International Journal of Computer Science & Information Security

Total Page:16

File Type:pdf, Size:1020Kb

International Journal of Computer Science & Information Security IJCSIS Vol. 13 No. 5, May 2015 ISSN 1947-5500 International Journal of Computer Science & Information Security © IJCSIS PUBLICATION 2015 Pennsylvania, USA JCSI I S ISSN (online): 1947-5500 Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish original scientific results. CALL FOR PAPERS International Journal of Computer Science and Information Security (IJCSIS) January-December 2015 Issues The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. See authors guide for manuscript preparation and submission guidelines. Indexed by Google Scholar, DBLP, CiteSeerX, Directory for Open Access Journal (DOAJ), Bielefeld Academic Search Engine (BASE), SCIRUS, Scopus Database, Cornell University Library, ScientificCommons, ProQuest, EBSCO and more. Deadline: see web site Notification: see web site Revision: see web site Publication: see web site Context-aware systems Agent-based systems Networking technologies Mobility and multimedia systems Security in network, systems, and applications Systems performance Evolutionary computation Networking and telecommunications Industrial systems Software development and deployment Evolutionary computation Knowledge virtualization Autonomic and autonomous systems Systems and networks on the chip Bio-technologies Knowledge for global defense Knowledge data systems Information Systems [IS] Mobile and distance education IPv6 Today - Technology and deployment Intelligent techniques, logics and systems Modeling Knowledge processing Software Engineering Information technologies Optimization Internet and web technologies Complexity Digital information processing Natural Language Processing Cognitive science and knowledge Speech Synthesis Data Mining For more topics, please see web site https://sites.google.com/site/ijcsis/ For more information, please visit the journal website (https://sites.google.com/site/ijcsis/) Editorial Message from Managing Editor It is a honor for the editorial board to present the May 2015 issue of International Journal of Computer Science and Information Security (IJCSIS). The purpose of this edition is to publicize experimental and theoretical research from both industry and academia in the broad areas of Computer Science, ICT & Security and further bring together people who work in the relevant areas. As the editors of this issue, we are glad to see variety of articles focusing on the major topics of innovation and computer science; computer security, interdisciplinary applications, information technologies etc. This journal promotes excellent research publications which offer significant contribution to the computer science knowledge and which are of high interest to a wide academic/research/practitioner audience. As a scholarly open access peer-reviewed journal, we provide an outlet for quality research & academic publications and support universal access for international scientific community to scientific knowledge; and the creation and dissemination of scientific and technical information. IJCSIS archives all publications in major academic/scientific databases. Indexed by the following International agencies and institutions: Google Scholar, CiteSeerX, Cornell’s University Library, Ei Compendex, Scopus, DBLP, DOAJ, ProQuest and EBSCO. Moreover, Google Scholar reported increased in number cited papers published in IJCSIS. We support researchers to succeed by providing high visibility & impact value, prestige and efficient publication process & service. We thank our authors and look forward to your collaboration. As final words, Publish, Get Cited & Make An Impact. For further questions please do not hesitate to contact us at [email protected]. A complete list of journals can be found at: http://sites.google.com/site/ijcsis/ IJCSIS Vol. 13, No. 5, May 2015 Edition ISSN 1947-5500 © IJCSIS, USA. Journal Indexed by (among others): Bibliographic Information ISSN: 1947-5500 Monthly publication (Regular Special Issues) Commenced Publication since May 2009 Editorial / Paper Submissions: IJCSIS Managing Editor ([email protected]) Pennsylvania, USA Tel: +1 412 390 5159 IJCSIS EDITORIAL BOARD Professor Yong Li, PhD. School of Electronic and Information Engineering, Beijing Jiaotong University, P. R. China Professor Ying Yang, PhD. Computer Science Department, Yale University, USA Professor Hamid Reza Naji, PhD. Department of Computer Enigneering, Shahid Beheshti University, Tehran, Iran Professor Elboukhari Mohamed, PhD. Department of Computer Science, University Mohammed First, Oujda, Morocco Professor Mokhtar Beldjehem, PhD. Sainte-Anne University, Halifax, NS, Canada Professor Yousef Farhaoui, PhD. Department of Computer Science, Moulay Ismail University, Morocco Dr. Alex Pappachen James Queensland Micro-nanotechnology center, Griffith University, Australia Dr. Sanjay Jasola Professor and Dean, School of Information and Communication Technology, Gautam Buddha University Dr Riktesh Srivastava Assistant Professor, Information Systems, Skyline University College, University City of Sharjah, Sharjah, PO 1797, UAE Dr. Siddhivinayak Kulkarni University of Ballarat, Ballarat, Victoria, Australia Dr. T. C. Manjunath HKBK College of Engg., Bangalore, India Dr. Naseer Alquraishi University of Wasit, Iraq TABLE OF CONTENTS 1. Paper 30011502: A Survey on Detection of Sinkhole Attack in Wireless Sensor Network (pp. 1-9) George W. Kibirige & Camilius Sanga,, Department of Informatics, Sokoine University of Agriculture, SUA, Morogoro, Tanzania Abstract - Wireless Sensor Network (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the wireless sensor node is their characteristics which include low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Base on those characteristics makes this network vulnerable to several attacks, such as sinkhole attack. Sinkhole attack is a type of attack were compromised node tries to attract network traffic by advertise its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack and drops or altered routing information. It can also used to send bogus information to base station. This paper is focus on exploring and analyzing the existing solutions which used to detect and identify sinkhole attack in wireless sensor network. The analysis is based on advantages and limitation of the proposed solutions. Keywords: Wireless sensor network (WSN), sinkhole attack, detection of sinkhole attack 2. Paper 30041501: Decomposition and Denoise of an Image Using Singular Value Decomposition (pp. 10-12) Viji Paul, Department of Information Technology, Salalah College of Technology, Sultanate of Oman P. Selvaraju, Dept. of Computer Science & Engg, Vel Tech MultiTech Dr.RR and Dr.SR Engineering College, Avadi, Chennai, India D. Nagarajan, Department of Information Technology, Salalah College of Technology, Sultanate of Oman Abstract - Image decomposition is now essential for transmission and storage in database. Singular Value Decomposition is a decomposition technique for calculating the singular values, pseudo-inverse and rank of a matrix. The conventional way of doing this was to convert a matrix to row echelon form. The rank of a matrix is then given by the number of nonzero rows or columns of the echelon form. Singular value decomposition is one of the methods to compress and denoise the images. The main focus of this paper is to decompose and denoise an image using singular value decomposition. Keywords: SVD, decomposition, denoise. 3. Paper 30041503: An Improvement on Fragmentation in Distribution Database Design Based on Knowledge-Oriented Clustering Techniques (pp. 13-17) Van Nghia Luong, Department of Information Technology, Pham Van Dong University, Quang Ngai, Viet Nam Ha Huy Cuong Nguyen, Department of Information Technology, Quang Nam University, Quang Nam, Viet Nam Van Son Le, Da Nang University of Education, Da Nang University, Da Nang, Viet Nam Abstract — The problem of optimizing distributed database includes: fragmentation and positioning data. Several different approaches and algorithms have been proposed to solve this problem. In this paper, we propose an algorithm that builds the initial equivalence relation based on the distance threshold. This threshold is also based on knowledge- oriented clustering techniques for both of horizontal and vertical fragmentation. Similarity measures used in the algorithms are the measures developed from the classical measures. Experimental results carrying on the small data set match fragmented results based on the classical algorithm. Execution time and data fragmentation significantly reduced while the complexity of our algorithm in the general case is stable. Keywords — Vertical Fragmentation; Horizontal Fragmentation; Similarity Measure; Clustering Techniques; knowledge-oriented clustering techniques. 4. Paper 30041505: Visualizing Object-oriented Software for Understanding and Documentation (pp. 18-27) Ra’Fat AL-msie’deen, Department of Information Technology, Mutah University,
Recommended publications
  • Problems of Mimetic Characterization in Dostoevsky and Tolstoy
    Illusion and Instrument: Problems of Mimetic Characterization in Dostoevsky and Tolstoy By Chloe Susan Liebmann Kitzinger A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Slavic Languages and Literatures in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Irina Paperno, Chair Professor Eric Naiman Professor Dorothy J. Hale Spring 2016 Illusion and Instrument: Problems of Mimetic Characterization in Dostoevsky and Tolstoy © 2016 By Chloe Susan Liebmann Kitzinger Abstract Illusion and Instrument: Problems of Mimetic Characterization in Dostoevsky and Tolstoy by Chloe Susan Liebmann Kitzinger Doctor of Philosophy in Slavic Languages and Literatures University of California, Berkeley Professor Irina Paperno, Chair This dissertation focuses new critical attention on a problem central to the history and theory of the novel, but so far remarkably underexplored: the mimetic illusion that realist characters exist independently from the author’s control, and even from the constraints of form itself. How is this illusion of “life” produced? What conditions maintain it, and at what points does it start to falter? My study investigates the character-systems of three Russian realist novels with widely differing narrative structures — Tolstoy’s War and Peace (1865–1869), and Dostoevsky’s The Adolescent (1875) and The Brothers Karamazov (1879–1880) — that offer rich ground for exploring the sources and limits of mimetic illusion. I suggest, moreover, that Tolstoy and Dostoevsky themselves were preoccupied with this question. Their novels take shape around ambitious projects of characterization that carry them toward the edges of the realist tradition, where the novel begins to give way to other forms of art and thought.
    [Show full text]
  • Subplot Sanity Amy Deardon: [email protected] GPCWC July 26, 2017
    Subplot Sanity Amy Deardon: [email protected] GPCWC July 26, 2017 SUBPLOT – a supporting narrative to the main plot. It has three purposes: Complicate the Main Story. Provide Psychological Insight. Deepen a Theme or Moral. CHARACTER ROLES – usually one, up to about 3 characters, fulfill a story role: Protagonist Antagonist Confidante Romantic Interest etc. There is “always” only one protagonist. Many stories especially romances also have a secondary protagonist – a character who works as a team with the main protagonist – but one is always subordinate (story-wise) to the other. The main protagonist is the one who experiences the character arc (hidden need subplot). Character Roles are sometimes based on MYTHIC ARCHETYPES. For one way to generate your story ideas see Chris Vogler’s The Hero’s Journey and James Frey’s The Key: How to Write Damn Good Fiction Using the Power of Myth. There are usually about 8 – 10 identifiable character roles in a story. More than that leads to “One Darn Thing After Another” Syndrome. ONE DARN THING AFTER ANOTHER SYNDROME This occurs when the story meanders without a point. Events don’t change story circumstances and therefore can be eliminated without consequences. “One Darn Thing After Another” occurs because there is a lack of story tension. Subplot Sanity 2 [email protected] GPCWC 07.26.2017 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ WHAT IS THE STORY? Story is King. Other aspects of the novel/screenplay (character development, theme/moral, story world) must take place in the context of story events. A story is defined by having: Story Goal (and multiple mini-goals) Story Stakes (and multiple mini-stakes) Story Obstacle (antagonist; plus multiple mini-obstacles) DEVELOPING STORY TENSION A story can be thought of as a sequence of small goals from beginning to end.
    [Show full text]
  • Core Collections in Genre Studies Romance Fiction
    the alert collector Neal Wyatt, Editor Building genre collections is a central concern of public li- brary collection development efforts. Even for college and Core Collections university libraries, where it is not a major focus, a solid core collection makes a welcome addition for students needing a break from their course load and supports a range of aca- in Genre Studies demic interests. Given the widespread popularity of genre books, understanding the basics of a given genre is a great skill for all types of librarians to have. Romance Fiction 101 It was, therefore, an important and groundbreaking event when the RUSA Collection Development and Evaluation Section (CODES) voted to create a new juried list highlight- ing the best in genre literature. The Reading List, as the new list will be called, honors the single best title in eight genre categories: romance, mystery, science fiction, fantasy, horror, historical fiction, women’s fiction, and the adrenaline genre group consisting of thriller, suspense, and adventure. To celebrate this new list and explore the wealth of genre literature, The Alert Collector will launch an ongoing, occa- Neal Wyatt and Georgine sional series of genre-themed articles. This column explores olson, kristin Ramsdell, Joyce the romance genre in all its many incarnations. Saricks, and Lynne Welch, Five librarians gathered together to write this column Guest Columnists and share their knowledge and love of the genre. Each was asked to write an introduction to a subgenre and to select five books that highlight the features of that subgenre. The result Correspondence concerning the is an enlightening, entertaining guide to building a core col- column should be addressed to Neal lection in the genre area that accounts for almost half of all Wyatt, Collection Management paperbacks sold each year.1 Manager, Chesterfield County Public Georgine Olson, who wrote the historical romance sec- Library, 9501 Lori Rd., Chesterfield, VA tion, has been reading historical romance even longer than 23832; [email protected].
    [Show full text]
  • Emerging Legal and Policy Trends in Recent Robot Science Fiction
    Emerging Legal and Policy Trends in Recent Robot Science Fiction Robin R. Murphy Computer Science and Engineering Texas A&M University College Station, TX 77845 [email protected] Introduction This paper examines popular print science fiction for the past five years (2013-2018) in which robots were essential to the fictional narrative and the plot depended on a legal or policy issue related to robots. It follows in the footsteps of other works which have examined legal and policy trends in science fiction [1] and graphic novels [2], but this paper is specific to robots. An analysis of five books and one novella identified four concerns about robots emerging in the public consciousness: enabling false identities through telepresence, granting robot rights, outlawing artificial intelligence for robots, and ineffectual or missing product liability. Methodolology for Selecting the Candidate Print Fiction While robotics is a popular topic in print science fiction, fictional treatments do not necessarily touch on legal or policy issues. Out of 44 candidate works, only six involved legal or policy issues. Candidates for consideration were identified in two ways. One, the nominees for the 2013-2018 Hugo and Nebulas awards were examined for works dealing with robots. The other was a query of science fiction robot best sellers at Amazon. A candidate work of fiction had to contain at least one robot that served either a character or contributed to the plot such that the robot could not be removed without changing the story. For example, in Raven Stratagem, robots did not appear to be more than background props throughout the book but suddenly proved pivotal to the ending of the novel.
    [Show full text]
  • LAUGHTER and LANGUAGE in SHAKESPEARE's TWELFTH NIGHT by Kaitlyn Joy Blum a Thesis Submitted To
    MADNESS AND MIMETIC VIOLENCE: LAUGHTER AND LANGUAGE IN SHAKESPEARE’S TWELFTH NIGHT By Kaitlyn Joy Blum A Thesis Submitted to the Faculty of The Wilkes Honors College in Partial Fulfillment of the Requirements for the Degree of Bachelor of Arts in Liberal Arts and Sciences with a Concentration in English Literature Wilkes Honors College of Florida Atlantic University Jupiter, Florida May 2013 MADNESS AND MIMETIC VIOLENCE: LAUGHTER AND LANGUAGE IN SHAKESPEARE’S TWELFTH NIGHT By Kaitlyn Joy Blum This thesis was prepared under the direction of the candidate’s thesis advisor, Dr. Michael Harrawood, and has been approved by the members of her/his supervisory committee. It was submitted to the faculty of The Honors College and was accepted in partial fulfillment of the requirements for the degree of Bachelor of Arts in Liberal Arts and Sciences. SUPERVISORY COMMITTEE: __________________________ Dr. Michael Harrawood ________________________ Dr. Rachel Corr ________________________ Dean Jeffrey Buller, Wilkes Honors College ________________________ Date ii ACKNOWLEDGEMENTS I could never have done this project on my own, and must give many thanks to a multitude of superb individuals. First, I wish to say thank you to my family: to my mother, your never-ending support for me has always been my greatest source of encouragement; my father, for your words of wisdom; my brother Will for our true friendship with one another; my grandparents, for supporting my academic endeavors; my godparents for their kindness, especially during my college years. I want to thank the friends that I have met at the Honors College, especially my best friend Erica for your constant support and Dawn for your assistance in formatting this thesis.
    [Show full text]
  • Two Genre and Form Lists for Moving Image and Broadcast Materials: a Comparison
    UCLA UCLA Previously Published Works Title Two Genre and Form Lists for Moving Image and Broadcast Materials: a Comparison. Permalink https://escholarship.org/uc/item/9pp0q8qv Journal Cataloging & Classification Quarterly, 31(3/4) Author Yee, Martha M Publication Date 2001 Peer reviewed eScholarship.org Powered by the California Digital Library University of California TWO GENRE AND FORM LISTS FOR MOVING IMAGE AND BROADCAST MATERIALS: A COMPARISON December 10, 2000 draft by Martha M. Yee ACKNOWLEDGEMENTS Greta de Groat and David Miller were kind enough to read this article in draft form and offer many suggestions for ways to improve it. Lisa Kernan, a most welcoming and knowledgable public service librarian at the UCLA library that collects film and television literature (the Arts Library) did some research for the author, who was unable to get to the library due to a bus strike. The author alone is responsible for any errors that may remain, of course. ABSTRACT The Moving Image Genre-Form Guide and Library of Congress Subject Headings are compared as sources of genre or form terms for moving image and broadcast materials. In comparing these two lists, it is noted that both seem to include a certain number of headings that are actually topical subject headings disguised as example of headings (655). Both lists contain example of headings that index categories other than genre/form, such as audience, filmmaker and the like. MIGFG has headings that are more direct than LCSH, which has many headings that begin with the terms 'Motion picture,' 'Radio,' and 'Television.' MIGFG has a much more rigid citation order than LCSH, to the extent that it works against literary warrant.
    [Show full text]
  • The Power of Subtext and the Politics of Closure: an Examination of Self, Representation, and Audience in 3 Narrative Forms
    THE POWER OF SUBTEXT AND THE POLITICS OF CLOSURE: AN EXAMINATION OF SELF, REPRESENTATION, AND AUDIENCE IN 3 NARRATIVE FORMS by Adam Berzak A Thesis Submitted to the Faculty of The Dorothy F. Schmidt College of Arts and Letters in Partial Fulfillment of the Requirements for the Degree of Master of Arts Florida Atlantic University Boca Raton, Florida August 2010 ACKNOWLEDGEMENTS I would like to thank the members of my thesis committee—Dr. Youngberg, Dr. Barrios, and Dr. Berlatsky—for their patience and guidance throughout the development of this project. I would also like to express my gratitude towards Barri, Gary, Mookie, Quincy, and Lucy for their enduring love and support. Not least, thank you to Alissa Feffer for cherishing the ‘real’ me. iii ABSTRACT Author: Adam Berzak Title: The Power of Subtext and the Politics of Closure: An Examination of Self, Representation, and Audience in 3 Narrative Forms Institution: Florida Atlantic University Thesis Advisor: Quentin Youngberg Degree: Master of Arts Year: 2010 This thesis explores the ways that certain artists—including Joseph Conrad, Alan Moore, Richard Attenborough, and Francis Ford Coppola—break from their inherited traditions in order to speak from an alternative perspective to western discourse. Conventional narrative formulas prescribe that meaning will be revealed in a definitive end, but all of the texts discussed reveal other avenues through which it is discerned. In Heart of Darkness, the tension between two divergent narratives enables Conrad to speak beyond his social context and imperialist limitations to demonstrate that identity is socially constructed. In Watchmen, Moore breaks from comic convention to illustrate ways meaning may be ascertained despite the lack of plot ends.
    [Show full text]
  • 2015 Wildlife Research Summaries
    Summaries of Wildlife Research Findings 2015 Minnesota Department of Natural Resources Division of Fish and Wildlife Wildlife Populations and Research Unit SUMMARIES OF WILDLIFE RESEARCH FINDINGS 2015 Edited by: Lou Cornicelli Michelle Carstensen Gino D’Angelo Michael A. Larson Jeffrey S. Lawrence Minnesota Department of Natural Resources Division of Fish and Wildlife Wildlife Populations and Research Unit 500 Lafayette Road, Box 20 St. Paul, MN 55155-4020 (651) 259-5202 ©January 2017 State of Minnesota, Department of Natural Resources For more information contact: DNR Information Center 500 Lafayette Road St. Paul, MN 55155-4040 (651) 296-6157 (Metro Area) 1 888 MINNDNR (1-888-646-6367) TTY (651) 296-5484 (Metro Area) 1 800 657-3929 http://www.mndnr.gov This volume contains interim results of wildlife research projects. Some of the data and interpretations may change as a result of additional findings or future, more comprehensive analysis of the data. Authors should be contacted regarding use of any of their data. Printed in accordance with Minn. Stat. Sec. 84.03 Equal opportunity to participate in and benefit from programs of the Minnesota Department of Natural Resources is available to all individuals regardless of race, color, creed, religion, national origin, sex, marital status, status with regard to public assistance, age, sexual orientation, membership or activity in a local commission, or disability. Discrimination inquiries should be sent to MN DNR, 500 Lafayette Road, St. Paul, MN 55155-4031; or the Equal Opportunity Office, Department of the Interior, Washington, DC 20240. Printed on recycled paper containing a minimum of 30% post-consumer waste and soy-based ink.
    [Show full text]
  • Rhetorical Devices and Terms Terminology J. Ritterson Washburn
    Rhetorical Devices and Terms J. Ritterson Terminology Washburn High School English Department Basic Abstract Not related to the concrete properties of an object; pertaining to ideas, concepts, or qualities, as opposed to physical attributes. Alliteration The repetition of initial consonant sounds or any vowel sounds within a formal grouping, such as a poetic line or stanza, or in close proximity in prose. Analytical A style of writing in which the subject is broken into its writing components and the components are subjected to detailed scrutiny. Anecdote A brief story or tale told by a character in a piece of literature. Antagonist Character or force in a literary work that opposes the main character, or protagonist. Argumentation is one of the four modes of discourse (see Description, Exposition, and Narration). It seeks to convince the reader of the truth or falseness of an idea. Writers sometimes accomplish this by appealing to readers' emotions as Orwell does in "Marrakech" or by appealing to readers' ethics as is the case in "None of This Is Fair" by Richard Rodriguez. Others, such as Andrew Hacker in "E.R.A.—R.I.P.," can argue for or against a volatile issue by appealing to the readers' sense of reason, though often in an argument these appeals are interrelated. Audience The person(s) reached by a piece of writing. Claim An assertion of something as fact; to demand as a right or as due. Closure Bringing to an end or conclusion. Coherence indicates an orderly relationship among the parts in a whole essay or other literary work.
    [Show full text]
  • Philip Roth by Erica Wagner for the Financial Times It Was Towards The
    Philip Roth by Erica Wagner for the Financial Times It was towards the end of our hour-long conversation that Philip Roth asked me what I made of one of the characters in his novel The Humbling. It was 2009, the year his penultimate book was published, the first year of Barack Obama’s presidency. I had flown to New York on a day’s notice to meet with Roth in a bland conference room in the office of his agent, Andrew Wylie. I was glad I hadn’t had more warning; less time to worry about how this encounter with prickly titan of American letters would go. The protagonist of The Humbling is an actor, Simon Axler, sliding into despair as he ages. Drawn to suicide, he checks himself into a psychiatric hospital where he encounters a woman, Sybil Van Buren, who asks Axler to kill her husband -- he’s been abusing their daughter. Axler’s encounter with Van Buren is a strange subplot in this peculiar, unsatisfying novel that doesn’t rank among Roth’s best work. But he noticed that in the course of our talk I hadn’t mentioned her at all. Why was that? I didn’t know what to make of her, I said. I thought her story, her connection with Axler, was going to go in a different direction; I was puzzled by what Roth had done. The moment I said this it was as if I was suddenly observing myself from a great height. Philip Roth is sitting across from me, and I am telling him I don’t like what he’s done.
    [Show full text]
  • An Introduction to Genre by Rachelle Ramirez
    An Introduction to Genre By Rachelle Ramirez © 2020, Rachelle Ramirez Introduction 2 What is Genre? 3 Genre’s Five Classifications 3 The Content Genre Toolbox 7 External Genres 11 Action 11 Crime 14 Horror 18 Transitional Genres 20 Thriller 20 Western 23 War 26 Love 29 Society 32 Performance 35 Internal Genres 37 Status 37 Worldview 40 Morality 43 Final Thoughts 46 Tips and Tricks for Determining Your Genre 46 Applying Genre to Your Work 47 Innovating on Genre 47 Putting It All Together 48 1 Introduction In this guide, you will learn the essentials of genre as taught in the Story Grid methodology by Shawn Coyne. Coyne developed his ideas during 25 years as an acquisitions editor in several major New York publishing houses. His goal was to have a tool he could use first to determine whether a manuscript worked, then to offer an objective diagnosis of manuscript problems and a clear plan of action for the author. I am offering this guide to authors who want to do as much of their own developmental editing as they can, with the goal of presenting the best possible version of their stories, either to literary agents or directly to the reading public. You’ve hit an obstacle. You’re not the first writer to start a story and get stuck along the way. Maybe you have a story idea but aren’t sure how to develop it. Maybe you’re into your fifth draft and don’t know how to solve a particular problem. Maybe you only sense something is wrong with your story but aren’t sure how to diagnose and fix it.
    [Show full text]
  • Paying Attention to Works of Fiction As Well As Fictional Worlds
    [Expositions 11.2 (2017) 34–56] Expositions (online) ISSN: 1747–5376 Pleading the Case: Paying Attention to Works of Fiction as well as Fictional Worlds ERIK SCHMIDT Gonzaga University ABSTRACT This essay argues that philosophical literary criticism should take questions about medium, genre, and form more seriously. Section one distinguishes between works of fiction and the fictional worlds they realize. Section two explains why philosophers should pay more attention to the features of a work of fiction that enable it to realize a fictional world. Section three uses Shakespeare’s Othello to illustrate how one formal feature of a work, dramatic irony, can be philosophically important. “And we would allow her advocates who are not poets but lovers of poetry to plead her case in prose without meter, and show that she is not only delightful but beneficial to orderly government and all the life of man. And we shall listen benevolently, for it will be clear gain for us if it can be shown that she bestows not only pleasure but benefit. Plato, Republic (607d–607e) Introduction Fiction plays an important role in philosophy. To see this, we only need to think of such prominent thought experiments as John Searle’s story about an isolated person translating Chinese characters, Frank Jackson’s story about a color-blind color scientist, or Judith Jarvis Thompson’s story about awakening to find yourself surgically connected to a violinist in renal failure. These stories, and others like them, figure prominently in a wide range of philosophical efforts to develop counterexamples, illustrate complex concepts, and establish various modal claims.1 35 Schmidt Fiction also makes an appearance in philosophy in other ways.
    [Show full text]