. Analysis PEST analysis stands for Political, Economic, Social, and Technological which describes a framework of macro-environmental factors used in the environmental scanning component of strategic management. It is part of the analysis of the external environment which helps in understanding market growth or decline, business position, and potential and/or direction for operations. Political factors include political stability, legal framework for contract enforcement, trade regulations and tariffs, anti-trust laws, pricing regulations, taxation, wage legislation, work week, mandatory employee benefits, industrial safety regulations and the like. Economic factors include type of economic system, government intervention in the free market, exchange rates and stability of currency, efficiency of financial markets, quality of infrastructure, skill level of workforce, labor costs, economic growth rate, unemployment rate, inflation rate, interest rates and the like. Social factors include demogr aphics, class structure, education, culture and gender roles, environmental consciousness, leisure interests and the like. Technology factors include technology developments and impact of technology on the business (NetMBA, 2007). Politically and economically speaking, London is very politically and economically stable. This is evidenced by the fact that London is a major centre for international

Wednesday, November 20, 2019

Justification for an Internal Control System Essay - 2

Justification for an Internal Control System - Essay Example he organization already has controls in place with the insurance and portfolio approach, the controller has chosen to develop a system to enable determination of intended operations within the organization. The system chosen focuses on the function of inventory management. At present, the company has an insurance policy that covers theft from both employees and outsiders. This system will evaluate the effectiveness of inventory management processes with the objective of facilitating a reduction in insurance premiums to the company. It will, therefore, complement the existing policy on insurance, while at the same time saving the company money. The system recommends that the stores department receives the good that the company purchases. It also recommends that suppliers invoice on delivery and provide delivery notes, lest the stores department declines to accept the goods. Additionally, the stores attendant in conjunction with the company security do the verification that the goods that the delivery invoiced are the ones it delivered. The finance department is to carry out occasional random spot checks to verify the case. The stores department then books the goods into the information system. After this, there is approval of the goods if they are in the general ledger, which is done in the finance department; this ensures segregation of duties and provides a check system for the two departments. Thereafter, the inventory controller at the finance department counter-checks each booking with related invoice to verify compliance with the invoice number, value added tax (VAT) computations, invoice amount, invoice quantity and reasonability of the prices. Then the head of finance on a daily basis should confirm that the inventory is booked on the right cost centre to help in distinguishing between cost of sales and operating expenses. If the booking is correct, the inventory controller gives approval and the general ledger is updated. Breakages With regards to items

Monday, November 18, 2019

USA Drug Policy approach on Colombia and Afghanistan Essay

USA Drug Policy approach on Colombia and Afghanistan - Essay Example The first part of this paper will therefore focus on the US drug policy in Colombia and the second part of this paper will evaluate the US drug policy in Afghanistan. The final part of this paper will provide a comparative analysis of the US drug policy toward the two countries and will offer key findings and explain how these two different policies are designed to achieve the same goal, although influenced by different political considerations. As the paper declares the US Office of National Drug Control Policy reports that Colombia is the source of more than 90 percent of the cocaine that infiltrates the US. Likewise the US identifies Colombia as a significant source of heroin in the US. Liang-Fenton characterizes the US drug policy toward Colombia as one of â€Å"eradication, interdiction and extradition†. Eradication is aimed at the crop and invariably involves â€Å"aerial herbicide†. Interdiction involves interdicting the drugs either in the source country or en route to the US and requires cooperation with the security personnel of the source state. Extradition is motivated by eliminating and/or immobilizing drug traffickers on a state to state cooperation basis. The US response to a Colombian judge’s release from prison of Jorge Ochoa, a â€Å"notorious cocaine capo† in 1987 illustrates the point. The Colombian government’s jurisdiction over the judge was entirely limited. The US re sponded by criticizing and ridiculing Colombia and in addition subjected Colombian travelers and Colombian products to intensive checks by US Customs at entry ports into the US.

Friday, November 15, 2019

Handwritten Character Recognition Using Bayesian Decision Theory

Handwritten Character Recognition Using Bayesian Decision Theory Abstract: Character recognition (CR) can solve more complex problem in handwritten character and make recognition easier. Handwriting character recognition (HCR) has received extensive attention in academic and production fields. The recognition system can be either online or offline. Offline handwritten character recognition is the sub fields of optical character recognition (OCR). The offline handwritten character recognition stages are preprocessing, segmentation, feature extraction and recognition. Our aim is to improve missing character rate of an offline character recognition using Bayesian decision theory. Keywords: Character recognition, Optical character recognition, Off-line Handwriting, Segmentation, Feature extraction, Bayesian decision theory. Introduction The recognition system can be either on-line or off-line. On-line handwriting recognition involves the automatic conversion of text as it is written on a special digitized or PDA, where a sensor picks up the pen-tip movements as well as pen-up/pen-down switching. That kind of data is known as digital ink and can be regarded as a dynamic representation of handwriting. Off-line handwriting recognition involves the automatic conversion of text in an image into letter codes which are usable within computer and text-processing applications. The data obtained by this form is regarded as a static representation of handwriting. The aim of character recognition is to translate human readable character to machine readable character. Optical character recognition is a process of translation of human readable character to machine readable character in optically scanned and digitized text. Handwritten character recognition (HCR) has received extensive attention in academic and production fields. Bayesian decision theory is a fundamental statistical approach that quantifies the tradeoffs between various decisions using probabilities and costs that accompany such decision. They divided the decision process into the following five steps: Identification of the problem. Obtaining necessary information. Production of possible solution. Evaluation of such solution. Selection of a strategy for performance. They also include a sixth stage implementation of the decision. In the existing approach missing data cannot be recognition which is useful in recognition historical data. In our approach we are recognition the missing words using Bayesian classifier. It first classifier the missing words to obtain minimize error. It can recover as much error as possible. Related Work The history of CR can be traced as early as 1900, when the Russian scientist Turing attempted to develop an aid for the visually handicapped [1]. The first character recognizers appeared in the middle of the 1940s with the development of digital computers. The early work on the automatic recognition of characters has been concentrated either upon machine-printed text or upon a small set of well-distinguished handwritten text or symbols. Machine-printed CR systems in this period generally used template matching in which an image is compared to a library of images. For handwritten text, low-level image processing techniques have been used on the binary image to extract feature vectors, which are then fed to statistical classifiers. Successful, but constrained algorithms have been implemented mostly for Latin characters and numerals. However, some studies on Japanese, Chinese, Hebrew, Indian, Cyrillic, Greek, and Arabic characters and numerals in both machine-printed and handwritten cas es were also initiated [2]. The commercial character recognizers were available in the 1950s, when electronic tablets capturing the x-y coordinate data of pen-tip movement was first introduced. This innovation enabled the researchers to work on the on-line handwriting recognition problem. A good source of references for on-line recognition until 1980 can be found in [3]. Studies up until 1980 suffered from the lack of powerful computer hardware and data acquisition devices. With the explosion of information technology, the previously developed methodologies found a very fertile environment for rapid growth addition to the statistical methods. The CR research was focused basically on the shape recognition techniques without using any semantic information. This led to an upper limit in the recognition rate, which was not sufficient in many practical applications. Historical review of CR research and development during this period can be found in [4] and [3] for off-line and on-line cases, respectively. The real progress on CR systems is achieved during this period, using the new development tools and methodologies, which are empowered by the continuously growing information technologies. In the early 1990s, image processing and pattern recognition techniques were efficiently combined with artificial intelligence (AI) methodologies. Researchers developed complex CR algorithms, which receive high-resolution input data and require extensive number crunching in the implementation phase. Nowadays, in addition to the more powerful computers and more accurate electronic equipments such as scanners, cameras, and electronic tablets, we have efficient, modern use of methodologies such as neural networks (NNs), hidden Markov models (HMMs), fuzzy set reasoning, and natural language processing. The recent systems for the machine-printed off-line [2] [5] and limited vocabulary, user-dependent on-line handwritten characters [2] [12] are quite satisfactory for restricted applications. However, there is still a long way to go in order to reach the ultimate goal of machine simulation of fluent human reading, especially for unconstrained on-line and off-line handwriting. Bayesian decision Theory (BDT), one of the statistical techniques for pattern classification, to identify each of the large number of black-and-white rectangular pixel displays as one of the 26 capital letters in the English alphabet. The character images were based on 20 different fonts and each letter within 20 fonts was randomly distorted to produce a file of 20,000 unique instances [6]. Existing System In this overview, character recognition (CR) is used as an umbrella term, which covers all types of machine recognition of characters in various application domains. The overview serves as an update for the state-of-the-art in the CR field, emphasizing the methodologies required for the increasing needs in newly emerging areas, such as development of electronic libraries, multimedia databases, and systems which require handwriting data entry. The study investigates the direction of the CR research, analyzing the limitations of methodologies for the systems, which can be classified based upon two major criteria: 1) the data acquisition process (on-line or off-line) and 2) the text type (machine-printed or handwritten). No matter in which class the problem belongs, in general, there are five major stages Figure1 in the CR problem: 1) Preprocessing 2) Segmentation 3) Feature Extraction 4) Recognition 5) Post processing 3.1. Preprocessing The raw data, depending on the data acquisition type, is subjected to a number of preliminary processing steps to make it usable in the descriptive stages of character analysis. Preprocessing aims to produce data that are easy for the CR systems to operate accurately. The main objectives of preprocessing are: 1) Noise reduction 2) Normalization of the data 3) Compression in the amount of information to be retained. In order to achieve the above objectives, the following techniques are used in the preprocessing stage. Preprocessing Segmentation Splits Words Feature Extraction Recognition Post processing Figure 1. Character recognition 3.1.1 Noise Reduction The noise, introduced by the optical scanning device or the writing instrument, causes disconnected line segments, bumps and gaps in lines, filled loops, etc. The distortion, including local variations, rounding of corners, dilation, and erosion, is also a problem. Prior to the CR, it is necessary to eliminate these imperfections. Hundreds of available noise reduction techniques can be categorized in three major groups [7] [8]: a) Filtering b) Morphological Operations c) Noise Modeling 3.1.2 Normalization Normalization methods aim to remove the variations of the writing and obtain standardized data. The following are the basic methods for normalization [4] [10][16]. a) Skew Normalization and Baseline Extraction b) Slant Normalization c) Size Normalization 3.1.3 Compression It is well known that classical image compression techniques transform the image from the space domain to domains, which are not suitable for recognition. Compression for CR requires space domain techniques for preserving the shape information. a) Threshold: In order to reduce storage requirements and to increase processing speed, it is often desirable to represent gray-scale or color images as binary images by picking a threshold value. Two categories of threshold exist: global and local. Global threshold picks one threshold value for the entire document image which is often based on an estimation of the background level from the intensity histogram of the image. Local (adaptive) threshold use different values for each pixel according to the local area information. b) Thinning: While it provides a tremendous reduction in data size, thinning extracts the shape information of the characters. Thinning can be considered as conversion of off-line handwriting to almost on-line like data, with spurious branches and artifacts. Two basic approaches for thinning are 1) pixel wise and 2) nonpareil wise thinning [1]. Pixel wise thinning methods locally and iteratively process the image until one pixel wide skeleton remains. They are very sensitive to noise and may deform the shape of the character. On the other hand, the no pixel wise methods use some global information about the character during the thinning. They produce a certain median or centerline of the pattern directly without examining all the individual pixels. In clustering-based thinning method defines the skeleton of character as the cluster centers. Some thinning algorithms identify the singular points of the characters, such as end points, cross points, and loops. These points are the source of problems. In a nonpareil wise thinning, they are handled with global approaches. A survey of pixel wise and nonpareil wise thinning approaches is available in [9]. 3.2. Segmentation The preprocessing stage yields a clean document in the sense that a sufficient amount of shape information, high compression, and low noise on a normalized image is obtained. The next stage is segmenting the document into its subcomponents. Segmentation is an important stage because the extent one can reach in separation of words, lines, or characters directly affects the recognition rate of the script. There are two types of segmentation: external segmentation, which is the isolation of various writing units, such as paragraphs, sentences, or words, and internal segmentation, which is the isolation of letters, especially in cursively written words. 1) External Segmentation: It is the most critical part of the document analysis, which is a necessary step prior to the off-line CR Although document analysis is a relatively different research area with its own methodologies and techniques, segmenting the document image into text and non text regions is an integral part of the OCR software. Therefore, one who works in the CR field should have a general overview for document analysis techniques. Page layout analysis is accomplished in two stages: The first stage is the structural analysis, which is concerned with the segmentation of the image into blocks of document components (paragraph, row, word, etc.), and the second one is the functional analysis, which uses location, size, and various layout rules to label the functional content of document components (title, abstract, etc.) [12]. 2) Internal Segmentation: Although the methods have developed remarkably in the last decade and a variety of techniques have emerged, segmentation of cursive script into letters is still an unsolved problem. Character segmentation strategies are divided into three categories [13] is Explicit Segmentation, Implicit Segmentation and Mixed Strategies. 3.3. Feature Extraction Image representation plays one of the most important roles in a recognition system. In the simplest case, gray-level or binary images are fed to a recognizer. However, in most of the recognition systems, in order to avoid extra complexity and to increase the accuracy of the algorithms, a more compact and characteristic representation is required. For this purpose, a set of features is extracted for each class that helps distinguish it from other classes while remaining invariant to characteristic differences within the class[14]. A good survey on feature extraction methods for CR can be found [15].In the following, hundreds of document image representations methods are categorized into three major groups are Global Transformation and Series Expansion, Statistical Representation and Geometrical and Topological Representation . 3.4. Recognition Techniques CR systems extensively use the methodologies of pattern recognition, which assigns an unknown sample into a predefined class. Numerous techniques for CR can be investigated in four general approaches of pattern recognition, as suggested in [16] are Template matching, Statistical techniques, and Structural techniques and Neural networks. 3.5. Post Processing Until this point, no semantic information is considered during the stages of CR. It is well known that humans read by context up to 60% for careless handwriting. While preprocessing tries to clean the document in a certain sense, it may remove important information, since the context information is not available at this stage. The lack of context information during the segmentation stage may cause even more severe and irreversible errors since it yields meaningless segmentation boundaries. It is clear that if the semantic information were available to a certain extent, it would contribute a lot to the accuracy of the CR stages. On the other hand, the entire CR problem is for determining the context of the document image. Therefore, utilization of the context information in the CR problem creates a chicken and egg problem. The review of the recent CR research indicates minor improvements when only shape recognition of the character is considered. Therefore, the incorporation of contex t and shape information in all the stages of CR systems is necessary for meaningful improvements in recognition rates. The proposed System Architecture The proposed research methodology for off-line cursive handwritten characters is described in this section as shown in Figure 2. 4.1 Preprocessing There exist a whole lot of tasks to complete before the actual character recognition operation is commenced. These preceding tasks make certain the scanned document is in a suitable form so as to ensure the input for the subsequent recognition operation is intact. The process of refining the scanned input image includes several steps that include: Binarization, for transforming gray-scale images in to black white images, scraping noises, Skew Correction- performed to align the input with the coordinate system of the scanner and etc., The preprocessing stage comprise three steps: (1) Binarization (2) Noise Removal (3) Skew Correction Scanned Document Image Feature Extraction Bayesian Decision Theory Training and Recognition Pre-processing Binarization Noise Removal Skew correction Segmentation Line Word Character Recognition o/p Figure 2. Proposed System Architecture 4.1.1 Binarization Extraction of foreground (ink) from the background (paper) is called as threshold. Typically two peaks comprise the histogram gray-scale values of a document image: a high peak analogous to the white background and a smaller peak corresponding to the foreground. Fixing the threshold value is determining the one optimal value between the peaks of gray-scale values [1]. Each value of the threshold is tried and the one that maximizes the criterion is chosen from the two classes regarded as the foreground and back ground points. 4.1.2 Noise Removal The presence of noise can cost the efficiency of the character recognition system; this topic has been dealt extensively in document analysis for typed or machine-printed documents. Noise may be due the poor quality of the document or that accumulated whilst scanning, but whatever is the cause of its presence it should be removed before further Processing. We have used median filtering and Wiener filtering for the removal of the noise from the image. 4.1.3 Skew Correction Aligning the paper document with the co-ordinate system of the scanner is essential and called as skew correction. There exist a myriad of approaches for skew correction covering correlation, projection, profiles, Hough transform and etc. For skew angle detection Cumulative Scalar Products (CSP) of windows of text blocks with the Gabor filters at different orientations are calculated. Alignment of the text line is used as an important feature in estimating the skew angle. We calculate CSP for all possible 50X50 windows on the scanned document image and the median of all the angles obtained gives the skew angle. 4.2 Segmentation Segmentation is a process of distinguishing lines, words, and even characters of a hand written or machine-printed document, a crucial step as it extracts the meaningful regions for analysis. There exist many sophisticated approaches for segmenting the region of interest. Straight-forward, may be the task of segmenting the lines of text in to words and characters for a machine printed documents in contrast to that of handwritten document, which is quiet difficult. Examining the horizontal histogram profile at a smaller range of skew angles can accomplish it. The details of line, word and character segmentation are discussed as follows. 4.2.1 Line Segmentation Obviously the ascenders and descanters frequently intersect up and down of the adjacent lines, while the lines of text might itself flutter up and down. Each word of the line resides on the imaginary line that people use to assume while writing and a method has been formulated based on this notion shown fig.3. Figure 3. Line Segmentation The local minima points are calibrated from each Component to approximate this imaginary baseline. To calculate and categorize the minima of all components and to recognize different handwritten lines clustering techniques are deployed. 4.2.2 Word and Character Segmentation The process of word segmentation succeeds the line separation task. Most of the word segmentation issues usually concentrate on discerning the gaps between the characters to distinguish the words from one another other. This process of discriminating words emerged from the notion that the spaces between words are usually larger than the spaces between the characters in fig 4. Figure 4. Word Segmentation There are not many approaches to word segmentation issues dealt in the literature. In spite of all these perceived conceptions, exemptions are quiet common due to flourishes in writing styles with leading and trailing ligatures. Alternative methods not depending on the one-dimensional distance between components, incorporates cues that humans use. Meticulous examination of the variation of spacing between the adjacent characters as a function of the corresponding characters themselves helps reveal the writing style of the author, in terms of spacing. The segmentation scheme comprises the notion of expecting greater spaces between characters with leading and trailing ligatures. Recognizing the words themselves in textual lines can itself help lead to isolation of words. Segmentation of words in to its constituent characters is touted by most recognition methods. Features like ligatures and concavity are used for determining the segmentation points. 4.3 Feature Extraction The size inevitably limited in practice, it becomes essential to exploit optimal usage of the information stored in the available database for feature extraction. Thanks to the sequence of straight lines, instead of a set of pixels, it is attractive to represent character images in handwritten character recognition. Whilst holding discriminated information to feed the classifier, considerable reduction on the amount of data is achieved through vector representation that stores only two pairs of ordinates replacing information of several pixels. Vectorization process is performed only on basis of bi-dimensional image of a character in off-line character recognition, as the dynamic level of writing is not available. Reducing the thickness of drawing to a single pixel requires thinning of character images first. Character before and after Thinning After streamlining the character to its skeleton, entrusting on an oriented search process of pixels and on a criterion of quality of represe ntation goes on the vectorization process. The oriented search process principally works by searching for new pixels, initially in the same direction and on the current line segment subsequently. The search direction will deviate progressively from the present one when no pixels are traced. The dynamic level of writing is retrieved of course with moderate level of accuracy, and that is object of oriented search. Starting the scanning process from top to bottom and from left to right, the starting point of the first line segment, the first pixel is identified. According to the oriented search principle, specified is the next pixel that is likely to be incorporated in the segment. Horizontal is the default direction of the segment considered for oriented search. Either if the distortion of representation exceeds a critical threshold or if the given number of pixels has been associated with the segment, the conclusion of line segment occurs. Computing the average distance between the l ine segment and the pixels associated with it will yield the distortion of representation. The sequence of straight lines being represented through ordinates of its two extremities character image representation is streamlined finally. All the ordinates are regularized in accordance to the initial width and height of character image to resolve scale Variance. 4.4 Bayesian Decision Theories The Bayesian decision theory is a system that minimizes the classification error. This theory plays a role of a prior. This is when there is priority information about something that we would like to classify. It is a fundamental statistical approach that quantifies the tradeoffs between various decisions using probabilities and costs that accompany such decisions. First, we will assume that all probabilities are known. Then, we will study the cases where the probabilistic structure is not completely known. Suppose we know P (wj) and p (x|wj) for j = 1, 2à ¢Ã¢â€š ¬Ã‚ ¦n. and measure the lightness of a fish as the value x. Define P (wj |x) as the a posteriori probability (probability of the state of nature being wj given the measurement of feature value x). We can use the Bayes formula to convert the prior probability to the posterior probability P (wj |x) = Where p(x) P (x|wj) is called the likelihood and p(x) is called the evidence. Probability of error for this decision P (w1 |x) if we decide w2 P (w2|x) if we decide w1 P (error|x) = { Average probability of error P (error) = P (error) = Bayes decision rule minimizes this error because P (error|x) = min {P (w1|x), P (w2|x)} Let {w1. . . wc} be the finite set of c states of nature (classes, categories). Let {ÃŽÂ ±1. . . ÃŽÂ ±a} be the finite set of a possible actions. Let ÃŽÂ » (ÃŽÂ ±i |wj) be the loss incurred for taking action ÃŽÂ ±i when the state of nature is wj. Let x be the D-component vector-valued random variable called the feature vector. P (x|wj) is the class-conditional probability density function. P (wj) is the prior probability that nature is in state wj. The posterior probability can be computed as P (wj |x) = Where p(x) Suppose we observe x and take action ÃŽÂ ±i. If the true state of nature is wj, we incur the loss ÃŽÂ » (ÃŽÂ ±i |wj). The expected loss with taking action ÃŽÂ ±i is R (ÃŽÂ ±i |x) = which is also called the conditional risk. The general decision rule ÃŽÂ ±(x) tells us which action to take for observation x. We want to find the decision rule that minimizes the overall risk R = Bayes decision rule minimizes the overall risk by selecting the action ÃŽÂ ±i for which R (ÃŽÂ ±i|x) is minimum. The resulting minimum overall risk is called the Bayes risk and is the best performance that can be achieved. 4.5 Simulations This section describes the implementation of the mapping and generation model. It is implemented using GUI (Graphical User Interface) components of the Java programming under Eclipse Tool and Database storing data in Microsoft Access. For given Handwritten image character and convert to Binarization, Noise Remove and Segmentation as shown in Figure 5(a). Then after perform Feature Extraction, Recognition using Bayesian decision theory as shown in Figure5(b). Figure 5(a) Binarization, Noise Remove and Segmentation Figure 5(b) Recognition using Bayesian decision theory 5. Results and Discussion This database contains 86,272 word instances from an 11,050 word dictionary written down in 13,040 text lines. We used the sets of the benchmark task with the closed vocabulary IAM-OnDB-t13. There the data is divided into four sets: one set for training; one set for validating the Meta parameters of the training; a second validation set which can be used, for example, for optimizing a language model; and an independent test set. No writer appears in more than one set. Thus, a writer independent recognition task is considered. The size of the vocabulary is about 11K. In our experiments, we did not include a language model. Thus the second validation set has not been used. Table1. Shows the results of the four individual recognition systems [17]. The word recognition rate is simply measured by dividing the number of correct recognized words by the number of words in the transcription. We presented a new Bayesian decision theory for the recognition of handwritten notes written on a whiteboard. We combined two off-line and two online recognition systems. To combine the output sequences of the recognizers, we incrementally aligned the word sequences using a standard string matching algorithm. Evaluation of proposed Bayesian decision theory with existing recognition systems with respect to graph is shown in figure 6. Table 1. Results of four individuals recognition systems System Method Recognition rate Accuracy 1st Offline Hidden Markov Method 66.90% 61.40% 1st Online ANN 73.40% 65.10% 2nd Online HMM 73.80% 65.20% 2nd Offline Bayesian Decision theory 75.20% 66.10% Figure 6 Evaluation of Bayesian decision theory with existing recognition systems Then each output position the word with the most occurrences has been used as the  ¬Ã‚ nal result. With the Bayesian decision theory could statistically signi ¬Ã‚ cantly increase the accuracy. 6. Conclusion We conclude that the proposed approach for offline character recognition, which fits the input character image for the appropriate feature and classifier according to the input image quality. In existing system missing characters cant be identified. Our approach using Bayesian Decision Theories which can classify missing data effectively which decrease error in compare to hidden Markova model. Significantly increases in accuracy levels will found in our method for character recognition

Wednesday, November 13, 2019

Wood Imagery and the Cross in Faulkners Light in August Essay

Wood Imagery and the Cross in Light in August  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚        Ã‚   It is nearly impossible to interpret Light in August without noting the Christian parallels.1 Beekman Cottrell explains: As if for proof that such a [Christian] symbolic interpretation is valid, Faulkner gives us, on the outer or upper level of symbolism, certain facts which many readers have noted and which are, indeed, inescapable. There is the name of Joe Christmas, with its initials of JC. There is the fact of his uncertain paternity and his appearance at the orphanage on Christmas day. Joe is approximately thirty-three years of age at his lynching, and this event is prepared for throughout the novel by Faulkner's constant use of the word crucifixion. These are firm guideposts, and there are perhaps others as convincing. (207) In fact, there are many more convincing Christian symbolisms, which, in sum, have led to Virginia Hlavsa's suggestion that in Light in August "Faulkner arranged his events and directed his themes to parallel the 21 chapters of the St. John Gospel" ("St. John and Frazer" 11).2    These symbolisms, however, stray from the text of Light in August and seek to unify the novel through biblical or mythic allusions alone. They attempt to answer the questions of how Light in August functions as a work of literature by avoiding the novel itself. Because of this, they each fall short of being a definitive interpretation of the novel. In Francois Pitavy's view, these critics do not base their interpretations on "methodical analysis." They do not "study each chapter or group of chapters to see how and why the spatial and temporal breaks occur" (2). Faulkner's use of Christian myths in Light in August has produced jagged paths for critic... ...uri State University, 1995. Gwynn, Frederick L., and Joseph Blotner, eds. Faulkner in the University. Charlottesville: University of Virginia, 1959. Hlavsa, VirginiaV. "The Crucifixion in Light in August: Suspending the Rules at the Post." Faulkner and Religion: Faulkner and Yoknapatawpha 1987. Ed. Doreen Fowler and Ann J. Abadie. Jackson: UP of Mississippi, 1989: 127-139. -------. "St. John and Frazer in Light in August: Biblical Form and Mythic Function."Bulletin of Research in the Humanities 83 (1980): 9-26. -------. "The Mirror, the Lamp, and the Bed: Faulkner and the Modernists." American Literature 57 (1985): 23-43. Meriwether, James B., and Michael Millgate, eds. Lion in the Garden: Interviews with William Faulkner 1926-1962. New York: Random House, 1968. Pitavy, Francois. Faulkner's "Light in August." Bloomington: Indiana UP, 1973    Wood Imagery and the Cross in Faulkner's Light in August Essay Wood Imagery and the Cross in Light in August  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚        Ã‚   It is nearly impossible to interpret Light in August without noting the Christian parallels.1 Beekman Cottrell explains: As if for proof that such a [Christian] symbolic interpretation is valid, Faulkner gives us, on the outer or upper level of symbolism, certain facts which many readers have noted and which are, indeed, inescapable. There is the name of Joe Christmas, with its initials of JC. There is the fact of his uncertain paternity and his appearance at the orphanage on Christmas day. Joe is approximately thirty-three years of age at his lynching, and this event is prepared for throughout the novel by Faulkner's constant use of the word crucifixion. These are firm guideposts, and there are perhaps others as convincing. (207) In fact, there are many more convincing Christian symbolisms, which, in sum, have led to Virginia Hlavsa's suggestion that in Light in August "Faulkner arranged his events and directed his themes to parallel the 21 chapters of the St. John Gospel" ("St. John and Frazer" 11).2    These symbolisms, however, stray from the text of Light in August and seek to unify the novel through biblical or mythic allusions alone. They attempt to answer the questions of how Light in August functions as a work of literature by avoiding the novel itself. Because of this, they each fall short of being a definitive interpretation of the novel. In Francois Pitavy's view, these critics do not base their interpretations on "methodical analysis." They do not "study each chapter or group of chapters to see how and why the spatial and temporal breaks occur" (2). Faulkner's use of Christian myths in Light in August has produced jagged paths for critic... ...uri State University, 1995. Gwynn, Frederick L., and Joseph Blotner, eds. Faulkner in the University. Charlottesville: University of Virginia, 1959. Hlavsa, VirginiaV. "The Crucifixion in Light in August: Suspending the Rules at the Post." Faulkner and Religion: Faulkner and Yoknapatawpha 1987. Ed. Doreen Fowler and Ann J. Abadie. Jackson: UP of Mississippi, 1989: 127-139. -------. "St. John and Frazer in Light in August: Biblical Form and Mythic Function."Bulletin of Research in the Humanities 83 (1980): 9-26. -------. "The Mirror, the Lamp, and the Bed: Faulkner and the Modernists." American Literature 57 (1985): 23-43. Meriwether, James B., and Michael Millgate, eds. Lion in the Garden: Interviews with William Faulkner 1926-1962. New York: Random House, 1968. Pitavy, Francois. Faulkner's "Light in August." Bloomington: Indiana UP, 1973 Â