Friday, August 7, 2015

C$50 Vacation Online Class Notes:

“everyone should learn how to program a computer… because it teaches you how to think”
>>Everyone should learn how to think so they can use computers haha.

binary sufficiently large alphabet to describe data, the decimal system extends from this.
description of binary
binary digit - bit
application programming interface

pseudocode:
analytical deconstruction of coding mechanisms in everyday situations, e.g. finding someone’s name in a phone book.

Scrats - graphical programming language

Cryptography - scrambling of information

breakout - implementation of coding skills in game

efficiency in programming - mb and other considerations

finance - application of cs50 to websites

_____________________________________________________
use of 3d printing in plastic and biological endeavors

32 halves of a 4 billion integer set will find any given integer

formalization of algorithms and contemporary nomenclature
use of conditions or branches to increase efficiency in coding, aka corner cases

variables store integers

Conditions handle corner cases

pseudocode use to handle problems
necessity for specificity in computer programming

Use of Scratch 2 for the purpose of familiarization with code structure


Boolean expressions - true or false questions
____________________________________________________________________
Moving from scratch to C
Loops - repetition
conditions - if.. else
BASIC and public accessibility to programming - pseudocode
source code - english like syntax more properly defined and formatted than pseudo code
-> compiler -> object code
compiler is a program which converts source code into object code which is in binary
printf - formatted printing, in C means that which is in parentheses will be printed to the screen
Functions
main, loops, 
int main(void) is normal initiation of general program coding
while (true) = forever
int counter = 0;
while (true)
{
printf(%d\n”, counter);
counter++;
}
a loop may use for: for (i=0, i>0, i<10, i=10)
variables
boolean expressions- use for greater than or less than statements
conditions - printing results from boolean expressions
hypervisor as a layering, allowing emulation of second operating system, in this class linux
Gedit - simple text editor 
Using C to make a program which can create a program
CD - change directory
ls- list
training wheels for the class are in cs50.h which is a header function
editing for errors: thinking about fundamental ideas
getchar- get command
getint- get integer
getstring- get word
equal sign will be equivalent to assign in the class

______________________________________________________________________

Outsourcing input in programming code

#include <stdio.h>
int main(void)
{
printf(“Hello, world\n”);
}
*/ to: *//

#include <cs50.h>
#include <stdio.h>
int main(void)
{
printf(“state your name\n”);
string s = GetString();     */ maybe? *//
printf(“Hello, world%s\n”, s);
}

UI- user interface
GUI - Graphical User Interface

header- including and downloading past functions stored on computer
default main - part of program which is executed first
printf- prints to screen
role of parentheses: surround inputs to the function
\n - new line
; - ends a statement

using DOS to move files and programs, access previous resources

escape sequence - begins with a “\” and initiates a specially procedure
%d, %i, %s, - place holder for decimal, integer, string
values can be stored
char - type of data
float is type of data
int is integer
long is for long long numbers

types of questions
bool - one or zero, yes or no
// is precursor to comment

loops: for, while, or do
variables: declaring variables and assigning values

int counter;
counter = 0;

#include <cs50.h>
#include <stdio.h>

int main(void)
{
printf(“Give me an integer: “);
int x = GetInt();
printf(“Give me another integer: “);
int y = GetInt();

printf(“The sum of %1 and %2 is %1f/n f = x + y”);
}

#include <cs50.h>
#include <stdio.h>

int main(void)
{
printf(“Give me an integer: “);
int n = GetInt();
If (n<0)
{
printf(“You picked a negative number “);
}
Else
{
printf(“You picked a positive number”);
}
___________________________________________________________________

Bug - mistake in program
{
for (int i = 0; i < 10; i++)
{
printf(“*”);
printf(“\n”);
}
}

Curly brace are needed for function

Mac bug in implementation of SSL: one line error
double goto fail; second executes no matter what

abstractions - solving problems without solving problems
look for the main function and follow code logically from there
print-> getstring -> PrintName
PrintName is written within the code, not pre-prorammed into C
prints hello, comma, name

using int and void
void does not return anything, it may print something
int will return an integer, eg. input cubed
the variable must be declared outside of the curly braces in which it is used, anything else will return an error, as the variable is referenced in a section of code in which it does not exist

This is the same reason that header files should almost always be at the top of the code

Scope - local vs. global
extant in variables
representation of information:
types: char, int, float, double, long long
char - one byte, character, 8 bits
int - 4 bytes, or 32 bits, highest number that can be represented is 4 billion
float - 4 bytes, or 32 bits, only have a finite amount of precision
double - 8 bytes, but still finite, problematic in graphics or mathematical formulas
long long - 8 bytes, 2X an int

integer overflow
0 will come after 255

floating-point precision: will throw decimals away in the event an int is used 
use floating values instead, and the decimal will be returned
imprecision will occur at a certain point, however
this creates some severe and legitimate side effects 
Ariane rocket built for the ESA was too fast and overloaded the software which was not prepared to handle the problem
Patriot missile in first Gulf War, suffered the same problem
both iraqi wobble allowed failure of patriot system, as well as a software glitch which prevented tracking of incoming missiles when the radar system was in operation for a “long time”
a tenth of a second could not be expressed in binary

____________________________________________________________________________

Cryptography:
decoder ring and algorithm associated
strings - memory
|z|a|m|y|l|a|
structuring the string into a box^^^

{
string s = GetString();
for (int i = 0; i < strlen(s);  ++i)
{
printf(“%c\n”, s[i]);
}
}

will not compile: needs header files
add: #include <stdio.h> for for and printf and <cs50.h> for string
strlen is in directory not included in header, short for string length
use man (for manual) strlen to find directory: #include <string.h>

if (s != NULL) should be added after GetString in order to prevent program crashing from improper input

!= - does not equal

to improve design, n should be substituted for strlen(s), this is more cumbersome in the program, but will use less cycles of the computer and is a superior design

i++ is the same as i +=1

ASCII American Standard Code for Information Interchanges

for (int i = 65; i <65 + 26; i++) //establishes a loop, which will continue for 26 cycles

It becomes necessary to then treat the i as a char, which allows transcription of the numeric value into a character or series of characters.

&& - and

if (s[i] >= ‘a’ && s[i] <= ‘z’)
{
*/ This allows the program to determine whether an input is a lower case letter or not, by adding 32 to the letter or subtracting 32 from the letter (char), this will change a lowercase letter to an uppercase letter or vice-versa, topper requires #include <ctype.h>*//

so this comes in : printf(“%s\c”, toupper(s[i]));
which simplifies the if and else statement somewhat, but this is where the function refers to, and what it looks like within the original directory

importance of planning in memory allocation:
rather than typing zamyla_|_| and depressing enter to begin on the next line, a computer will represent an end of a string in memory with a great number of zeros so zamyla\0belinda\0gabe\0daven\0
a string in a row of boxes in C is known as an array
array - contiguous sequence of similar data types

#include<cs50.h>
#include<stdio.h>

int main(void)
{
int age1 = GetInt();
int age2 = GetInt();
int age3 = GetInt();
//do something with those numbers
}

The program, however, is limited: if more than 3 or less than 3 ages show up, the program will crash, requiring a rewrite of the code every time it is posted
this can be avoided by declaring a variable each time, which will be saved, say, as i

command-line arguments
encryption algorithm, such as ROT-13, simply rotation 13
examples include caesar, vigenere, the latter of which is more secure and requires a different rotation for each letter

_______________________________________________________________________________
#includes
int main (void)
{
//todo
}
mkdir pset2 - creates a directory
so far main cannot take any arguments, it returns void
int argc, string argv[] can replace void, will allow understanding of what a string is under the hood
arrays use square brackets which are used to declare the size of the array
argv- argument vector, array of arguments, above it is used as a string of arguments
command line arguments:
argc is an int, can be any number
argv is an array, will have multiple values e.g.. argv[0], argv[1] etc…
argc will count the number of strings associated to argv, so cd hello: argc = 2 but hello.c argc =1
#include <cs50.h>
#include <stdio.h>
int main(int argc, string argv[])
{
printf(“hello, %s\n”, argv[1]);
}
by manipulating this number in the brackets, unfettered access may be gained into memory which should not be accessed
#include <cs50.h>
#include <stdio.h>
int main(int argc, string argv[])
{
if (argc == 2)
{
printf(“hello, %s\n”, argv[1]);
return 0;
}
else
{
return 1;
}
}
This serves as a sanity check, which will ensure that only the memory allocated to the program is accessed

string - array of chars

so in each indexes there are array of chars

%c is placeholder for char
syntax - argv[i][j] i denotes the string, j will denote the char within that string to display

CPU cycles necessary for integer order to be established
-bubblesort
-selectionsort
-insertionsort
all of the algorithms are fundamentally equally efficient, because there is a more efficient manner of carrying out the sorting:
others include
-mergesort
-gnomesort


_______________________________________________________________________________

“Shellshock” internet crash
Command line shell, allows programmers to launch programs and features, spying as well
2/3 of all web servers were placed at risk
action: matching, monitering web virals
“born again shell”
is also  a programming language: allows defining your own commands, hello() { echo “hello, world”; }
will create a shell program which prints hello, world
historically, present for over 20 years
in mac: env x=‘() { :; }; echo vulnerable’ bash -c :
this will return whether the computer is vulnerable to bash viruses
rm -rf * instead of vulnerable will delete all files in specified directory
Security requires complete coverage, attack requires only one entry point

reflections on trusting trust

breakout:
n log (n)
log base 2 of 8 is 3

on input of n elements
if in < 2
return
else
sort left half of elements
sort right half of elements
merge sorted halves
 T(n) = T(n/2)+T(n/2)+O(n)
ultimately equals O n log n
that pseudocode is recursive, that is to use cycling

sigma-0.c
adds numbers 1 through n

int sigma(int n);

int main(void)
{
int n;
do
{
printf(“Positive integer please: “;
n = GetInt();
}
while (n>0)
int answer = sigma(n);
printf (“%i\n”, answer);
}
//avoids risk of an infinite loop below
int sigma(int m)
{
if (m <= 1)
return 0;
else
return (m + sigma(m - 1));
}

int sum = 0;
for (int i =1; i <= m; i++)
{
sum += i;
}
return sum;
}


// necessity to access this outside of the loop

text
initialized data
initialized data
heap
|
v
^
|
stack
environment variables

this idea of recursion can cause some problems and will come back in later classes in which programs require hierarchy in trees: there is a necessity not to exceed available memory by allowing these trays of memory to pile on excessively

void swap(int a, int b)
{
int tmp = a;
a = b;
b = tmp;
}

shows necessity for a 3rd content, tmp, to enable a swap of two variables, a and b
when using in a program, the swap values must be returned to the main, and transferred to the original variables

gdb - a program which can be added before running programs to find bugs
syntax: (gdb) run or next or print (variable)

this can be manipulated to explore the program in full and find what the computer thinks is going on at various points and variables throughout the program, line by line
________________________________________________________________________________________________

Monday, August 3, 2015

Picky Eaters: the Plant or the Person?


This research published by Nancy Zucker at the Department of Psychiatry and Behavioral Sciences, Duke Medical School in conjunction with a team of researchers through Duke University Press examines the mental stability of picky eaters in a careful manner. Evaluation of  current and prospective mental stability are both provided and family stability is also examined. This provides an insight into one of the most pervasive of human relations with botanical life: nutrition. Causality of the disorder is  examined or determined as severity of the disorder correlates appropriately with severity of associated mental illnesses and leaves logical deduction of coincidence slim; the success of early and aggressive intervention is highlighted, and the research suggests appropriate action while acknowledging the limitations provided by such a study.
Selective eating disorder has been chosen for the research because of its overwhelming prevalence, and with the data provided in the study, the overwhelming consequences of inaction. It is worth noting that 14-20% of young children suffer from the disorder and co-occurring psychological illness can be seen demonstrated in a medically appropriate manner. The crisis is apparent: nearly 2/3 of these parents who have afflicted children have reported that the disorder was not addressed appropriately by medical professionals. While the research is limited, it is also longitudinal and fills a scientific gap in investigation into the nature of this disorder, a gap which the authors attribute the inaction of medical professionals to.
While the research does not directly address the plant-based eating choices of the children themselves, a systematic evaluation of the families is also done: children with selective eating disorder were significantly more likely to have mothers with mental health histories and those with moderate selective eating disorder (about 3% of the sample) were significantly more likely to have mothers with substance abuse histories. This plays into the psychoactive role of many plant-based compounds which can create physical dependence and demonstrates their effects on the families and individuals around those who make these illegal choices. The research is critical to that of plant biology because both taste and texture of foods are identified as factors in the development of the disorder, and the crisis has been created in which some children may eat enough to sufficiently fit criteria of weight gain and avoid more traditional diagnosis while still not obtaining enough nutrients from plant or animal-based food and drink to maintain psychological or physical health. Finally, it should also be noted that children with severe selective eating disorder have more than twice the rate of depression or social anxiety as those without though those with moderate selective eating disorder, though these diagnoses were substituted with an association with, not necessarily causal, symptoms of ADHD and separation anxiety not seen in severe cases.

Works Cited:

Sunday, July 26, 2015

Botany blog post on Defining heterogeneity as a second level of variation:

On the 19th of June 2015, Web Ecology published a research paper by B. B. Hanberry titled Defining heterogeneity as a second level of variation. The paper evaluates the use of the word heterogeneity in modern literature for the purpose of scientific research. While currently it appears heterogeneity is generally seen as a superior description to homogeneity in many situations, the paper attempts to initiate a discussion on a few logical fallacies which exist in this methodology. Initially this is addressed on terms of grounds of terminology and from a logical perspective the author draws an important distinction in the actual hierarchy of terminology: that in fact heterogeneity is not, as frequently claimed, an existential quantifier, but actually closer to a universal quantifier. While I did not find it clear that heterogeneity was therefore claimed as a definite universal quantifier, use of challenging the grounds of actual use was quite helpful in discovering what this actually meant: because many botanical papers use heterogeneity synonymously with variability, this can create confusion because in fact variability is only one part of multiple different aspects upon which the inclusive term heterogeneity must touch upon. To illustrate this point, a forest fire is used as an example. While heterogeneity is a spatial measurement, abiotic conditions tend to represent variability within the context of the premises provided in the example, that is variation independent of other variables, with a few exceptions such as soil or water. For conditions to be described as homogenous or heterogenous, it follows, the variability or lack thereof must be accessible across spatial, time, or other physical description (which can be extrapolated through a reduction of a given paradigm, as is done in the article with a forest fire).

Hanberry, B. B. "Defining heterogeneity as a second level of variation." Web Ecology 15.1 (2015): 25-28.

Friday, July 10, 2015

Lead exposure, weight gain, hypertension, and early mortality: case study and review

Background:
As increased lead exposure from contaminated marijuana use in the USA and Germany has been confirmed, the potential impacts of severe or light lead exposure are being drawn once again into the public light. The mean adult lead exposure in the USA dropped by 41% from the 1990s to the 2000s from 2.76 μg/dL to 1.64 μg/dL, which has been causally shown to prevent the nearly triple the rate of kidney death and double the rate of peripheral artery disease, which includes cardiovascular death which was present before (Muntner). These low levels of increased lead exposure have been shown to result in a 1.55 increased odds ratio for mortality in all cardio-vascular mortality, after adjusting for all other factors (Menke). This translates into over 7 years of lost life expectancy (Tsai), simply from the cardio-vascular effects of lead toxicity. 
The mean for previous mean lead exposure is now still extant in the higher quartile of adults now that lead exposure has dropped significantly, which makes what was formerly believed to be a safe level of lead exposure very dangerous for those who are still exposed to elevated levels of lead. The expected drop in hypertension from removal of lead from the environment within these boundaries is estimated at 17.5% (Pirkle). Hypertension is a condition which induces an increased hazard ratio of about 1.30 of at least one annual kilogram of weight gain (Stevens), or around 80 kilograms in a lifetime. These weight changes as well as lead exposure have been associated or identified causally with neurological changes, most notably brain lesions (Stewart), which brain imaging and cardiovascular data in this case study have confirmed.
Fortunately for this study and for those who are exposed to lead-infused marijuana or environmental hazards, a study from Veterans affairs has found that increased mortality and negative health effects from lead exposure is only significant with long-term cumulative exposure (Weisskopf). Because the trials were conducted over a period of multiple years, it is likely that there will not be long term or lasting effects once lesions are allowed to heal and with natural expiration of the toxin from the body.
Case study and Results:
Unfortunately, in the case study of a responsible adult marijuana user (5-10 grams at 10% mean THC content per week) in the Northeast of the USA, these sorts of statistical analyses were not useful. In the first run, diastolic blood pressure was over 95 directly after the trial though lead was not initially considered as a factor, with considerations of light alcohol use and high nicotine intake believed to be causally tied to this negative symptom. Re-trial, without regular use of nicotine (substitution of pipe tobacco, with virtually no absorbed nicotine for cigarette tobacco which has between 5 and 13 times the amount of absorbed nicotine) and no use of alcohol, determined lead levels of around 3.5 μg/dL, or levels qualifying as occupational hazard and outside of the range of environmental exposure. With levels taken only one month after the trial had ended and a half-life of lead in the human body of around one month, it can be assumed that these levels at a maximum were at least 7 μg/dL (Barbosa). The increases in blood pressure associated with occupational exposure to lead, which this level still falls into the highest decibel among, are around 10 mm Hg in blood pressure, though due to the young age and good health of the subject and lower expected peak exposure level symptoms may not be as exacerbated as noted in long-term occupational exposure ratios (Glenn).
Physical or cardio-vascular side effects aside, the exposure to lead also has multiple symptoms of neurodegeneration which present themselves and confound earlier attempts to pinpoint neurological effects of THC on the brain, though increased functional connectivity was still noted and remains a confirmed positive effect of marijuana on the brain. The impact of lead on the brain in any amounts on adults or children has been shown to be increased brain lesions and negative on all brain structures as proven using MRI technology (Stewart). This is consistent with the single photon emission computed tomography scan performed which showed increased functional connectivity, but altered blood-flow throughout the brain (Fischer), believed at the time to be the result of specific toxins, though now shown to be an undocumented variable: the environmental toxin lead.

Works Cited:
Barbosa Jr, Fernando, et al. "A critical review of biomarkers used for monitoring human exposure to lead: advantages, limitations, and future needs."Environmental health perspectives (2005): 1669-1674.
Fischer, Paul Andreas. "Single Photon Emission Computed Tomography - Alcohol and Marijuana light use, case study."http://platophilosphy.blogspot.com/2014/07/effects-of-regular-or-light-marijuana.html (2014).
Glenn, Barbara S., et al. "The longitudinal association of lead with blood pressure." Epidemiology 14.1 (2003): 30-36.
Menke, Andy, et al. "Blood lead below 0.48 μmol/L (10 μg/dL) and mortality among US adults." Circulation 114.13 (2006): 1388-1394.
Muntner, Paul, et al. "Continued decline in blood lead levels among adults in the United States: the National Health and Nutrition Examination Surveys."Archives of Internal Medicine 165.18 (2005): 2155-2161.
Pirkle, James L., et al. "The relationship between blood lead levels and blood pressure and its cardiovascular risk implications." American journal of epidemiology 121.2 (1985): 246-258.
Stevens, J., et al. "Associations between weight gain and incident hypertension in a bi-ethnic cohort: the Atherosclerosis Risk in Communities Study."International journal of obesity and related metabolic disorders: journal of the International Association for the Study of Obesity 26.1 (2002): 58-64.
Stewart, W. F., et al. "Past adult lead exposure is linked to neurodegeneration measured by brain MRI." Neurology 66.10 (2006): 1476-1484.
Tsai, Shan P., Robert J. Hardy, and C. P. Wen. "The standardized mortality ratio and life expectancy." American journal of epidemiology 135.7 (1992): 824-831.
Weisskopf, Marc G., et al. "A prospective study of bone lead concentration and death from all causes, cardiovascular diseases, and cancer in the Department of Veterans Affairs Normative Aging Study." Circulation 120.12 (2009): 1056-1064.

Wednesday, July 8, 2015

Sylvia by AR Gurney Character Bios

Greg is an introverted upwardly mobile older man who rejects success in both life and relationships to pursue personal hobbies or goals without supervision. This reflects negatively on his ability to interact with others, both peers and superiors. He is clearly college educated, yet he missed on some of the more important facets of mandatory socialization both before university and afterwards; this was doubtless lost on children who are now substituted by his obsession with a dog and not his wife, who also displays serious breaks from psychological norms in her hatred of the imposition on their new life as well as her obsession with her own success.
While Greg is pleased with his wife’s success and capabilities, he is also dismally unable to show this or put her before his own neurotic needs. In conversation with others he combines the unfavorable traits of both being a showboat as well as one completely without connection or compliance to the interests and needs of those around him. Fortunately, this creates an insular sort of charm in his behavior: he is unabashed in his pathological behavior and it is clear that he does so without malevolent intent. 
He is able without manipulation or tricks to resolve his conflict with his wife, though he displays a chronic absentmindedness and abstention from consideration of other’s wants or desires, even in the setting of professional counseling. This is compounded to such a level that the counselor advises Greg’s wife to shoot his dog and divorce him for every penny he has. Ultimately the trial and tribulation he introduces the family to proves to have a stabilizing effect and his wife finds her love for him stronger than the transient needs of her career or social circles.

Tom is a classic New York City dog owner. He has a story and a book to read for just about any subject, all of which reflect on his obsession with the canine variety. He comes off as a bit friendly, and makes it clear that his friendship has come at the expense of his own marriage, and he highly expects the same to occur with his social circle.
He is not one who lets another person get a word in. Much time spent conversing with dogs has turned his desire for human socialization off. Yet he still has the incentive to reach out to another dog-lover. He has a certain Ancient Mariner behavior which appears to be the result of severe opposition to his personal choices. By reaching out to Greg with his miserable tales of domestic addiction, he finds himself passing the curse, one he does not himself recognize, on.

Phyllis is a dominant, sarcastic Southerner who has moved to New York City and settled in well. She travels in powerful circles and harbors a powerful addiction to alcohol. She has no love for animals or people who behave like animals, yet her social life has become a bit endemic to boredom for her. She weaves intricacies of humor and occasionally demeaning statements, though it is clear her Southern and well-off upbringing restrain her from making directly rude or mean statements.


She is a member of a secret society which prohibits the use of alcohol, but is still easily triggered into substance use. Her liver is shot and she becomes wasted quickly and on demand; it is probable that she was a light-weight from a young age. Her husband sneaks off to the aquarium and takes baths with his goldfish, her utter abhorrence aside. It cannot be sure if this anecdote is one provided for the purpose of secretly making fun of her college friend’s predicament or is a true cry for help.

Objectivism in Desire: a Reaction to Direction in Acting

Paul Fischer
Acting
7.8.2015

Objectivism in Desire: a Reaction to Direction in Acting

There is a break in the analysis of acting as the specificity of acting is brought into question. This is an indication of three primary objectives in obtaining “the golden key” or fundamental necessity towards social discovery by a player of the character they must develop or is necessitated in reproducing a specific set of qualities which buy, in capitalistic terminology, belief. A subdivision of the golden key, defined as wants, is created with the addition of the direction of this want to amplification and dependency on external response.
An objective is the system of wants experienced by a character; this is mentioned as a deference to Stanislavski, the famous professor of acting in the middle of the century. Different objectives in a scene are referred to as beats which are influenced in turn by individual characters, their wants. Somehow this reinforces the realism of a scene.
The focus must then move to that of the director from the actor. The director has two roles in rehearsal: persistence and persuasion. Both of these roles play into the director’s own duties, in which the objectives must be effectively painted and then execution elicited from actors or actresses by a variety of means. This is described as a quest.
The quest is predicated on a natural resistance on the behalf of the player towards assumption of a role which must be imposed upon them. Because the “actor tends to postpone choices that would cause him pain” and any departure from his normal stasis in personality is also painful, there must be a recognition that the process is by definition painful. The role of the director in persuasion is thus brought into full view. Rather than indicating or giving a representation of the character assigned, a player must be persuaded to experience the passion and inner life of their character.

Finally, duplicity in methods is tackled. There are lists of emotions, motivations, and experiences which are provided, but these are dismissed as irrelevant. By breaking these lists down to a simple necessity to fully immerse oneself in performance, the desires of the character, the duty of a director or an actor is both exposed as quite simple, and daunting. This single golden key to acting which is described as the character’s wants can be a duty which is frightening in nature.

Tuesday, July 7, 2015

Within You, Without You: Honest Pursuit of Realistic Acting Techniques

Paul Fischer
Acting
7.7.2015

Within You, Without You: Honest Pursuit of Realistic Acting Techniques

The aspects of acting necessary to creating a realistic performance are critical to effective communication and life. This can be seen in two primary components of an acting career. These are internal belief and external technique. By taking a subjective approach the actor’s viewpoint is used to direct the consciousness into a “real instrument” that can be used in the real world. Dissection of the methodology will be performed by evaluation of honesty and cognitive dissonance in acting.
Cognitive dissonance is a psychological term which at the time of the reading was relatively newly explored by modern psychological scientific experiments. By proving that once a person lied, it became a new reality for them. With time, repeating the innocuous mistruth would indeed prove to be the subject’s reality. It would be curious to see this repeated with modern, cheap, and readily available lie detectors, though some level of accuracy must be assumed from the statistical analysis of volunteer responses. This helps provide a demonstration of the proof: “separate acting from reality, therefore, is to diminish both.”
Yet more is necessary in the construction of such a proof. The glue that holds the pairing of reality and communication together is the function of the audience. The “apparently artificial presence of an audience” is described as perplexing for the paradoxes presented. This demonstrates the importance of honesty in the player; failure to create such a performance strikes them as deceptive. The definition which is critical here is that “interaction-for-an-audience we can simply call a performance.”
By integration of the facets described of acting a certain recipe is prepared in the reading: “success is achieved through study, struggle, preparation, infinite trial and error, training, discipline, experience and work.” The instrument which described acting earlier now manifests itself in acting power, described as an ultimate instrument of communication. While there are no consequences explicitly described for failure to adhere to integration of acting principles, the incentive to realize a characters role for actor and for audience can be described as a grail of sorts.
This works in conjunction with the psychological and scientific basis of what is asserted in the discourse. While the methodology is in necessity of replication with modern scientific means, the logical basis of the theses asserted have been shown to be reproducible and effective in both stage and film when used. For this work to be confounded would require an exceptional redefinition of both success and represent a drastic critique of academic integrity in the decades past. Replicating the research with modern science, however, will doubtless provide a unique and positive fine tuning of results which have already been acquired. What was available and dealt with here represents ability to change trends in audience and personal reaction; imagine being able to manipulate the amplitude of these trends.
.