Thursday, September 19, 2019

Of Mice And Men: Mini-critique :: essays research papers fc

Of Mice and Men: Mini-Critique John Steinbeck was born in Salinas California on February 27, 1902. His mother was a school teacher in the public school in Salinas. Steinbeck grew up in the beautiful Salinas Valley which furnished most of the material for his novels. His mother read to him, at an early age, famous literature of the world which planted a seed in his imagination. He entered Stanford in 1920, remaining there until 1925 but never graduating. In 1930 Steinbeck married Carol Henning. Steinbeck died in 1968. After college, Steinbeck moved to New York, where he worked briefly for the old New York American newspaper and helped with the construction of Madison Square Garden. His first book, Cup of Gold (1929), appeared two months before the stock market crash and sold about fifteen hundred copies. Steinbeck returned to California, living in migrant worker camps to furnish inspiration for writing novels that described the problems and stresses of the times. Of Mice and Men takes place during the great depression in the Salinas Valley, California. It is a story about two farm-hands, George Milton and his large retarded friend, Lennie Small. George and Lennie are on their way to a farm that has harvesting jobs available. While camped along side a river George and Lennie talk about their dreams of someday owning a farm with rabbits for Lennie to take care of. The next day George convinces the farm boss to hire Lennie and him. Lennie's Love for feeling soft things becomes a problem when he is playing with a puppy and accidentally kills it. The wife of Curley, the boss's son, comes into the barn to talk to Lennie. The climax comes when Curley's wife lets Lennie feel her hair, but he strokes it too hard and she becomes scared. Lennie holds her tightly to keep her from screaming and ends up breaking her neck. The resolution of the story happens when George shoots Lennie through the back of the head. George does this for Lennie's own good. The main theme of the story is that, no matter how lowly on the social scale, everyone has the unalienable right to pursue their individual dreams. While the value of friendship is another strong point that comes through in the book. Magill, Frank N. "Of Mice and Men" Masterpieces of American Literature. Harper Collins Publishers, 1993. "[Of Mice and Men] is perhaps the finest expression of the writers lifelong sympathy for abused common people." Roberts, James L. Cliffs Notes on Steinbeck's Of Mice and Men. Lincon, Nebraska: Cliffs Notes Inc., 1966.

Wednesday, September 18, 2019

Julian Bonds Lecture on Brown vs. Board of Education :: Julian Bond Race Affirmative Action

Loose Ends Still Untied Aurora is not known to be the greatest town in the suburbs of Chicago, so it is a typical move for the people from my side of town to claim residence in Naperville. I will be the first to admit that I have often betrayed my hometown and laid claim to its relatively glamorous neighbor. Naperville is one of the country’s â€Å"best places to raise a family,† or so I have heard. I wouldn’t be too surprised, considering the amount of wealth that flows through the town. Naperville offers a mix of people, professionals and their families of various ethnicities and backgrounds; however, it lacks true culture diversity. Even though there are whites, blacks, Hispanics, Chinese, Japanese, Indians, etc., few of its youths are conscious of the various backgrounds because of the economic equality of everyone: everyone is equally rich in Naperville (a point of which I and my fellow Aurorans regularly accused our Naperville schoolmates). My high school consisted of a decent racial blend, and despite a few cultural cliques, everyone was White in thought and in wallet. I did not hold this view at the time, but I had yet to be exposed to reality then. When I came to the University of Illinois, I was accompanied by a significant force of my high school peers, including all but two of my closest friends. During the first few weeks of school, when everybody was meeting everybody else, I was busy hanging out with my standard high school group and, thus, missed much of the opportunity to make a bounty of new friends. I did, however, meet one person who has become my closest friend and who sparked my introduction to reality. I went to visit him over spring break. It was a Friday, a little past noon. My friend lives around 75th Street, a block from Lake Michigan. For everyone who isn’t from the area, I was right in the middle of a very black south side of Chicago neighborhood. When his mother found out I was coming to do lunch, she asked him, â€Å"Why are you making this boy come out here?† My friend responded immediately: â€Å"Mom, he’s not afraid of black people.† This was a true statement; I n ever had feared anyone because of race, but his mother instinctively knew, unlike my friend and me, that his hometown and my hometown were polar opposites.

Tuesday, September 17, 2019

Richard Nixon And The Notion Of Presidential Power :: essays research papers

Richard Nixon and the Notion of Presidential Power "Actions which otherwise would be unconstitutional, could become lawful if undertaken for the purpose of preserving the Constitution and the Nation." The idea that certain actions are not illegal if used to preserve the best interests of a nation has drawn sharp criticism from the time of Lincoln through today. Presidents of the United States do take a solemn oath in which they promise to â€Å" . . . preserve, protect, and defend the Constitution of the United States†, but the means which they have employed to accomplish these ends have greatly differed and have occasionally sparked great controversy. The unjustified means which Richard Nixon used to defend this nation and its Constitution have drawn a great deal of attack not only on his methods but also on the greater notion of Presidential power. Many Presidents have faced many different tumultuous challenges and obstacles which have posed potential threats to American societal stability and security. Yet very few have used such controversial means to overcome these threats. For example, after the birth of the nation, Executives faced the threats of political division and the ideas of the many dangerous paths prescribed for the Union. As the debate over slavery escalated, the future of the states and of the Union seemed uncertain. Furthermore, as the nation moved rapidly through the Industrial Revolution, the future of the nation's labor force and of its general welfare seemed uncertain. As time passed, the nation would encounter the greatest economic depression of all time, and the challenges would continue. Our nation would still battle the divisive issues of racism and discrimination. Yet none of the Presidents who governed during these daring times exploited the authority of their position in unwarranted manners. The Nixon Administration would however, exploit its authority and attempt to justify its actions based on the ‘similar' actions of Abraham Lincoln. During the Civil War, this nation's greatest test of will and spirit, President Lincoln felt it incumbent upon the President to assume certain authority and responsibility not specifically granted to the Executive by the Constitution. His rationale stemmed from his desire and oath to preserve the Constitution and the Union as a whole. On the eve of the Civil War, Lincoln, fearing a strong Confederate threat, initiated a blockade of all Southern ports; ordering no vessels in or out of the South. Clearly an act of war, Lincoln faced immediate challenge from Congress and Confederate leaders. His reasoning, though, for carrying out such a dangerous and controversial act was his belief that it would tame the South and prevent massive bloodshed in the future.

Computer networks assignment

Cable Maximum data rate speed cat 5 Single Mode Fiber cable gasps Recommendations Connector Reasons Category e, reasons for purchasing cat depute cable. Cat e cable is the most popular of all http cables, Has a superior bandwidth as compared with cat cable. RAJA 45 connector since it is the standard connector used to connect to a device and also for wall-plate connections. Multi-mode fiber-optic cable Straight tip connector (SC). Commonly used as a backbone, fast, intensity susceptible to eavesdropping.Straight tip connector is commonly used in Ethernet networks that use fiber-optic backbones, more so it is popular for use with multi-mode fiber-optic cable. Network Topology for the office Office 1 Task 2 The same design applies to the other offices. Methods for secure intranet 1. Use intranet based VPN 2. Use of Authentication. Advantages of intranet based VPN They enable secure broadband connections (through cable modems, DSL, etc. ). They can create significant communication saving s in particular when lots of remote users dial-in from outside the local calling area.Secure the connection between the client and ‘SP. Provide unauthorized users from tapping into the intranet. Extended connectivity and lower cost. Altered. Disadvantages of intranet based VPN Are not scalable and are more complex that NAS initiated VPN. The need to manage software on the client machines. NAS-initiated Access VPN connections are restricted to pops that can support VPN. Do not encrypt the connection, between the client and the ISP, but rely on the security of the EST..Advantages of using authentication User id and password is the least expensive authentication method to use. User ids and passwords can be changed anytime at the user's choice, furthermore most users know how to change them. No need to install extra software in the case of using ids and passwords. Token authentication can be used for login and transaction authentication purposes effectively. Biometric authenticati on is difficult to compromise. Disadvantages of Using Authentication d and password authentication is Weak and susceptible to numerous attacks.Token authentication involves additional costs, such as the cost of the token and any replacement fees. Token authentication requires some amount of user training. Security depends on the users' ability to maintain the user ID and password secret. Biometric authentication usually involves cost for support and maintenance. Protocols Intranet VPN protocols Pipes or IP Security is used to secure Internet communications. It's normally used as a security overlay for the other protocols. It's considered the â€Å"standard† VPN protocol, specially for site-to-site VPN.PPTP-Point to point tunneling protocol, a data link protocol that establishes a connection between two networking nodes, it creates the virtual connection across the internet, and provides connection authentication, transmission encryption and compression. LOTT, Layer Two Tunnel ing Protocol, it does not provide encryption and it relies on PPTP protocol to do this. Authentication One way authentication protocol. Mutual way authentication protocol-protocol that enables both the point of origin and the point of termination of a communication link to verify or authenticate each other.Amended-Schroeder Protocol Media required for connecting the offices Internet medium: It acts as a connection medium Router: I. E router to router VPN is used to connect separate offices in various locations. Software-network management software. Internet-To act as medium for connection purposes. Software to enable the devices to communicate and be able to send and receive information. Sips Hardware requirements to connect the Four Offices 2. Switch. 3. Firewall How access can be provided to the company intranets via extranet.Staff access their computers in whatever the location they are, they then provide their ids or swords to the company's website upon which they are verified t o be the genuine staff, after being authenticated through the extranet VPN, they are finally allowed to access the offices, if a user tries to forcefully access the intranet the firewall in between detects and shuts of the intruder. Intranet and extranet Diagrams Task 3 Security issues related to Intranets and extranets Unauthorized Access – An unauthorized person gains access to a company's computer system and access sensitive information.Misuse of user privileges – An employee or supplier authorized to use the system for one purpose misuses it for another purpose other than for what it is should be. Users or telecommuters accessing the corporate intranet from their home can or sometimes expose sensitive data as it is being sent over the wire. Security breaches- at certain times the intranet will experience unusual traffic like spam, pushing, Edward and mallard. Networks attacks- there can be a network attack in form of forceful intrusion into the intranet or extranet .Lack of encryptions – at sometimes confidential information is shown to unauthorized personnel because of the lack of using encryption. Usability problems- omen users will use the intranet improperly through not knowing how to search, retrieve, send and receive information. Weak passwords – some users use weak passwords, they write them down, never change them and in the end forget their content – users are vulnerable to dangerous content like Trojan, worms and viruses that attach on emails.Violations of security policies – some users make an attempt to penetrate the network forcefully and illegally without clearance and permission. Protection From viruses Trojan and other threats 1) Adoption of intrusion detection prevention system in the network to offer retention against network attacks. 2) Deployment of effective email filters and firewalls to block against suspicious traffic from entering the network. 3) Authentication through use of passwords, smar t cards and biometric scanners to overcome unauthorized access in the network. ) Use of intranet monitoring soft wares by companies so as to check and monitor what their employees are doing on the intranet or on their own PC. 5) Strict adherence to the security policies put in place by the company any violations of the security policies should be met with strict consequences. 6) Users on the intranet must remember to always update and maintain their security software on every PC and server on the network to ensure protection. 7) Formal training should be given to new employees who don't know how to use the intranet so that they will know how to perform searches, send and retrieval of information. ) Network administrators should encourage users to use strong or hard to guess passwords as well as not to show their passwords to any other party. 9) Use of SSL Digital certificates to help secure the intranet from lack of encryption. 10) Setting up firewall rules to only allow messages th at come from within the internal server. Recommendations to counter any threats to the network. Use of anti-virus toolkits so as to safeguard the computers on the network, the anti virus toolkits should be updated regularly and used to scan both PC and servers on the networks.Security policy – should be put in place so as to protect the company's resources and information. Physical countermeasures: such as CATV cameras, gratitude's, data backup and recovery systems should be embraced so that the company will be able to monitor and protect its equipments and information safe. Authorization – Access rights and privileges should be given to certain users in the many. Authentication-users and systems must be authenticated; authentication can be through passwords, digital certificates and other methods.Conclusion The network project was a success though it seemed hard; I find that I have acquired some certain skills that I didn't have during the beginning of this module. Am grateful at least that I have managed to do my best in this module. The project was about creating a network that would be used to connect the four offices which currently house about seven computers. Weaknesses One of my weaknesses as displayed in my project is that I did not manage to show a actuarial representation of the various cables, servers and other equipments which would have otherwise enabled me to illustrate my project in a clear and visible manner.In task 1 1 was required to come up with and identify the type of media I will propose for the company, I chose a wired media category e cable as the best option to go for, the cat e cable altogether needs a connector hence I chose the RAJA-45 connector which is the standard that can be used by the cat e cable. I provided the cost of cabling and installing such a cable in a network, the assumption made was that the many did not have any networks and so I included them in the cost and installation section.As for the data speed I gave the maximum speed that can be achieved by a category e cable which is Mbps. L provided recommendations for the category e cable to purchased together with raja-45 connector . In task 2 after researching on the methods that can provide a secure intranet I finally ended up choosing three methods and these are Intranet based VPN, Authentication and Digital signatures, I named a few protocols which are applied in the above methods such as layer two tunneling protocol for the intranet VPN.The media required to connect the offices such as Internet form the service of the hardware that can be used to connect the offices are Routers, switches and firewalls. In task 3 1 gave a listing of the security issues that are prominent with such a network some of them include, network attacks and lack of encryptions such issues can cause a company a great loss as much time will be spent trying to solve the problems which at times are difficult to solve.To protect the workstations in the networ k from attacks from viruses, Trojan and worms I gave the following suggestions, that the company et up strict security policy that the staff should adhere to so as to ensure the resources and information in the company are in safe condition, adoption of intrusion detection and prevention systems in the network to secure the network form any forceful entry into the network.Using methods such as updated antimatter toolkit, the staff can be able to operate under a conducive environment which is free from any malicious software attacks, second thing is that authorization rights and privileges should be given to certain staff or members in the company, so s to prevent information from being accessed by unauthorized user who possess a threat to the company.

Monday, September 16, 2019

Sunny Delight

They first released an advert that was a national phenomenon and it sold lots of bottles. Sunny D claimed it tasted as good as Coke but also a healthy alternative that would clench the thirst of children. The advert was so powerful that it became the nation's 3rd bestselling drink in 3 months of being released and in 1 999; it sold 200 million bottles in the year, leading to large supermarkets doubling and tripling their orders.The reason it was so good was because it claimed it was fresh and fresh means healthy so parents anted to buy them for their kids because they wanted drinks to be healthy and good for their kids and that is what it seemed. However, people started reading the labels and telling other people to read the label which lead to lots Of people finding bad things about Sunny Delight. People started finding out that Sunny D had only 5% juice and the other 95% was things like water, food coloring and other dodgy things. There was also a high amount of sugar which parents didn't want. After finding this out, parents started buying alternatives.One day a 4 year old girl from Wales who drank a litter and a half f Sunny D a day woke up one day and found her skin had turned orange and got sent to hospital. By the time 2001 came around, their sales have halved and they went from 3rd in the UK to 42nd in the space of 3 years. Sales have never recovered from it. If Sunny Delight were to release another advert, they would need to change their company to become healthier; they also need to not put as much sugar in each bottle. They need to be patient, to slowly get their customers trust back again. Their adverts should be truthful and not claim to be something they're not.

Sunday, September 15, 2019

Linear Programming to Solve Coal Blending Problem

17th International Mining Congress and Exhibition of Turkey- IMCET 2001,  © 2001, ISBN 975-395-417-4 Optimum Blending of Coal by Linear Programming for the Power Plant at Seyitomer Coal Mine K. Erarslan, H. Aykul, H. Akcakoca & N. Cetin Dumlup? nar University, Department of Mining Engineering, 43100, Kutahya, Turkey ABSTRACT: In this study, a linear programming model is developed to determine the optimum coal blend in terms of quality and quantity. Coal with various features is mined from different panels of Seyitomer Lignite Coal District and fed to a nearby power plant.The quality of the coal is extremely variable through the horizontal and vertical directions, which entails the precise planning of coal blending during the mining and stockpiling stages. Otherwise, a large penalty has to be paid to the power plant. In this study, the objective is to match the calorific values required by the power plant. The quality features and production capacities of coal from different panels are determined and are used in quality constraints. The power plant requires coal in two groups, which are of different qualities and quantities.Therefore, two linear programming models complementing each other are developed in order to determine the blending conditions that satisfy the needs of the plant. The models are introduced and solved m the LINDO package program. Reasonable solutions are obtained and optimal amounts of blending are handled. The model also allows the evaluation of coal panels of low quality. 1 INTRODUCTION' Linear Programming (LP) is one of the most widely used methods of operation research for decision problems.This method is a reasonable and reliable procedure for determining the optimum distribution of resources, optimal production, minimum cost, maximum profit, etc. , which comprise the objectives (Ozturk, 1997). In this method, decision parameters to make the objective optimal are linear or assumed to be linear (Taha, 1992, Hillier and Liebermann, 1995). The general form of the problem is formed by objective function and subjected constraints; (1) (2) where; Z= objective of the model Cj = coefficient of/* decision variable (1=1,2 Xj = / * decision variable N) oefficient of decision variable (i=l,2,.. ,m) b, = limited resource for iJ* constraint LP approximation is widely used in mining as well as in other industrial fields. Open pit limits, production scheduling, material flow in processing plants, blending, equipment selection, method selection, transportation, etc. , are its main applications (Chanda and Wilke, 1992, Dijilani and Dowd, 1994, Huang, 1993, Mann and Wilke, 1992, Meyer, 1969, Smith and You, 1995). However, investment, planning, or selection, in other words any actions requiring decision, can be optimized.Especially in open pit mines and underground mines feeding coal to power plants, the quality and quantity of coal is crucial because the burner blocks of power plants are designed according to specific features of co al. Inability to match coal quality and quantity to these specific features results in either penalty costs for the coal enterprise or a decrease in the power plant's efficiency. In addition, inconsistent coal features lead to wear in the power plant's burning units and all integrated components.In this respect, coal-producing enterprises try to match their coal features to power plants' specifications by blending and homogenizing coal extracted from different panels and levels. Satisfying the requirements of the plant is achieved by selective 719 = mining and/or blending. In this study, a relevant case is considered. Seyitomer coal enterprise in Kutahya, Turkey has problems of quality and quantity in supplying the nearby power plant. A well-planned and organized blending procedure and, accordingly, production plan is necessary.In this paper, the problem, is modeled in terms of linear programming and reasonable solutions are obtained. 2 SEYITOMER COAL ENTERPRISE AND ITS PROBLEM Seyi tomer Lignite Enterprise (SLE) is located 20 km. northwest of Kutahya city center. The basin is characterized as Late Miocene-early Pliocene. The lignite seams in Seyitomer basin consist of two horizontal levels (0-7 ° S), referred to as A and B seams, according to their depths. The seams are separated from each other by waste interbedded formations whose thickness vary from 10 to 50 m.These two seams may exhibit variation according to their occurrence in three sub-regions (Seyitomer, Aslanl? , Ayval? ), where the geological coal formation has been determined by drill holes. The thickness of the A seam, located at the top level of the basin, varies in the range of 5-25 m. {Sofrelec, 1967). The thickness of B seam varies in the range of 2-30 m. In the basin, these two seams are rarely observed together. The seam defined as A Is deposited only in the Seyitomer region and the coal occurrences in the Aslanl? nd Ayval? regions. The B seam consists of 3 different sublevels, referred to, from Uie top to the base of the seam, as B[, B2, Bj Their calorific values decrease towards to the seam base as the interbedded layers get thicker. The upper level coal seams B| and B2, which have a high calorific value and are produced in sorted size and quality (+100 mm), have supplied the market for public heating. The B3 coal, which is of low quality and contains fine coal (-100 mm) from the processing plant, is sold to the power plant.At the enterprise, production is performed by the open pit mining method. The overburden, whose thickness varies from 35 to 60 m. , is loosened by drilling and blasting. The stripping method is the excavator and truck and dragline method. The 1 electrical excavators have a 10-yd bucket volume and the dragline has a 70-yd bucket capacity. Production and transportation are also by excavatortruck and loader-truck meu? ods. It is impossible to process the coal with wet washing techniques.For this reason, only crushing, sieving and sorting can be appl ied to the coals of the region. There are three plants working for the power plant and three plants working for the market in the enterprise. The coal is dispatched to the market or the power plant according to its quality. 720 Recently, in terms of quality and quantity the demands of the plant have not been fulfilled and in order to overcome the problem selective mining has been used. Consequently, there is an increasing tendency to use ripping and bulldozers and loaders (Aykul, 2000). APPLICATION OF LINEAR PROGRAMMING IN SLE 3. 1 Definition of the Problem In Seyitomer Coal Mine, six different coal types produced from different panels and levels are treated. The terms for these coals, their average calorific values and annual quantity to be extracted according to Ideal planning are shown in Table 1. These coals need to be blended in accordance with the specifications required by the power plant's burning units. Seyitomer power plant has four burning units. The operating conditions of these units are shown in Table 2.The annual coal requirement of the power plant is 6,000,000 tons: the first three burning units (Unit 1, Unit 2 and Unit 3), with the same requirements, need 4,500,000 tons, while the last burning unit (Unit 4) requires 1,500,000 tons. Table 1. Determined features of coal types according to ideal planning in SLE Coal Type Calorific Amount Value (ton/year) (kcal/kg) FineCoal(-lOO) (From Plants) 1675 2,000,000 Stock of Kizik 1750 800,000 Stock of Marl 1428 > 250,000 B| Level 2000 < 600,000 B; Level 1800 < 600,000 B, Level 1600 > 1,500,000 Table 2.Operating Conditions of Power Plant Power Plant Base Heat Content Grain Size (mm) Units (Kcal/kg) Unit 1 1750 ± 100 0-200 Unit2 1750+100 0-200 Umt3 1750 ± 100 0-200 Unit 4 1600  ± ! 00 0-200 The blending requirements of the coal are as follows: i. Coal coming from the processing plants (fine coal), and that produced from the stock of Kizik, stock of marl, the B3 level, B2 level and B| level can supply Unit 1, Unit 2 and Unit 3. it. Coal produced from the stock of Kizik, stock of marl and B3 level can supply Unit 4.Two different linear models were developed since there are two design specifications in the power plant. Therefore, first, the amount of coal of the B3 level and stock of K? z? k are determined fo. ‘ Unit 4 with the help of the first linear program, and then the rest of the determined amounts are used in the second linear program developed for Unit 1, Unit 2 and Unit 3. After determining these conditions, the main aim is to obtain coal blends that have the maximum heating calorific value in the range of specifications (Kaya, 2000). . 2 Constitution 0/the Model The objective function for Unit 4 maximizing the first blend's calorific value, which has a maximum limitation by the constraints, is shown in Equation 1 : (3) Subjected to Equations 4 to 11: (4) (5) The restrictions are shown in Equations 13 to 21. 4,500,000 (13) (14) (15) (16) (17) (18) (19) (20) (21) (6) (7) (8) (9) (10) (11) Here, X2 : Amount of coal from stock of K? z? k, t. Xj : Amount of coal from stock of marl, t. Xe : Amount of coal from B3 level, t.The objective function for Unit 1, Unit 2 and Unit 3 maximizing the second blend's calorific value restricted by a subjected constraint is shown in Equation 12. (12) Amount of fine coal from processing plants, t. Amount of coal from stock of K? z? k, t. Amount of coal from B| level, t. Amount of coal from B2 level, t. Amount of coal from B3 level, t. 3. 3 Solutions of Models The LINDO package program is used to solve the models. The optimum quality and quantity results of the final tables for Unit 4 are shown In Table 3 (Kaya, 2000). Table 3 Final results of model for Urul 4 Coal Types Coal Amount Heal Content (ton/year) (kcal/kg) Stock of K? ? k 500. 000* 1750 (X2) Stock of marl (X,) 250,000* 1428 750. 000* 1600 B, Level (X,) 1,500. 000 Blend of Coals 1620 5* h *Optimam values ai 7†² iteration As it may be seen in Table 3, t he blend quality of the coal is found to be 1620 kcal/kg. This value is within the range of the specific design values of Unit 4. The final tables for Unit 1, Unit 2 and Unit 3 are shown in Table 4. 721 Table 4. Final results of model for Unit 4 Coal Amount Heat Content Coal Types (ton/year) (kcal/kg) 2,000,000* 1675 Fine coal (Xi) Stock of K? z? k 300,000* 1750

Saturday, September 14, 2019

Under What Circumstances May a Person Be Criminally Liable for a Failure to Act?

General principleThere is no general liability for failure to act under the common law of England and Wales. A crime can be committed by omission, but there can be no omission in law in the absence of a duty to act. The general basis for imposing liability in criminal law is that the defendant must be proved to have committed a guilty act whilst having had a guilty state of mind. The physical elements are collectively called the actus reus and the accompanied mental state is called the mens rea.Liability for omissionsThe general rule is that there can be no liability for failing to act, unless at the time of the failure to act the defendant was under a legal duty to take positive action. ‘’Unless a statute specifically so provides, or †¦.the common law impose a duty upon a person to act in a particular way towards another†¦ a mere omission to act cannot lead to criminal liability’’.(R Vs Miller[1983]1 All ER 978.) A positive duty to act exists in the following circumstances:(a)Duty arising from statute Liability for failing to act will be imposed where the defendant can be shown to have been under a statutory duty to take positive action. A leading example of such a case is provided by the children and Young Persons Act 1933, which creates the offence of wilfully neglecting a child. Hence by simply failing to provide food for the child or failing to obtain appropriate medical care a parent could be held criminally liable for any harm that results. (Greener Vs DPP[1996] The Times, Feb. 15,1996).(b)Duty arising from a ContractWhere a person is under a positive duty to act because of his obligations under a contract, his failure to perform the contractual duty in question can form the basis of criminal liability. (R Vs Pittwood [1902] 19 TLR 37).