Friday, January 31, 2020

Political Philosophy of Thomas Hobbes and Rene Descartes Essay Example for Free

Political Philosophy of Thomas Hobbes and Rene Descartes Essay Politics should be the application of the science Of man to the construction of the community Explain this remark and discuss what reasons there might be for thinking it is not trueIn this essay I intend to examine the political philosophy of Thomas Hobbes and Rene Descartes, in particular their ideas relating to the science of man, and attempt to explain why their ideas prove that it is not possible to construct a science of man. I will also briefly mention the philosophy of Donald Davidson in regards to a science of man. The theories of Hobbes and the contemporary socio-biologists attempt to recognise how man works and on that basis build a society. Hobbes wished to be seen as the inventor of the science of politics (Sorrell, p45) He went about this by looking at the psychology of man and discovering that man is a mechanism. Hobbes wanted to understand mechanics. He wanted to look at why men live the way that they do in society and therefore, breaks it down. By doing this he discovered that people are cogs in the social machine. Therefore he wants to examine this cogs to achieve an understanding of the social mechanism, and does this by looking at the psychology of the mind. Hobbes is both an empirist and a materialist. Empirists believe that sense gives all knowledge. Generally, they do not believe in astrology, god, electrons etc. Their philosophy is summed up by saying that all things that give true knowledge can be sensed. Materialists believe that all things in existence are physical matter. In other words, the soul and the spirit do not exist. Therefore Hobbes believes that thoughts are material, that they are caused by sense and vice versa. Tom Sorrell suggests in his essay, entitled Hobbes scheme of the sciences, that rather than have knowledge of how the mechanics of the minds passions work, a more successful way of gaining political knowledge is to understand what these passions cause. They cause various degrees of action, with the possessor going to various extents to achieve what they want. In chapter six of De Corpere, Hobbes makes a connection between the knowledge of the principles of politics and the knowledge of the motions of the average human mind. Hobbes account of political science is an idea of what man must do if his goal is self-preservation. These ideas are not what mankind will do but what it will have to do, in a rational way, to form a political civilisation. One would assume that as Hobbes identifies both a natural science (that of the work of nature), and a civil science that of the common wealth (which makes laws and wills), he would suggest that they are parallels which, in political philosophy, work together. However, there are a few problems with Hobbes theory. Hobbes suggests that a monarch makes a better sovereign than an assembly. Yet, surely he would not agree that a monarch who is not dedicated would be better suited than a group of thoughtful representatives. A politically secure society is built up from its people. Hobbes believes that these people all have one motivation; self-gain, or to be more precise self-preservation. Hobbes suggests that there is a link between voluntary motion and vital motion. He goes on to say that senses work together with the vital motions to produce that which is voluntary, i.e. an endeavour. These endeavours can be categorised in two ways; attractions and aversions. An example of an attraction is to pick up a piece of cake because it looks good. That of an aversion is to run away from a dog because you are scared of dogs. As it is possible to see these actions are derived from the senses, again agreeing with Hobbes empirist theory. Endeavours are the small motions within man which occur before he walks, talks, runs or carries out any other voluntary motion. These endeavours are so small that they are undetectable. By understanding why men act the way that they do, it is easier to come to a conclusion as to how society should be structured. However, the idea that the existence of a science of man can be questioned suggests that society can be constructed without it. This is due to the fact that many psychological and political theories are founded on the basis that there is a science of man. Without this science of man these theories are in turn questioned and therefore cannot be viably backed as reasons for the construction of the community. Another prolific philosopher whose arguments should be taken into account is Rene Descartes. Descartes thinks that we, as humans, are made up of two separate substances. The body is the physical stuff and the mind the res cogitans (thinking thing) purely mental stuff. The res cogitans can will your body to move. The difficulty with Descartes theory is that the mind and body interact; if you pour boiling water on you hand, you will feel pain. Again we have to take into account voluntary and vital motions. A voluntary motion is me moving my arm. A vital motion is my arm moving. I move my arm because I want to; but I may not necessarily want it to be moved. This can happen for a number of reasons. It may be possible that I have a muscle spasm in my arm or that somebody moves it. All of this suggests that for Descartes theory to be correct there must be some kind of connection between a material substance (the body) and an immaterial substance (the mind). However, we will find it impossible to understand the idea of a science of man if we cannot understand how the two substances interact. Therefore, again, we have no proof that it is possible to build a political philosophy on the basis of a science of man. On p213 of Davidson , we find an explanation of monisms and dualisms. Theories are thus divided into four sorts: nomological monism, which affirms that there are correlating laws and that the events correlated are one (materialists belong in this category); nomological dualism, which compromises various forms of parallelism, interactionism and epiphenominalism; anomalous dualism which combines ontological dualism with the general failure of laws correlating the mental and the physical (cartesianism). And finally there is anomalous monism which shows an ontological bias only in that it allows the possibility that not all events are mental, while insisting that all events are physical. The final position is that which Davidson himself follows. Davidsons argument suggests that the psychology of man does not follow any causal laws. Therefore, it is impossible to impose any rationality on theories involving the mind. These anomological psychological states are defeasable. They are defeasable because it is possible that by adding another condition to the situation the expected behaviour changes. Therefore it is impossible to agree with any political philosophy that involves the necessity of a science of man. What is easily discovered is that there are many different political philosophies and many different concepts as to what is a science of man. Philosophers such as Hobbes and his counterparts, Mill and Marx, possess the shared assumption that political philosophers must accept the political opinion that they are arguing for. They all think that rational agents must accept their arguments yet they all have different arguments. They all believe that for a successful political structure human nature cannot be ignored, if the structure is to command respect. As I have shown, Descartes and Davidson on the other hand, believe that a science of man is impossible; Descartes because he believes that our minds are immaterial and Davidson because mans behaviour follows no causal laws. All of this shows us that trying to interpret mans actions and apply them to a science is an impossible conquest. Man is too complicated a mechanism to understand and therefore political philosophy, for a sensible and rational social structure, must be founded on another basis.

Thursday, January 23, 2020

Education Roles Essay -- Education Educate Papers

Education Roles Emerging from an extended period of ideological hostility between stubbornly-defined cold war blocs, we enter an era of strident nationalism and ethnic conflict. We observe conflicts of ethnic differences and historic disagreements, now fueled by the frustration of failed economic systems and faltering political regimes. Feelings of unity often arise out of a sense of shared experiences and common goals. In Canada, however, and in many other countries, people have been driven apart by geographic, racial, ethnic, linguistic, cultural and legal circumstances. As the widespread trend toward state division and republic formation continues, we must come to ask ourselves what can hold diverse people together. Primary and secondary school education-and specifically, the content and the form of national histories that are taught in classrooms around the world-provides a unique venue for the study of the development of nationalism. It may be the primary forum in which people construct, think about and interpret stories about themselves and their past, present and future. Through the Canadian experience, nationalism can be seen outside a context of war and deprivation. Yet as Michael Ignatieff-British resident and son of a Russian-born Canadian diplomat-writes of Canada, "Here we have one of the five richest nations on earth, a country so uniquely blessed with space and opportunity that the world's poor are beating at the door to get in, and it is tearing itself apart." Especially in the aftermath of an emotionally intense and statistically close referendum on Quà ©bec sovereignty in October 1995, Canada too must examine the possibilities for national unity. As I have thought about these possibilities, I have ... ...mmunity-active approaches to education, I am trying to understand the teacher's role and the role of education in general in individual development. Through current and further academic studies, I am attempting to understand the role of education in the social, economic, cultural and political development of the nation-state. The opportunity to study abroad for a year under a Rotary Scholarship would allow me to gain a greater understanding of the possible outcomes of various experiements in education attempted in another country as govenments, teachers, students and other citizens respond to social, economic and political conditions. The process and the aftermath of this experience would challenge me to explore the possibilities for creating and forwarding honest national histories-both abroad and in Canada-within which each individual's voice might be articulated.

Tuesday, January 14, 2020

Distributed Deadlock Detection: Mobile Device Processes Essay

The increasing utilization of mobile devices for development in application usually emphasizes or breaches customary computing methods. A number of obtainable problem solutions, for instance deadlock prevention and avoidance or leader election, are not fitted to situations where clients and servers equally move without restraint all over the network. The free movement of these applications creates interfaces and new events for distributed algorithms and functions that are customarily of no concern. The basic structures of a number of conventional distributed algorithms depend on suppositions, such as location of information, message transmittal and static network properties. The mobility of clients and servers in mobile device systems undermine these basic assumptions. Merely imposing conventional methods of solving problems into the mobile device systems alters the dynamic character of their environments by enforcing limitations, such as restricting device mobility. In effect, new efficient and effective methods for solving distributed issues are needed affecting mobile device systems. In a number of distributed applications there are complicated links between services and information. Mobile devices usually condense services and information like objects in OO (object oriented) programming, expanding and augmenting information and service link by including movement to information and services. In general, mobile devices such as those engaging consensus, transfer of data and database processing distribution must be each other well coordinated to offer services and information access. The advanced synchronization needed in these mobile device-based applications can result to multifarious, complex deadlock scenarios that must be identified and given solution. Conventional deadlock distribution setups are not successful when device mobility and errors are included to the requirement of deadlock resolution. What is more, because of their assumptions, conventional methods such as edge chasing on the global wait-for graph, are insufficient solutions in a mobile device structure. A solution should be developed to address the customary problem of resolution and deadlock detection for mobile device systems. What is Deadlock Deadlock is formally defined as: â€Å"A set of processes is deadlocked if each process in the set is waiting for an event that only another process in the set can cause. † In other words, deadlocks can happen every time limited resources are being competed by processes and these processes are permitted to obtain and hold a lock to the resource. If a process is waiting for resources, the resources it holds will be inaccessible to other processes. If, therefore, process A waits on a resource held by process B, and process B is waiting on one of the resources held by A, a deadlock is occurring. A system obtaining this condition is practically dead and to resume operating it must resolve the deadlock. According to Tenenbaum (1992), the four conditions obtaining a deadlock are: (1) Mutual exclusion. A resource can only be consigned to precisely one resource; (2) Hold and wait. Processes can hold one resource and can request for more; (3) No preemption. Resources cannot be effectively detached from a process; and (4) Circular wait. A circular sequence of processes is required, each process waiting for a resource held by the subsequent member of the sequence. In dealing with deadlocks, there are also four methods generally applied according to Tenenbaum (1992): ignore, detect, prevent, and avoid. Ignoring the problem presents the simplest way to deal with deadlocks. Detection of a deadlock before it occurs is a method trying to identify and locate deadlocks and resolve them. Avoidance of a deadlock is a method that attempts to find out if a deadlock will take place whenever a resource is requested and respond to the request in a way that avoids the occurrence of the deadlock. Prevention of a deadlock is system structuring in such a way that any of the four conditions that permit the possibility of a deadlock cannot take place. Problems with Mobile Devices in Deadlock Detection Breakdown and movement have to be considered in approaching distributed deadlock detection for a mobile device system. For instance, resources and users in conventional distributed deadlock detection do not move about through the system and each server has information about the site of other points that make up the network. In a mobile device system, devices execute operations by going through the source of information and performing locally to gain advantage of locality of reference. The mobile device and the host server can carry on interacting with other resources in the network. In effect, transactions can be distributed over multiple host servers bypassing the node that set off the transaction. Device movement clearly results in problems for algorithms that rely on information of location. In approaches for distributed deadlock detection such as core server or edge chasing, assumptions of location cannot be precluded as data is centrally collected or structured through a sequence of evaluations and verifications. To be able to detect and resolve distributed deadlocks, the processes must be able to pinpoint the nodes initiating the transaction. In a mobile device system, a device’s movement and operations cannot be traced simply. Hence, the device that set off a transaction is not easy to identify, as well as the secondary devices that are involved indirectly. Assumptions regarding location must be applied if a process is to operate efficiently and effectively in a mobile device system. Approach to Distributed Deadlock Detection in Mobile Device Settings The following assumptions illustrate the approach to distributed deadlock detection in mobile device settings: – All types of mobile devices are detached from the structure of the network, and therefore, they cannot move through the network by bypassing the information of how the nodes are linked. – The configuration of the network is immobile or static when the process starts. Priority transactions or two-stage commit are being utilized in standard deadlock avoidance methods. These systems permit the detection and processing of resolution to make certain that a device will not, of its own, unlock or unblock a resource during the process of detection. This feature is important in preventing shadow deadlock detection. – Only a user device can lock or unblock resources when it is actually present at the same location as the resource it is trying to manipulate. This feature permits host servers to convey the particulars being requested by a user device’s resource to its linked deadlock detection complements. A level of coordination between devices or common resources is present. As the devices execute their tasks, resources can be locked. This indicates that they are made solely to an individual user device. – All through the locking process user devices must communicate with the host server. The host is the final validating authority and can permit or reject access to a resource. Given that the host server can disallow the lock request of a device, a respond is needed. Depending on the device’s task, it could block or wait on the resource or it could resume processing and moving through the system.  The validating authority does not instantaneously block the device, as this would restrict flexibility and restrict the dynamic feature of the mobile device setting. – Devices must inform the host server if devices block on the resource. This permits the server to convey the condition of a device to its deadlock detection complements and reject any further request made by the blocked device. Devices that are blocked cannot unblock until the host authorizes their requests. – Devices must be distinctly recognizable the moment they hold a resource. They can be indentified in the device system at the time of the deadlock detection process. The role of identifying nodes may be made before a user device blocks or at the moment they lock a resource only. Overview of the System The mobile device system employs device-adapted methods that are founded in conventional edge-pushing global wait-for graph systems. Particularly, the distributions of the global wait-for graph into in-house maintained divisions and the introduction of deadlock detection examinations are based by conventional solutions. The three kinds of devices occupying the mobile device system are: User Device.  It is the only device in the system that dynamically executes tasks and locks or uses resources. It represents a device that applies the systems. It has no participation in deadlock resolution and detection; Phantom Device. This device is created by host servers and takes charge for keeping the resources locked by a particular user device, tracking it through the network and for starting the deadlock detection point. It further determines the information collected by detection devices to introduce deadlock resolution and detects and retrieves from errors during the process of deadlock detection. It signifies a part of the global wait-for graph; and, Detection Device. Phantom devices create this device when communicated by the host server that their aimed at device has blocked. They are diminutive, very light mobile devices that are tasked for calling hosts and creating the global wait-for graph and for decoding the deadlock condition. Initiating a Deadlock As user devices accomplish tasks, they may of their own lock resources all over the mobile device system. When user devices are created initially, they are not dynamically tracked by the host servers for deadlock detection purposes. The new devices can move without restraint over the network and use resources. User device tracking is done via environment tokens. Every time a device, therefore, approaches at a host server it must submit a token. This token has no significance to the device, and is only utilized by the host servers to manage the process of deadlock detection. User device tracking operations start at the time a device requests a resource lock. Part of permitting the request process is checking for a phantom device by the host server that is linked with the requesting device. If no shadow is present, one is generated and linked with the user device. The user device’s server token is then finally brought up to date to indicate the presence of the newly generated shadow device. When a shadow device is generated for a user device, it enables the host servers to control the process of deadlock detection. Shadow devices are informed of new device locks by host servers through a classified message. The message contains information on deadlock detection, such as the priority and identifier of the resource locked. When a phantom device is created and linked with a user device, they move together all over the network. This harmonized movement is synchronized by instantaneously routing a user’s shadow once the user transmits a passage request to the host server. Notably, this pairing of devices puts limitations on user devices. A user device cannot execute these actions if its linked shadow device is non-existent: moving, locking, and unlocking. The user is informed of the breakdown and the request must be submitted again. This limitation makes certain that the phantom devices will include the precise condition of the wait-for graph, even if they are postponed at the time of sending. Once a user device requests a lock that is rejected by a host server, it could consider blocking and waiting for the resource to be resolved. If the consideration to block is decided, the user device must notify the host server. Host servers respond to blocking information by notifying the user device’s shadow to permit deadlock data to be verified. If the user has no lock held, a shadow device is not present and cannot be notified. This is acceptable since the user device has no other locks held and it cannot be a participant of a distributed deadlock. The host server notifies shadow devices that their target object has blocked or unblocked via a coded message. Blocking and unblocking activities start the process of deadlock initiation. Once the shadow devices have been informed of a block activity, shadow devices inquire the host server to ascertain who is holding the lock on the target object resource. When the host server transmits information to the device identifier on who is holding the lock, a subsequent inquiry is done to ascertain if the device is remote or local. If the locking device is remote, the shadow device initiates the sequence of distributed deadlock detection. If not, no particular processing is occurring. Distributed Deadlock Detection Phantom devices introduce the deadlock detection sequence by creating detection devices. In the creation process, detection devices are commenced with their parent phantom device’s listing of locked resources and the servers where they are situated. This generation of a committed detection device permits a shadow to search at the same time for deadlocks and accordingly respond to other shadow detectors. When initiated, detector devices visit the locked resources by their aimed at user device. By noting the location of the network of each locked resource, routing of detector devices is speeded up. Each visit of the detector device in a resource, they inquire the host server to ascertain if other devices on that resource are blocked. If there are blocked devices found, their linked shadow device is located by the detector and inquires for their deadlock detection data. The processing happens at the same time for every blocked device on a resource held by an offsite device. The deadlock detection response is a list of recorded deadlock detection data that could include the following: Name of the Device. The distinctive identifier information of the user device; Resource Blocked. The resource that the device is blocked with, that includes the unique name of the resource, the user device that has this resource being locked, the server’s name that holds this resource, and the resource’s priority; Basic Locks. The list of basic locks or resources as held by this device. Relevant data regarding a user device that is blocked on a resource is summarized in each deadlock detection record. This information is included at each resource to the deadlock detection table of the detector since the device is blocked on a resource that is held by the detector’s object target. Because these devices are blocked on a resource that is held by another device, their overall detection table is being held indirectly by that device. The secondary information is applicable because blocked devices cannot act to release resources at the same time waiting for the locked resource by a detector’s object target. At the time a detector device visits every resources that were put in its initial array of locks, it goes back to its initial host server. When it arrives, the detector device notifies its shadow that it has came back and conveys its assembled deadlock table. The shadow device ascertains this table, which depicts the global wait-for graph, to make certain the presence of a deadlock. Shadow devices employ their target user device as a key to deadlock detection. If their target device shows in the table communicated by the detector, the target device is waiting on a resource as held by itself. Apparently a deadlock is present because the target device is blocked and that resource can never be released. Shadow devices perform recovery from breakdowns at the time of a deadlock detection point. Detection of a failure is performed through a running cycle calculation delay. Each shadow device is initialized with a fixed cycle time delay depending on the network type and its features. Shadow devices assume that their detector devices will be able to determine all of the required locks in less than four times the optimum delay cycle. When a detector device does not give a response in the optimal time allowed, the shadow device expects that a failure occurs and creates a new device detector to carry on the process of the failed device. Conclusion The suppositions of conventional distributed deadlock systems prevent them from successful completion in a mobile device setting. A successful detection and resolution of a mobile device distributed deadlocks applies the advantages of the mobile device model. The principal features of the advanced method, in particular, that separate it from the conventional solutions could be: reference locality, structure independence, asynchronous process, unrestricted movement, and fault tolerance. These features are accomplished through an independent platform, mobile device distributed deadlock detection resolution. The devices that use resources in the mobile device system are differentiated from the deadlock detection process. This differentiation generates dedicated devices for deadlock initialization, resolution, and detection. These devices are totally fitted to the features of the mobile device setting and operate together to perform a comprehensive distributed deadlock detection resolution. Mobile device settings demand structure flexibility and tolerance of fault. Integrating these properties and features into a mobile device solution affects overall performance. The features need further developing and messages. Because of the congruent nature of mobile device settings, there is no definite fact that these further messages do significantly affect deadlock detection efficiency and effectiveness. In addition, the insufficiency of comparable device solutions poses comparison and examination non-conclusive.

Monday, January 6, 2020

America’s Foreign Policy and the Cold War Essay - 1187 Words

America’s Foreign Policy and the Cold War The role of America at the end of World War II was where the origins of policing the world originate. America had been engaged in a very costly war in terms of dollars as well as lives. But, despite the expense the United States came out of World War II better than any other nation that was involved. The Second World War was a battle between the Allied and Axis Powers. The Allied Powers consisted of the United States, Great Britain, the Soviet Union, China, and France. This war was seen as the fight against Nazi Germany, and therefore resulted in a majority of the battles fought on German and Russian soil. The aftermath left the Soviet Union in bad shape. Close to twenty million Russians†¦show more content†¦This act created a single Department of Defense, and created the Central Intelligence Agency, or CIA. These two new agencies acted as the first step in atomic warfare management. Continuing to act as police of the world and leader of capitalism, Truman drafted the Marshall Plan. The Marshall Plan, which complemented the Truman Doctrine, was a program of large scale economic and military aid to Europe. Considered by some, this was the most innovative piece of foreign policy in American History. Where over the next four years the United States contributed over $12 billion to a highly successful recovery effort. The Soviet Union stilled commanded a blockade on highway, rail, and river traffic to West Berlin. As a result, the United States responded by entering into a peacetime military alliance; this being the first time since the American Revolution. The North Atlantic Treaty Organization (NATO) a project costing $1.3 billion, enabled the basing of all four United States Army divisions into Western Europe. Twelve nations agreed to sign this pact that stated an armed attack against one or more of them in Europe or North America shall be considered an attack against them all. Consequently, a few months later, Stalin lifted the blockade which had made the city a symbol of resistance to communism. Between the creation of NATO, the National Security Act and CIA, and the Marshall Plan, America was dictating theirShow MoreRelatedAssess the Significance of the Korean War in Relation to the Cold War1383 Words   |  6 PagesThe Korean War was the first major ‘proxy war’ of the Cold War, and was relatively significant to the development of the Cold War due to a number of factors. Overall it can be seen as a clear example of the United States’ policy of containment in action, leading to the vast growth of Americaâ€℠¢s military capability, as well as the globalisation of the Cold War due to the military alliances constructed by the US. Along with this, the Korean War ended with the emergence of China as the frontrunner ofRead MoreThe Politics Of Power By Ira Katznelson1315 Words   |  6 PagesIn the chapter â€Å"Foreign Policy† in the book, â€Å"The Politics of Power† by Ira Katznelson, Mark Kesselman, and Alan Draper, describes in detail of the events leading to America’s great level of dominance. Throughout the chapter, a few key points were made. The main three points that were observed in this chapter consisted of America’s influence and global expansion, the transition into the globalization era, and environmental problems. From the beginning of the exploration era, to the globalizationRead MoreComparative Critique of Kennans American Diplomacy and Williams the Tragedy of American Diplomacy1279 Words   |  6 Pagesspecifically examining the absence of dir ection in American foreign policy and with the end result of American strength and insecurity at the start of the Cold War. Williams, in his book The Tragedy of American Diplomacy, pursues a different but still critical perspective by asserting that American policy was largely motivated by the Open Door policy, which led to the eventual alienation of countries to the United States and ultimately created the Cold War. By analyzing these two works, contrasts in theRead MoreThe Truman Doctrine1364 Words   |  6 PagesAmerican Foreign Policy during the Cold War On March 12, 1947, President Harry S. Truman defined United States foreign policy in the context of its new role as a world superpower. Many historians consider his speech to Congress as the words that officially started the Cold War. The Truman Doctrine was a major break from U.S. historical trends of isolationist foreign policy. His speech led to the Cold War policy of containment. Moreover, it served as a precedent for future U.S. policy of interventionismRead MoreKorean War : The Cold War1598 Words   |  7 Pageshad already seen two appallingly destructive and costly World wars, just as the Cold War between the Soviet Union and the United States broke due to their ideological differences after World War II, in the midst of the Cold War was the Korean War. The Korean War began on June 25, 1950 when the North Korean People’s Army poured across the 38th parallel, a border between South and North Korea, to attack South Korea. The size of the war quickly grew as it began to i nvolve countries like China, SovietRead MoreTaking a Look at the Cold War996 Words   |  4 Pagesof World War II in the summer of 1945. The Soviet Union and the United States, having been on the Allies fighting against the Axis, were both victorious world superpowers at the end of WWII. With conflicting government systems (on one side socialism and on the other democracy) however, these two nations would fight a cold war for the next few decades in hope of making their rule secure. This would shape America’s foreign and domestic policy for the next few decades and define the Cold War presidentsRead MoreEssay about Detente and the Cold War1017 Words   |  5 Pagessuper power following World War II. Many of the Allies were deeply affected by the war financially and were struggling, thus leaving a vacuum that needed to be filled. The United States was thrust into the position of â€Å"policing† and assisting nations around the world. The Cold War was in many ways a psychological illusion however there were many factors that led to this illusion which were well founded. The Cold War stemmed from a multitude of factors, the difficult war against Nazi’s and JapanRead MoreU.s. Foreign Policy During The Cold War Essay918 Words   |  4 PagesThe overview of The U.S. Foreign Policy The objective of ‘the U.S. foreign policy’ course is to develop personal ability for applying IR theories to the U.S. foreign policy. Then, students will be able to understand the direction as well as the grounds of the U.S. foreign policy. To achieve this objective, I will discuss major the theoretical issues through the brief history of the U.S. foreign policy until the Cold War. After that, I will examine the challenges which the U.S. confronts. One ofRead MoreFall Of American Power1504 Words   |  7 PagesFollowing the Cold War, and the collapse of America’s economic rivals from the time, the implosion of the Soviet Union and Japan’s economic deflation in the early 1990’s, the United States held important roles in international politics that went beyond its extensive military arsenal and nuclear capacities. The U.S., which was then considered an incomparable and unattainable power, sat on top of an influential global economy power capable of stimulating other nations to want to follow on its pathRead MoreThe Clinton s Impeachment Of President Clinton947 Words   |  4 PagesAmerican public, this was a very emotional and eye opening experience that their nation was not invincible. When President Bush had to address the nation over this, it was clear that he would not turn his back on domestic policy and start making changes to American foreign policy in response to this attack. 2009- More Troops in Afghanistan After many debates, Obama persuaded Congress to approve the deployment of thousands of more troops to Afghanistan in 2009. The intention was to show he listened