Thursday, December 26, 2019

Essay on Data Mining Benefits and Drawbacks - 2702 Words

Data Mining Benefits and Drawbacks Introduction In a world where computers are becoming as essential to daily life as the cars we drive or the telephones we use to communicate, it is difficult to find a person who doesn’t have some particular use for computers. Computers have become the information stores of the world. If you take a moment to think about all the kinds of information a person can and does hold on their computer it is staggering. I myself have all the passwords to my email and bank accounts, the history of every web page I’ve visited in the last 3 weeks, my credit card numbers, the complete history of all my banking transactions for the last three years stored on my computer. Additionally, think about all the†¦show more content†¦Ã¢â‚¬Å"A number of healthcare advocacy, provider and consumer groups fear changes to new medical privacy rules could give a green light to banks and other financial institutions to access sensitive, personal medical information.†3 Consider for a moment the impact of a bank denying a person a loan because they are considered to be â€Å"not healthy† enough. Let’s say the person is getting over a drug addiction or has a history of smoking, the bank just might deny the loan based the on belief that the person will use the money to either buy drugs or the person will simply die too early to be able to pay off the loan. It seems far fetched, but is it really? The Dark Side of Data Mining The seemingly innocuous practice of data mining has a less reputable and more aggressive side to it. Some people and companies â€Å"mine† for data by subtly installing applications on users systems to monitor their activity. These applications are know as spyware and they range from simple pop-up advertisements to viruses which search out, record, and report back vital information such as passwords, email addresses, and account numbers. â€Å"Spyware is embedded in many programs without the knowledge of users. It is used to monitor the activities of computer users and report them to the spyware publisher.†4 In most cases â€Å"personal data is collected and distributed for re-sale to marketing enterprises†¦ many of the programs are hidden as downloads on computer games for children.†5Show MoreRelatedClustering Methods747 Words   |  3 Pagesin clustering massive data sets. The final clustering result of the k-mean clustering algorithm greatly depends upon the correctness of the initial centroids, which are selected randomly. This research will be followed by a serious of researches targeting the main objective which is an efficient DSS which will be applied on customer banking data. In this research a new method is proposed for finding the better initial centroids to provide an efficient way of assigning the data points to suitable clustersRead MoreSearch Engine Advertising : Keyword Advertising Essay1139 Words   |  5 Pagespage. It happens some search engines rank the ads for their popularity instead of money. Merchants must group their keyword efficiently to receive a maximum return on investment. However, a study states that keyword advertising has no short-term benefits and a statistically insignificant effect on sales. Thus, the search engine’s efficacy is weak. Finally, the contextual advertising is also a search engine that is based on the keyword of the searcher. It occurs on the banner pop-up ad that targetsRead MoreData Mining And Machine Learning1631 Words   |  7 PagesIntroduction Nowadays, data mining and machine learning become rapidly growing topics in both industry and academic areas. Companies, government laborites and top universities are all contributing in knowledge discovery of pattern recognition, text categorization, data clustering, classification prediction and more. In general, data mining is the technique used to analyze data from multi perspectives and reveal the hidden gem behind the enormous amount of data. With the explosive growth of data collectionsRead MoreMOTIVATION Organizations spend large capital to establish and maintain customer relationship. The1400 Words   |  6 Pagestechnique of data mining will not only solve the issue but also the policies and the strategies so designed could be more effective and competent. Thus the money spent on the customer retention programs/schemes can be saved by being more direct and specific. SCOPE In the present growing economy the market is full of cut throat competition. Acquiring new customers is manifolds more costly than retaining an old one. It is important to target those customers that could return maximum benefit. Thus thisRead MoreThe Importance Of Big Data871 Words   |  4 PagesBig Data keeps an eye out for the two open passages and bugs for affiliations. Investigating the veritable fixation to remove a prompting power from epic data, it must be regulated and assessed luckily, and the results ought to be required with can affect positive change or effect business decisions. The likelihood other than relies on an affiliation together having the right blend of people, process and movement. By unadulterated definition, examination is the introduction and correspondence ofRead MoreSocio-Economic Analysis Of Renewable Energy : The Economics Of Renewable Energy734 Words   |  3 Pagesgenerators. As they create unbalance during the times of less electricity cost, thes e VRE technologies have comparatively low value. ‘Market value’ aids as the weighting factor in correspondence with socio-economic value of power. If there are no drawbacks of wind power market value, it might have benefited the society. With more VRE invasion lessening of value is big, which results in decrease in wind power worth when compared to constant power resources. There are some measures called ‘mitigationRead MoreA Research Study On Machine Learning Community, The Decision Tree Algorithms, Quinlan s Id3 And Its Successor Essay1462 Words   |  6 PagesKrishnaswamy. Illustrated that the theoretical foundations of data stream analysis discussed. Mining data stream systems, techniques are critically reviewed. Finally, the research problems in streaming mining field of study are discussed. These research issues should be addressed in order to realize robust systems that are capable of fulfilling the needs of data stream mining applications. The ma in aim is to explore the data for testing a specific hypothesis. The machine learning fieldRead MoreBenefits Of Using Sap For Business1462 Words   |  6 Pagesintegrates all prospects of operating enterprise and that is why SAP software is also known as business integration and predictive software (Bennett, 2013). Business integration simplifies collaboration from one area or industry level to another, improving data stream within an enterprise and makes sure that its stream has a straight, progressive influence on business s productivity (Beyleveld, Schurink, 2005). It also makes better consumer amenity and product excellence, reduces product time to marketplaceRead MoreTypes Of Band Payment982 Words   |  4 PagesOut of Band Payment: Here the adversary directly pays the owners of a mining pool to mine a block for the adversary, the payment required can be made either in Bitcoins or any other acceptable currency. The main drawback of this method is that a owner may accept pa yment but still mine but for its own benefit. A mutual trust between the two parties and a trusted third party (in order to compel the terms of agreement), is required which makes it difficult for the adversary to bribe someone anonymouslyRead MoreThe Importance of Crowd Funding in Financing a Project or Business1001 Words   |  4 Pagesproject to the people with videos or description to reach the funding goal. Crowd funding is based on the close cooperation between investors, intermediaries and entrepreneurs (Loreta Valanciene and Sima Jegeleviciute, Valuation of crowd funding benefits and drawbacks, 2013). Crowd funding goes beyond online community participation and adopts a proactive role to the crowd who act as customers as well investors in both supporting and providing financial assistance for the projects (Ordanini

Wednesday, December 18, 2019

Public Land Of Public Lands - 959 Words

Public lands that allow us to easily access natural amenities have received more attention recently in the sense that they provide quality of life for residents and recreational opportunities for tourists. These characteristics of public lands provide economic benefits for communities adjacent to public lands. These communities refer to gateway communities, which have economic ties to public lands and provide necessary services for visitors to public lands (Kurtz, 2010; U.S. House of Representatives, 2005). Examples include towns abut to national and state forests, monuments, parks, wildlife refuge, lakeshores, scenic riverway, and recreation area (Kurtz, 2010). These communities generally have a smaller population base and yet are â€Å"hotspots† that experience rapid population and economic growth (Hester, 2013). In addition, they have characteristically relied on relatively few or even a single source to drive the local economy (Kurtz, 2003). Traditionally, most gateway communities have economically depended on resource extraction industries. However, advocates of the preservation of public lands, incited through a rise in environmental awareness and movement, urged elected officials to establish strong resources protection laws (Foresta, 1984; Wirth, 1980). From the 1960s through 1980, congress responded and passed a variety of acts such as the Endangered Species Act of 1973 (Public Law 91-135; 16 U.S.C 1531-1544, 87 Stat. 884), Federal Land Policy and Management Act of 1976Show MoreRelatedProblem Statement Versus Needs Assesment1384 Words   |  6 Pageswill be stated either as a reduction of what is currently a problem or an enhancement of a need to be added to a current situation. For example, let’s look at a fictitious rural community facing a particular environmental situation. The federal public land manager in charge of a watershed surrounding the small, rural community of Cottonwood Creek brings a partnership of local stakeholders together worried about the namesake stream that flowed through their town of 4,000 people. The meeting includesRead MoreThe Loss Of Public Farming Land741 Words   |  3 PagesIn addition to the loss of public farming land, the opportunity arose for far wealthier citizens to expand the Roman latifundia (large plantation estates) as prices declined. This expansion also increased the already existing practice of slavery and drove smaller subsistence farmers off of the land, both by legal and illegal means. â€Å"The rich began to offer larger rents and drove out the poor. Then the poor, who had been ejected from the land, no longer showed themselves eager for military serviceRead MoreEssay about Public Grazing Lands1857 W ords   |  8 Pagesgrazing of public lands has become a very controversial issue over the last couple of decades. This is due to the fact that there are some people who believe that grazing the land is beneficial to the wildlife and the different plant species there. Then there are other people who have the belief that the grazing of livestock on public lands is detrimental to wildlife and plant health. Therefore, they believe that it is actually doing more harm than good. What are Public Grazing Lands? Public landsRead MoreAdvantages of Grazing Cattle on Public Lands782 Words   |  3 Pages Grazing cattle on public lands can have many advantages. Monetary gain is a large reason why lands are utilized (Council for Agricultural Science, Livestock Grazing on Federal Land). However grazing may be used as a tool for managing rangelands. Grazing could have possibly been the first form of rangeland management other than fire (Frost, Prescription Grazing). With this method, weeds and other undesirable vegetation were targeted to reduce numbers. However, if prescribed incorrectly it couldRead MoreProject Report731 Words   |  3 PagesPurifying Public Plots I will volunteer at the National Public Lands Day event at Big Morongo Canyon Preserve. This event involves repairing fences, trails, and signs at the preserve. The preserves volunteer coordinator, Leslie Burkhardt, will coordinate the event. The reason why this project is important is that it gives me a chance to work with land that I have access to, but have not done any work to deserve access. First, I need to take to complete this project, is to get all of the waiverRead MorePublic Land Policy, And The Wilderness Act Of 1964845 Words   |  4 Pages1. Introduction For the past decades, public land policy debates have intensified among scholars, planners, and policy makers. The root of the debates is a question of which types of public lands management can provide better economic benefits to adjacent regions that are referred to gateway communities. For a long time, resource extractive industries – such as mineral, oil, coal, and timber development sectors - have been a primary growth engine for the economic growth in those communities. HoweverRead MoreThe Land Is Public Property In Ethiopia Case Analysis741 Words   |  3 PagesThe land is public property in Ethiopia [Gebreselassie 2006]; both rural and urban lands are made available to the investors at a competitive price on a Lease-Hold basis. The Lease or Rental value of land and fixed assets may transfer to the third party, but not the land. Incidentally, about the capital requirement, to assist investors to decide to invest on their own or jointly with the domestic investors the m inimum capital required for a single project has been apprehended. Under the InvestmentRead MoreThe Control of Public Land and the Consequences of Global Climate811 Words   |  3 Pagesworld’s largest known concentrations of oil shale and tar sands. More than 70 percent of oil shale in America can be found within federal lands in Wyoming, Colorado, and Utah. There are 50 confirmed tar sands deposits found in eastern Utah, with more suspected to be in the area. The Bureau of Land Management has already approved the lease of over 800,000 acres of land for tar sand and shale oil development across what is known as the Green River Formation. The combined oil reserve is estimated to beRead MoreA Research Study On The School Fire Occurred On Public Land1455 Words   |  6 Pagesdifference in the tree seedling densities as compared to unlogged sites? My hypothesis for this question is that there will be a greater density of tree species in the salvage logged site than the unl ogged site. Methods The School Fire occurred on public land in Washington’s Umatilla National Forest in August, 2005. It burned approximately 21,000 ha of grassland and mixed conifer forest (Figure 1). Pre-disturbance stand structure of the mixed conifer forest in the area was dominated by ponderosa pineRead MoreAboriginal Reservation Land Be Compulsorily Acquired For The Purpose Of Public Works1215 Words   |  5 PagesMaori reservation land be compulsorily acquired for the purpose of public works by the Minister of Land Information? No, according to legislation to primary legislation Te Ture Whenua Maori Act 1993 and the Public Works Act 1981 and a recent decision from the New Zealand Environment Court. In Grace .v. Minister for Land Information (2014), a New Zealand Environment Court (NZEnvC) case, the primary legal considerations regarding compulsory public works acquisitions of Maori land were brought to the

Tuesday, December 10, 2019

Cloud Computing and Security Management †MyAssignmenthelp.com

Question: Discuss about the Cloud Computing and Security Management. Answer: Introduction Cloud computing has been structured to utilize the advantages of economies of scale by using resources that are shared. This technology has made it possible resource sharing and has enhanced security and availability. For this case the clients pay for the services that they want. Either to act as their storage, application server or any other service that is provided by the cloud vendor. Cloud based refers to the services such as data, applications, servers, or other resources that are accessed by clients over the internet. Governments, institution, businesses and companies have implemented cloud based solution strategies so as to increase their service delivery, enhance resource availability, improve data security, enhance functionalities among other benefits. Data ownership in cloud computing has brought about dilemma around the health sector. It is still a complex matter and its solution cannot be determined any time soon. The aspect of data ownership is still one of the factors that is discouraging companies and businesses from shifting to cloud based solutions. Headspace hold a lot of sensitive data and transferring to cloud needs assurance that such data will remain theirs, control by them at all times without any other third party getting hold of these information. Cloud vendor have been working extra hard to resolve this problem that is with them, but until now there is no absolute answer to it. (Antonopoulos Gillam, 2017). When Headspace decides to implement cloud based solutions they are basically transferring their data to be by a third party individual. The biggest riddle that comes up after this is who actually owns the data in the cloud? Generally, the client, for this case Headspace have the thought that because the data originally came from them then it is them who owns it, but also they have to accept the fact that a third party, for this case cloud vendor have some possession of it. but it is important to note that it is the responsibility of the cloud vendor to ensure security of the data at all cost, because that one of the key objective that they have to meet without compromise. (Ruparelia, 2016). Making this issue more complicated is the fact that many countries are still using laws that are outdated regarding data ownership. It is a fact that data ownership laws are catching up with the evolving technology, that is, technology is always advancing while laws remain the same for a long period. The essential take away fact is that this issue is addressed by the agreement between the client and the cloud vendor, this is where it all boils down to. Several contracts states and clearly outlines who is the data owner. For instance, Amazon web services have stipulated that the client reserves the right of data ownership within its terms and conditions. Data Security Data security is a very important aspect when it comes to headspace. The Institution holds very sensitive data about their patients and is important that the cloud vendor that they are selecting stipulate clearly what they plan to do about the security of the data. Headspace will need clear information on the data security. Data security revolves around data integrity, availability, confidentiality and privacy. (Tilley Rosenblatt, 2016). Integrity of data is a very crucial factor that has to be critically considered. The cloud vendor should ensure that headspace data is not fabricated, deleted or modified by unauthorized party. This element can be attained by implementing database constraints and transactions which are normally managed by the database management system. To ensure data integrity any access or transaction by Headspace should depict the ACID properties of a transaction, that is, Atomicity, consistency, isolation and durability. It is the responsibility of the cloud vendor to ensure that data integrity is kept and maintained at all times and no unauthorized party is accessing the data and information. Implementing different level of data by the different levels of Headspace management ensures control access which is key to data integrity. (Fox Riemann, 2012). Headspace is an institution that deals with special people with special needs thus special information that needs high level of confidentiality. To ensure confidentiality of data, the cloud vendor should implement access control and authentication features. Also cloud vendor should increase reliability of its services and trustworthiness so as to gain this factor. Also to enhance this feature of security Headspace can encrypt their data before storing them in the cloud. This will help deal with the potential threats from the inside with bad motive of maybe selling such information. (Wicklund, 2011). For an institution such as headspace to operate normally, it needs data and information, to make decisions and to offer prescriptions to its patients. It is the responsibility of the cloud vendor to ensure that such data and information is available at all times even it times of crisis and downfall. It should have such sophisticate data recovery techniques to ensure that no single data is lost In case of accidents and other disasters. Cloud vendor has a role to share all the concern with Headspace in good time so as to build good relationship. The provider has a duty to make sure that data is safe and outline jurisdiction of the laws governing them to the client. (Kulkarni, 2013). Headspace holds such private data about their patients. It is too private to be leaked out even to non-potential threats. Therefore, to ensure privacy of the patients attended by Headspace, the cloud provider should ensure that their data is kept safe and confidential. If it is to be accessed, then the person accessing it should have proper clearance. When privacy of data is tempered with, this will have direct negative impact on the person associated with the data compromised. To enhance data privacy, the cloud vendor should be able to clearly outline the following; how can user have controlled over their information processed and stored in the cloud, how can data replication be guaranteed consistently, who is concerned with the legal needs of private data and to what level do cloud subcontractors get involved in private data processing. (Jamsa, 2013). Non-Functional Requirements of Cloud Based Solution Headspace opted to cloud based solution because they expect certain institution objective to mbe met. Also the cloud services should have the capabilities to meet their needs and requirements fully. To enhance functionality, cloud providers should make sure that their systems are made up of the latest technology so as to keep up with the fast changing technology. There services should also limit Headspace on what platform to use. It should enable them to access the cloud services from any end device like a mobile phone, laptop, PC regardless of the technology it is built be it IOS, android, MacOS, Windows or any other platform. The cloud provider should also make sure that their systems have abilities to scale and raid provisioning that cannot be provided in different environments. (Tilley Parveen, 2013). This requirement will differ depend on who the client is. In any case the cloud vendor should ensure that the systems are easy to use and with a user friendly interface that assure simple and easy navigation through the system. If possible it should also facilitate Headspace to customize its user interface depending maybe on the department or the level of access. In todays world, effective design of user interface is more critical than ever. (In Chao, 2016). This is measure by the time the cloud vendor offers services continuously including downtimes and scheduled maintenance. Availability should be at 99.99%. this means that the cloud provider should ensure availability of data at all times. Also it should have a mechanism for disaster recovery in case of any accidents. (Hua Wang, 2016). Headspace expect the solution to enhance and improve service delivery and add value. Implementing cloud based solution will help do away with maintenance cost of storage devices, infrastructure and applications. Also the system should conctrate on satisfying the user by meeting their needs and requirements. (Srivastava Kumar, 2015). It is important for the cloud provider to categorically outline the security measure it has in place toward data security and availability. Data integrity, confidentiality, privacy and availability should be key issues that the cloud vendor should answer and state clearly on how to achieve them. (Yang Borg, 2012). Some of the benefits that Headspace institution will receive by implementing cloud based solutions include; Flexibility- through the use of internet connection, users are able to scale services to meet their needs, access cloud services and facilitate customization of applications from anywhere. Efficiency- users can acquire applications to quickly market their services without the worries of infrastructure or maintenance expenses. Strategic value- Cloud services offer innovative technology thus enhancing competitive advantage to enterprises. Reduced hardware and support requirements- as headspace moves more vital applications into the cloud, the likelihood of upgrading computers too often is less. Most employees manage to perform without the use of computers of higher end. This is because there is no occurrence of actual computing. (Wicklund, 2011). Anytime, Anywhere Collaboration- cloud services simplify workload of the headspace institution. Employees are able to carry out their duties anywhere either at home or in the office. Also, there is no need of setting up VPN if the staff members are using a secure or private Wi-Fi. Cloud items simplifies collaboration with fellow staff members from outside the institution. For instance, one can build a basecamp project where everyone is able to view each others jobs. Individuals working in the same institution benefits from collaboration of the team tools such as file sharing, shared calendars, instant messaging and video conferencing. (Kulkarni, 2013). Disadvantages of cloud-based solutions Availability and security- there exist many cases of breaches of security in cloud based services. These breaches are normally caused by human errors. Cloud providers Going Out of Business- Cloud computing is a field that is quickly changing. As such there is threat that a business may deviate from its services. Service sudden change may not affect the organization if it was using the system for a one-time project but can cause problems if it was designed for the whole donor database. (Jamsa, 2013). This is a one of the straightforward methodology of system development life cycle. It is a pre-determined approach where there are stages and for one to move to the next stage the previous stage should have been completed because there is no turning back. This approach is best when the project has limited time and flexibility is not required. Furthermore, Management of this particular approach is easy and simple. However, this approach is slow as it is used to review at every stage before the next stage is started. This approach also as very limited space for corrections and modifications, therefore, corrections are only made at the maintenance phase. In addition, since the requirements are predetermined, if a wrong requirement is purchased or missing, it may not be identified until the late phases of development. (Langer, 2012). This is an iterative approach that development of a product or its component is repeated several times until the best result is obtained. Some advantages attributed to this approach include thorough testing during development, continuous involvement of the user to ensure that the user requirements are made, it stresses on integration through involvement of all the stakeholder, it quickly delivers a working product as compared to predictive approach. In addition is easy to develop the correct system due to continuous involvement o all the stakeholders. However, the project can be headed in the wrong direction if the user doesnt specifically know what s/he want. (Roebuck, 2012). Conclusion When it comes to product development then adaptive approach has always been the best option over predictive. This is because of the certainty of developing a more accurate product and errors are reduced. It may seem costly but actually t is cheap compared to predictive. In predictive, if a wrong system is developed this means that the product has to be developed again. For Adaptive there will be iterative process until an ideal product or components obtained. Recommendation Headspace institution should keep in mind that security and system uptime cant be perfect, and there may lack staff focused to management of information technology. Dedicated and trained experts are the ones who handle management and security issues. When analyzing cloud vendors, it is advisable to look for options available for extracting and backing up data. The best services help the institution download it information in a nonproprietary and standard format. References Antonopoulos, N., Gillam, L. (2017).Cloud computing: Principles, systems and applications. Cham, Switzerland: Springer. Fox, S., Riemann, L. (2012).Professional SharePoint 2010 cloud-based solutions. Indianapolis, Ind: Wrox/John Wiley Sons. Hua, Z. Wang, X. (2016). Cloud Computing and the Essentials of Security Management.Open Access Library Journal,3, 1-4. doi:10.4236/oalib.1102618. In Chao, L. (2016).Handbook of research on cloud-based STEM education for improved learning outcomes. Hershey, Pennsylvania IGI Global Jamsa, K. (2013).Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones Bartlett Learning. Kulkarni, M. (2013).Gradeboard: A cloud-based solution for a student grading system. M.S. California State University, San Bernardino. Langer, A. M. (2012).Guide to Software Development: Designing and Managing the Life Cycle. London: Springer. Roebuck, K. (2012).Systems Development Life Cycle (SDLC): High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors. Dayboro: Emereo Publishing. Ruparelia, N. (2016).Cloud computing. Cambridge, Massachusetts : The MIT Press. Srivastava, H. Kumar, S. (2015) Control Framework for Secure Cloud Computing.Journal of Information Security,6, 12-23. doi:10.4236/jis.2015.61002. Tilley, S. R., Parveen, T. (2013).Software testing in the cloud: Perspectives on an emerging discipline. Hershey, PA: Information Science Reference. Tilley, S., Rosenblatt, H. J. (2016).Systems Analysis and Design. Boston, MA: Cengage Learning US. Wicklund, P. (2011).Deploying cloud-based Microsoft SharePoint 2010 solutions. Place of publication not identified: Microsoft Press. Yang, Y. Borg, K., (2012). "Regulatory Privacy Protection for Biomedical Cloud Computing,"Beijing Law Review, Vol. 3 No. 4, pp. 145-151. doi:10.4236/blr.2012.34020.

Monday, December 2, 2019

Interpreting Dreams That Never Occurred The Dream Sequence in The Wife of Baths Prologue and Its Implied Concepts

As history records show, feminism and Middle Ages are not quite compatible; despite the fact that the idea of women’s liberation was started way back in the Ancient Greece (DuBois, 2007), the Dark Ages set the evolution of a feminist movement back to the era of chauvinism and male dominance.Advertising We will write a custom essay sample on Interpreting Dreams That Never Occurred: The Dream Sequence in The Wife of Bath’s Prologue and Its Implied Concepts specifically for you for only $16.05 $11/page Learn More Despite men being predominantly satisfied with the given state of affairs at that time, humanist ideas were spawned by Chaucer ‘s The Canterbury tales in the era when women had little to no authority in the society, therefore, posing a number of marriage and relationship related ethical questions to the male part of the audience and encouraging women to pursue their independence in marriage, which The Clerk’s tale and the dream of the fifth wife in The wife of Bath’s prologue show in the most graphic way. The fact that the fifth wife was willingly inclining the man that would later on become her fifth husband to murder her fourth one, whom she accused of beating her and having her will completely trodden under his feet, can also be interpreted as not only the demand for women to be free in their marriage, as well as free to choose their future husband, but also the need for a woman to be equal to her husband. On the one hand, such interpretation seems impossible in the light of the oppression that women were under in the Middle Ages. Indeed, with the chauvinist ideas setting the course for social tendencies, as well as the principles for relationships between a man and a woman, the mere mentioning of equality would be absurd. Nevertheless, the plea – or, perhaps, even a demand – for being treated fair can be easily read into every single phrase uttered by the fifth wife, not to mention the dream story that she crafted: â€Å"You say that just as worms destroy a tree, / Just so a wife destroys her own husband; / Men know this who are bound in marriage band† (Chaucer, n. d., lines 382–384). In this regard, Clerk’s tale by Chaucer should also be mentioned. Also dealing with the subject of a woman’s role in marriage, it might be seen as a major retreat in Chaucer’s feminist endeavors, since the main storyline revolves around a woman being so devoted to her husband that she sacrifices her children and her happiness to serve him: â€Å"O Lord, I am willing  / To do your will† (Chaucer, n. d.). However, Chaucer still manages to state his opinion regarding equality in marriage: â€Å"But bow your neck beneath that blessed yoke  / Of sovereignty and not of hard service,  / The which men call espousal or wedlock† (Chaucer, n. d.).Advertising Looking for essay on british literature? Let's see if we can help you! Get your first paper with 15% OFF Learn More Griselda, therefore, is a symbol of a wife, who admits her husband to be her master. While being aligned with the contemporary Christian principles of marriage, from a humanist perspective, the given concept is absurd, since in marriage, both a wife and a husband must be provided with equal rights; any other type of relationships can be classified as not marriage, but slavery. In spite of the chauvinist tendencies of the Medieval society, as well as the lack of equality in relationship between a man and a woman in the Middle Ages, Chaucer managed to make a statement concerning the need to provide women with freedoms in their personal life. While not stating the fact that women are equal to men directly, Chaucer conveys the given principle in his Canterbury tales in a very clear manner, making an especially explicit statement in describing the dream of the fifth wife and The Clerk’s tale. The tales that could easily be interpreted as a joke by Chaucer’s contemporaries, they planted the seeds for feminist principles to evolve from. Reference List Chaucer, G. (n. d.). The clerk’s tale. Web. Chaucer, G. (n. d.) The wife of Bath’s prologue. Retrieved from http://www.jsu.edu/depart/english/gates/wifebprt.htm DuBois, E. C. (2007) Plato as a proto-feminist. Web. This essay on Interpreting Dreams That Never Occurred: The Dream Sequence in The Wife of Bath’s Prologue and Its Implied Concepts was written and submitted by user Layla Tucker to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.