Monday, September 30, 2019
A Picture is Worth a thousandââ¬Â¦Parts?
It is presumed that adults can not recognize a face in parts as easily as the complete facial structure.à It is presumed to be as such because adults recognize the features of an individualââ¬â¢s face more easily than the context of the facial patterns in isolation (762).This gestalt-like facial processing theoretically begins in infancy and has a developmental milestone that is disrupted if something delays or obliterates this phenomenon.à On television shows and in magazines I recall partial viewings of celebritiesââ¬â¢ faces and I almost never got it right.à Such is the finding of Young et al in 1987 study in which adults found it difficult to recognize the top half of a celebritiesââ¬â¢ face when it was alignedà with bottom half of a different face (762).à Some theorists believe there is an intimate ability to recognize faces.à However, this research study invalidates that theory.à A controlled experiment was done with patients that were born with or suffered from visual impairments at infancy.These participants were all less than seven months when visual acuity was affected.à Vision was later corrected and the experiment for holistic facial identification had commenced (765).To test for the gestalt-like effect, participants were asked to move a joystick forward if the top halves were the same and back if the top halves were different.à Composites were created by splitting face images horizontally across the middle of the nose, and then recombining the faces using the top and bottom halves of different individuals.à In the aligned position, the top and bottom were properly aligned.In the misaligned condition the top half was shifted horizontally to the left (764). à The results were astounding.à The group that had visual imperfections at infancy actually performed better than their control counterparts on same trials when faces were aligned (766).This group was also more accurate on different trials than on same t rials and did not vary with alignment (766).à This supports the theory that this ability is not innate.à Holistic face processing or a composite face effect was not a sustained ability of those with visual impairments at a critical time period.à Such patients fail to integrate facial features into a Gestalt (767).This experiment shows that early visual input is very critical for the normal development of facial processing.à It also raises the question of whether early vision is necessary to preserve the neural substrate that would allow training to induce the later development of holistic processing of non-face objects (767),à I find it rather interesting and this bizarre phenomenon begs the question of when the critical time period begins and ends.The article states that by age six, adult-like processing takes place.à It does not state if visual perception is disrupted after age six, if this ability for gestalt-like processing is still apparent.à Thus this expe riment does not prove that infancy is the critical time period or developmental milestone for this ability.To be sufficient, it would have to include a group of participants that had visual impairments later in life and the length of the impairment would have to be similar.à What about visual impairments for one and two year olds? This only mentions infancy from 3 to 6 months.This experiment is partial, at best.à I would also like to know how the control group compares to those who have visual impairments that have not been corrected.à Are such people able to recognize faces aligned and misaligned with similar circumstances? These are critical points to validate and substantiate the findings of this experiment.
Sunday, September 29, 2019
Great Migration
Beginning 1910 and leading through the end of the 1920ââ¬â¢s, a ââ¬Å"Great Migrationâ⬠took place int he United States where more than 2 million African Americans moved from the Southern United States to the Midwest, Northeast and West. Much of the movement was a response to the high levels of racism in the South as well as employment opportunities in the growing industrial cities. The results of this movement not only affected the current economic climate but also led to many changes that would continue to evolve for generations to come.This essay is designed to provide a deeper understanding of the migration in order to hopefully provide insight into much of the culture we encounter in todayââ¬â¢s society. As we explore the deeper reasoning behind the sudden migration of African Americans to the more urbanized locations of America, we must first consider the increased level of racism in the South of this time. ââ¬Å"The primary factor for migration was the racial clim ate and widespread violence of lynching in the South. â⬠1 With the Jim Crow laws being in effect, much of the idea of ââ¬Å"separate but equalâ⬠facilities for African Americans was terribly skewed. In reality, this led to treatment and accommodations that were usually inferior to those provided for white Americans, systematizing a number of economic, educational and social disadvantages. â⬠2 Through these disadvantages, a higher level of oppression was then conveniently enforced on African Americans of the South including voting restrictions, separation of schools and job restrictions. During and World War 1, the industries of the North began to grow significantly due to the needs of the war.As industries grew, so did the job market. With the increase in job openings and the restrictions placed on immigration to the United States, blacks from the South found opportunity to escape the harsh economic climate of the South. Looking at the growth of the cities, a connect ion is made with the railroad locations. ââ¬Å"People tended to take the cheapest rail ticket possible. This resulted in, for example, many people from Mississippi moving directly north to Chicago, from Alabama to Cleveland and Detroit, and Louisiana to California. 1 With this mass movement, came a huge cultural shift among African Americans. Having better opportunities in industries away from the failing farming market, fighting in the Great War, and forming new communities away from the more severely oppressive South brought about a level of pride in their black culture, much of this leading to riots and protesting among African American groups. Even before the war, African Americans had stepped up protests against discrimination.The NAACP ââ¬Å"fought school segregation in Northern cities during the 1920s and lobbied hard, though unsuccessfully, for a federal anti-lynching bill. â⬠3 With the continued growth of black pride, it soon found its cultural expression in the â⠬Å"Harlem Renaissanceââ¬âthe first self-conscious literary and artistic movement in African American history. During the 1920s, Harlem became the capital of black America, attracting black intellectuals and artists from across the country and the Caribbean. Soon, the Harlem Renaissance was in full bloom. â⬠3Because African American migrants maintained much of their Southern culture and speech patterns, such differences created a sense of ââ¬Å"othernessâ⬠in terms of their acceptance by others who were living in the cities before them. ââ¬Å"Stereotypes ascribed to ââ¬Å"blackâ⬠people during this period and ensuing generations often derived from African American migrants' rural cultural traditions, which were maintained in stark contrast to the urban environments in which the people resided. â⬠1 Many of these stereotypes are known and enforced even in todays society showing the underlying effect of racism in a culture years down the road.The Great Migrati onââ¬â¢s effects on our culture both political, economic and sociologically have effected much of where we are today. In hopes of branching even further from our tainted past, we must learn from it. ââ¬Å"Those who cannot remember the past are condemned to repeat it. ââ¬Å"4 -George Santayana Sources: 1. http://en. wikipedia. org/wiki/Great_Migration_(African_American) 2. http://en. wikipedia. org/wiki/Jim_Crow_laws 3. http://www. digitalhistory. uh. edu/database/article_display. cfm? HHID=443 4. http://en. wikipedia. org/wiki/George_Santayana
Saturday, September 28, 2019
The Observation Instrument Paper Essay Example | Topics and Well Written Essays - 750 words
The Observation Instrument Paper - Essay Example This renewed interest has been stimulated by the education accountability movement, the teacher minimum competency movement, and the continuing emphasis on excellence in education Contemporary teacher classroom performanceâ⬠. (Carolyn Lavely, à Neal Berger, à Joseph Blackman, à John Follman, à Jan McCarthyObservation instruments Education, à Summer, 1994 à - retrieved on 4/11/2008 rethttp://findarticles.com/p/articles/mi_qa3673/is_/ai_n28646693) The class room teacher observation instruments will help a teacher for a diagnosis about his level of teaching. How far a teacher is effective for the students in the classroom? What are the defects of the methodology implemented by the teacher? How can a teacher correct himself? Which errors should be corrected and which should be ignored? Who should be correcting the errors? Is it appropriate to correct the mistakes in the classroom itself? These questions can be answered in order to improve the level of teaching with the help of observation instruments. The most commonly used classroom teacher observation instruments are ââ¬Å"Classroom Observation Form Open Ended ââ¬â (Form A), Classroom Observation Report, Classroom Observation The observer will check the development of learning materials, Use and selection of instructional materials, the learning climate, variety of materials used, preparation of the class session, method of instruction and student participation, student responses and feedback, learning difficulties etc. using the Classroom Observation Form Open Ended ââ¬â (Form A). The observer can study whether the objectives for the specified class given or not. He can also analyse the outcome of the instruction. He can also analyse the appropriateness, quantity and quality of the instructional materials used. The class climate also can be analysed using this instrument. The overall activeness, the student attitude towards the topic and the teacher, their participation and the teacherââ¬â¢s
Friday, September 27, 2019
Freud psychosexual stages of development Research Proposal
Freud psychosexual stages of development - Research Proposal Example The mouth, anus and genital regions are the three major zones that Freud identified. The theory looks at the effects of sexual pleasure drive on a personââ¬â¢s psyche. A person cannot proceed to the next stage if the current stageââ¬â¢s developmental conflicts have not been resolved. This paper seeks to analyze the progression of a child through the five stages that result into a healthy or unhealthy person. The oral stage is the first Freud stage begins when the child is born up to when it is about one and a half years. The oral cavity or rather the mouth is the main focus of libido energy. The child accepts anything that comes close to its mouth and has great pleasure in sucking (Phillip, 2002: p224). The child also expects to be held, cared for and mothered. If a child doesnââ¬â¢t receive these services from the mother or the services were denied before the stage was over, the child is likely to get frustrated and will grow up to be pessimist, envious, sarcastic and suspicious. If the child on the other hand got an excess of these needs, it will grow to be optimistic, gullible and will always admire the individual in him. Weaning brings the stage to an end (Theo, 2000: p1). This is the second stage that takes place between one and a half years to three years. The erogenous zone at this stage is the anus and the childââ¬â¢s focus is on the retention and elimination of faeces. The parentââ¬â¢s child takes quite sometime in training the child on toilet issues trying to ensure that the child learns to control its anal stimulations. A child that doesnââ¬â¢t receive enough training in the field is more likely to be obsessed on perfection, cleanliness, meticulous, etc. On the other hand, a child who receives excess training is more likely to be messy, careless, reckless, disorganized, defiant, etc (Phillip, 2002: p224). The third stage occurs between the third and the sixth year. The erogenous zone at
Thursday, September 26, 2019
ANALYSING A SPREADSHEET AND PRESENTING A BUSINESS REPORT Case Study
ANALYSING A SPREADSHEET AND PRESENTING A BUSINESS REPORT - Case Study Example From the reference data provided by the business, there are 4 types of fruit juices that are available for sale. Each type of juice has two variances in size, one in 375ml and another in 750ml. According to the sales calculations presented in the spreadsheet charts, the fruit juices differ in the number of sales they attract. The variance could be mainly due to, popularity of a type of fruit juice among buyers or the price per carton for each. However, various factors may apply depending on the market of operation for the business. By comparing the pivot table charts against the sales calculations over the five weeks, orange and mandarin are seen to have higher sales. As the weeks progress, sales for the two types of fruit juices are seen to project further than the other two. This shows that mobile app based marketing was more acceptable as compared to emails and or texts. Unlike the emails or texts, the mobile apps presented more benefits to the retailers buying the fruit juices. That is, a retailer would be able to plan a reminder, place an order and track customer orders right from their smartphones. Emails and texts, on the other hand, would only serve the purpose of acting as reminders. If not spread out proportionally, the emails and text messages would easily become nagging and stubborn to the retail buyers. From the charts, the buyers would prefer being reminded through a smartphone mobile app. In the fourth week marketing strategy, a two-for-one strategy was introduced on mandarin fruit juice. From the pivot table, the sales for the mandarin fruit juice are seen to consistently increase from the second week: Little change is seen on the sales at the fourth or fifth week. A further look at the sales for mandarin juice reveals that, though the product made more sales that apple and grapefruit juice, it was selling below par. That is, the two-for-one policy did not impact the sales upwards as would be expected. Reason
Wednesday, September 25, 2019
Article Review Example | Topics and Well Written Essays - 250 words - 5
Review - Article Example For all those abroad and at home made uncomfortable by the far-reaching assertions of American power, it was a time of predictable aggravation (Brennan 1). Without shock, they heard an overconfident Republican president swearing to make his nationââ¬â¢s attackers pay, and appearing to pay no more attention to legal facts instead of a cowboy bent on an execution. Behind all these endeavors lie two solid questions left answered by Mr. Bushââ¬â¢s rallying call of 2001: whether the United States can lay claim to the lawful powers of a country waging war, or whether it is more just, wiser or more useful to murder or capture terrorists and militants bent on causing harm to the country. Such an article, if gone through by business leaders, would persuade them to invest in the United States since the article informs people how the nation has improved technologically (Brennan 1). The article supports Obamaââ¬â¢s use of technology to bring prosperity to the United States, which is a good way of attracting investors to the
Tuesday, September 24, 2019
Business law assignment Example | Topics and Well Written Essays - 750 words
Business law - Assignment Example ties can consider various alternatives without arriving at the final agreement while litigation is contentious and costly and getting back to courts will require a change of circumstances of the case. Mediation is cheaper since the parties hire a neutral mediation expert as opposed to litigation which entails two opposing attorneys and numerous court proceedings. An indictable offence is an offence that can only be tried on an indictment after preliminary hearing to determine whether the accused has a prima facie case to answer. They are the most serious offences under the criminal code and carry serious punishments such as life in correctional centres. Some facts of indictable offences include the lack of limitation on when charges can be laid with exception of treason where the limitation for trial is three years. The trials are held in Provincial courts. The police can arrest a person without a warrant of arrest. The convicted persons can only apply for pardon after ten years since conviction. Examples of such offences in Canada include murder, treason, and aggravated sexual assault (Baudouin and Linden 45). Section s16 (2) of the Act outlines the official languages and provides equality of the two languages since New Brunswick is dominated by English speaking and French speaking citizens. In this case, the government institutions and legislative organs must use the two languages. Section 28 of the Act safeguards gender equality by outlining that both males and females are guaranteed equal rights and freedoms. The section is important since it prohibits discrimination on the basis of gender. c) The plaintiff claimed both general and special damages. General damages are not assessed directly and include non-monetary losses suffered from the injuries. In this case, general damages include depression, loss of future income due to injuries, pain, disfigurement and loss of lifestyle. The special damages are directly linked to the injuries and quantifiable in
Monday, September 23, 2019
Do silver ions kill bacteria Essay Example | Topics and Well Written Essays - 250 words
Do silver ions kill bacteria - Essay Example & Etris, S.F. 1997 p.107-114). The mechanism of inhibition performed by silver ions on bacteria was analysed using gram-positive Straphylococcus aureus and gram negative E.coli by treating with AgNO3 and was analysed using a combined X-ray microanalysis and electron microscopy. Both S.aureus and E.coli cells exhibited similar morphological changes after silver treatment. The cell wall of the bacteria detached the cytoplasm membrane and a remarkable electron-light area surfaced in the middle of the cells that contained condensed DNA molecules. Several electron dense granules were also found deposited inside the cell or surrounding the cell wall. The presence of elements of sulphur and silver in cytoplasm and electron dense granules detected by X-ray microanalysis revealed the antibacterial actions of silver. The protein became inactivated and DNA lost its ability to replicate after the treatment of silver (Feng et al 2000 p.662-668). The anti-bacterial action of silver is based on the release of silver (Ag+ ions) that act by displacing essential ions of metals such as Zn+ or Ca2+. A study by Dowling et al using anti-bacterial silver coating deposited on heat sensitive polymeric substrates deploying a combination of neutral atom beam and magnetron sputtering indicates that platinum can be used to increase the release of Ag+ ions from the silver coating. In a galvanic setting platinum exhibits enhanced activity than silver and therefore platinum enhances silver ion formation during the galvanic action. The analysis of bacterial adhesion and bactericidal reaction on coated polymers using straphylococcus epidermidis reveals that the addition of 1% platinum significantly increases the anti-bacterial effectiveness of silver coatings. For every 5 nm thick Ag/1% Platinum coatings on silicone, up to a two log reduction in bacterial adhesion is achieved that did not show cytotoxicity (Dowling et al. 2003
Sunday, September 22, 2019
Proposal for Student Activity Essay Example | Topics and Well Written Essays - 750 words
Proposal for Student Activity - Essay Example This is because powerpoint presentations will only include the main points of the chapter and will help the students quickly overview each chapter. At end of each chapter, they will be instructed to present their .ppt presentations in front of the whole class so that they get to better understand what they have learnt and may remove any confusions and doubts in the question-answer session at the end of each presentation. This will also help them develop their public speaking skills and gain confidence to speak in front of their class fellows and professor. Another advantage is that they will be able to use powerpoint software to make complex presentations in future. This is all about integrating ICT (information and communication technology) in the classroom which fulfils the most modern needs of todayââ¬â¢s classrooms in terms of technology. Doing so will also empower the students because they will be able to convey their knowledge and ask questions at the end of every presentati on. Before implementing this proposal, I will distribute a survey among the students to figure out what percentage of them wants to carry out my plan and how many of them are uncomfortable with idea. Those who will not be willing will be asked the reason and the issue will be solved at immediate basis. The only issue that comes to my mind is that some students may not be expert at using computers or the powerpoint software. Teachers will be arranged to give them some classes on this topic so that they are able to make their independent presentations. This is a prerequisite for the eventual succession plan. I am well-suited to carry out this plan since I am very much impressed by the ICT concepts of todayââ¬â¢s technological world and I want to equip the students with the most sophisticated means of education and learning. ââ¬Å"ICT has a distinctive contribution to make to the aims of the national curriculum as a wholeâ⬠(Qualifications and Curriculum Authority). I am also interested to propose student activities for the ââ¬ËOffice of Student Lifeââ¬â¢ and will do my best to achieve my succession plans. The Office can surely entrust me with funding for carrying out this plan because I possess character certificates from previous institutions and believe in that honesty is the best policy. I am able to work on a collaborative platform with the fellow officers and can communicate effectively. I can pass on my ideas to others while convincing them with logics and sound arguments. I am also expert in clarifying technical concepts to the non-technical audience and that is why in this proposal I am taking into special consideration those students who are not expert in computers and am proposing that sessions will be arranged to help them out. My activity club will surely give many benefits to the Office and the university as a whole because its mission is to incorporate ICT tools in classrooms and improve student learning. The purpose of introducing I CT in education is to enhance learning and educational activities of students and support the teaching process by means of computers, internet and the latest technologies (Siraj-Blatchford & Siraj-Blatchford 19). According to Saverinus Kaka, ââ¬Å"education sector can be the most effective sector to anticipate and eliminate the negative impact of ICT. Technology (internet) in another side can be the most
Saturday, September 21, 2019
Matisse and Munch Essay Example for Free
Matisse and Munch Essay The Dance ââ¬â Henri Matisse, (1909), oil on canvas. This painting was commissioned in 1909 by Sergei Shchukin for decorative purposes (MoMa). The painting comprises five nudes dancing in a circle that is reminiscent of ancient pagan practices. Dance of Life ââ¬â Edvard Munch, (1899), oil on canvas. This painting was comprises of what can be described as a ââ¬Ëcyclic view of lifeââ¬â¢ whereby ââ¬Å"We repeat ourselves like crystals that are dissolved and then recrystallise againâ⬠(Munch in Humanities Web). This piece is a highly symbolic picture of life and death and the union of souls while Matisse invokes the somewhat basic nature of humanity right down to its drives and instincts. Munch was particularly concerned with the various ways in which you see the same thing, depending on mood and time of day. ââ¬Å"The fact is that at different times you see with different eyes.â⬠(Munch in Eggum). Matisse prized himself on a mature compilation of color and line that was not close to the morbid fascination with death that Munch had. In the two paintings there is a distinct two dimensionality that is curiously juxtaposed to a somewhat well-arranged subject matter. Matisse and Munch both use the same vivid color but Munch has a much more diverse palette in this case. Matisse appears to be sampling the primitive nature of life that is shown by the nudity of the subjects as well as the circular composition of subjects that is reminiscent of baroque artists such as Rubens. Munch uses color to denote the presence of life on the left hand side (white) and death (black) in the clothing of the woman on the right. In between is a fire-red dress that symbolises the unity of the man and the woman. Munch creates a heavy background full of circling people while in Matisse there is no background except for a horizon line created by green paint. The background in Munchââ¬â¢s painting shows the people becoming smaller in an attempt to give the impression of depth in an otherwise flat picture. References: Eggum, Arne. Edvard Munch as a Painter. Munch Museet, 2009. http://www.munch.museum.no/content.aspx?id=15mid=lang=en Humanities Web. The Dance of Life. 2009. http://www.humanitiesweb.org/human.php?s=gp=ca=pID=480 MoMa. Henri Matisse ââ¬â Gallery label text. 2006. http://www.moma.org/collection/browse_results.php?object_id=79124
Friday, September 20, 2019
Advantages And Disadvantages Of Encryption Security Types Computer Science Essay
Advantages And Disadvantages Of Encryption Security Types Computer Science Essay An Egyption scribe used non-standard hieroglyphs in an inscription about 1900 BC. Example of written cryptography is the first documented that lists by Kahn. A piece of flat stone carved into a collage of images and some writing to identify themselves in trading dealings in 1500 BC antique Assyrian merchants used in intaglio. The digital signature produced by this mechanism. This signature belongs to the trader, but they only have that intaglio to produce the signature. The reversed-alphabet simple replacement cipher known as ATBASH is used by Hebrew scribes writing down the book of Jeremiah in 500-600 BC. A small number of Hebrew ciphers of the time are only one that is ATBASH. Skytale a device used called by Greek which is a staff around that a long, thin strip of leather was wrapped and written on. The leather was taken off and worn as a belt. It would seem that a matching staff and the encrypting staff would be left home by the recipient. In the field of 100-44 BC in government communications used a simple substitution with the normal alphabet by Julius Caesar. This produce only in a little amount, but it is not stronger like ATBASH.When this read by few people it was good enough. Julius Caesar didnt trust the messengers but trusted his associates. Inspired the solution of a cryptogram in Greek for the Byzantine emperor by A.D Abu Abd al-Rahman al-Khalil ibn Ahmad ibn Amar ibn Tammam al Farahidi al-Zadi al Yahmadi wrote a book on cryptography in 725-790. Plaintext at the massages start was based on the result. It was a regular cryptanalytic technique and used still in WW-II in opposition to Enigma messages. Kahn has found the first model of the nomenclature. A grouping replacement alphabet and small code compiled by Clement VII at the appeal in 1379 Gabrieli di Lavinde. For the next 450 years this class of code was to stay in common use in the middle of diplomats and some civilians. There were stronger ciphers being imaginary in the interim in the face of the truth, probably because of its relative expediency. The manipulative a cipher disk to make things easier the process, its make-believe and available the first polyalphabetic cipher at 1466 Leon Battista Alberti. Until the 1800s, this type of cipher was actually not working. In addition his own creation, Alberti wrote expansively on the position the art in ciphers. He also used the disk for enciphered code. These systems were much stronger than the nomenclature. The first book wrote on cryptology at 1518 Johannes Trithemius. Each letter was represented as a word taken from a succession of columns that make-believe a steganographic cipher. The now-standard form of rectangular substitution tables is described as polyalphabetic ciphers. The notion of varying alphabets with each other introduced by Johannes Trithemius. The key for a repetitive polyalphabetic cipher is introduced at 1553 Giovan Batista Belaso the opinion of using a passphrase. Introducing the digraphic cipher wrote a text on ciphers at 1563 Giovanni Battista Porta. Transposition, substitution and symbol substitution are classified as ciphers. To confuse the cryptanalyst he uses the optional of synonyms and misspellings. The first authentic plaintext and cipher text auto key systems together with wrote a book on ciphers at 1585 Blaise de Vigenere. A biliteral cipher known today as 5-bit double encoding at 1623 Sir Francis Bacon described a cipher which now bears his name. Dr.Robert Patterson make-believe his wheel cipher perhaps aided at 1790 Thomas Jefferson. The father of US cryptanalysis was in a job as a civilian cryptanalyst at Riverbank Laboratories and performed cryptanalysis for the US Government is be honored at 1917 William Frederick Friedman. The Enigma machine was taken over and superior upon to become the cryptographic workhorse of Nazi Germany at 1933-1945. But the Enigma machine was not profitable success. U.S. Data Encryption Standard preferred with changes by the US NSA based on the Lucifer cipher a plan at 1976 by IBM. New Directions in Cryptography, introducing the suggestion of public key cryptography in print by Whitfield Diffie on 1976. The Diffie-Hellman was stimulated on 1977, paper and acting as complete novices in cryptography, Ronald L. Rivest, Adi Shamir and Leonard M. To make a useful public key system had been discussing by Adleman. The full scientific report to anyone submitting a self-addressed, stamped envelope offer was included in the Scientific American article. An application for a New Block Encryption Standard a planned International Data Encryption Algorithm (IDEA) was published on 1990 by Xuejia Lai and James Massey in Switzerland. The warning by the FBI to require access to the clear text of the interactions of citizens. PGP (Pretty Good Privacy) was the unrestricted first description on 1991 by Phil Zimmermann. The earlier RC2 and RC4 algorithms included in RSADSIs BSAFE cryptographic library the author was Professor Ron Rivest on 1994. The user can vary the block size, number of rounds and key length, if the algorithm uses data-dependent rotation as its non-linear operation and parameterized. Introduction to Encryption Systems Encryption is a process to encrypt the messages that can be readable by the person who knows how to decrypt the messages. This method has been used for over 2,000 years. The encryption is refers to the translation of a data into a secret code by using the algorithms. In the science of cryptography the process that involved is encryption. The messages must be securely sent. These messages could be numeric data, text or secret codes. For example, Missile Launch Codes. This encryption systems providing privacy for the authorized peoples communications. The receiver must have a key to decrypt the message to return to its original plain text form. The key that use to decrypt the message is trigger mechanism to the algorithm. Nowadays, encryption systems is the advent of the internet and public used it rarely. Moreover, these systems became largely military tool. There are used this systems in many field. Such as banking, online marketing, healthcare and other services. Even the average householder is aware of the encryption. When an address beginning with https that shows that web browsers is encrypt text automatically when connected to a secure server. When connected to a secure website, even the browsers automatically encrypt the information but many of them still choose the use of the encryption to do their email. The feature plug-ins or interfaces for the popular email clients will be easily accomplished with the help of encryption program. The most popular and longstanding is called PGP (Pretty Good Privacy), a name for very strong military-grade encryption program. It will be allowed to not only for the messages, but also may used for the personal files and folders as well. When the information tra vels between the computers, interception of the transmission that cannot be readable because it was in unreadable gibberish. Even there are many types of encryption but not all types of encryption are reliable. Other than that, there are same computer that yields strong encryption that can be used to break weak encryption schemes. Earlier years, they used 64-bit encryption and they taught that was quite strong but it was break by the 128-bit encryption. This is the standard encryption and this will not change in the future. It was undoubtful.The data makes private by the strong encryption. But, it is not compulsory will be secure. If the used data wants to be secure, the recipient must be positively identified as being the approved party. The digital signatures or certificates are usually accomplished online. Types of Encryption The encryption consists of 5 types of encryption systems. There are manual encryption, transparent encryption, symmetric encryption, asymmetric encryption and email encryption. Firstly, manual encryption. This type of encryption involves the use of the encryption software. This encryption encrypts the computer programs in various bits of information digitally. Users participation must completely involve in this encryption. If the wants to encrypt the file, the user have to choose the type of encryption from a list that provided by the security system. This may use in the personal computers. For the reason that is the user easy to encrypt the personal files in a way they like, and also it will be protecting the personal material on a computer. Secondly is the transparent encryption. This encryption can be downloaded onto a computer to encrypt everything automatically. This is the most protected type, since it doesnt leave out anything. The computer has an encrypt duplicate in every ex ecutable appliance and folder that formed endure authority surges and defends information in casing a computer is stolen. In addition symmetric encryption also defined as one of the type of encryption. By using this type of encryption can easily encrypt information by own self. For an example, a letter or number coincides with another letter or number in the encryption code. The code can make by ourselves. Such as a=1, b=2 and so on. Besides that, asymmetric encryption is a safe and easy way that can be used to encrypt data that will be receiving. This type will do by electronically. The public key can be seeing by whoever want or post somewhere. Others can encrypt the information and send it back. There is also another key even the public key decipher that is private key. This key has only one person have. This means the data will encrypt by public key but it can be read only by the whomever has the private key. Lastly the email encryption is typically same as asymmetrical encryption method. This method is the emails that in inbox cannot be read by others especially by the hackers. There are 2 types of email encryption. The result in who gets the private key to the email is the first an email supplier. The client of an email address is given by regularly. The second type is managed over who gets the key gives by the user. This way the encrypt emails can read by others who have the private key given. Types of Encryption Software There are two main encryption-software types: Disk-encryption software, which protects mutually programs and data Data-encryption software, which protects just data Disk Encryption Software This type of software also called as full-disk-encryption software that used to protects the complete hard drive. This including the operating system, all software programs and its folders and files except for the MBR (Master Boot Record). Disk encryption hardware will protect the whole hard drive as well as MBR. This software no needs to buy, it will be already contain in a new computer or upgrade to a new operating system. For instance, Microsoft Vista and Windows 7 Enterprise and Ultimate editions. This software will protect the computer when not using it only. The laptop must switch off when not using it. Data Encryption Software This type of software will protects the chosen folders and files in an implicit vault, volume Or safe. In the computer must be store all the sensitive data in a virtual vault. When the virtual vault is closed only the data encryption software will protects the data. Whereas not actually working on any data within it should always closed the virtual vault. Process of Encryption 1The Encryption Process Binary message is very simple process of encryption The binary message is simply xored with another binary sequence The second sequence must be random Example: Let the message be ECE 101 Using ASCII encoding, we get: 45x 43x 45x 20x 31x 30x 31x In binary form: 01000101 01000011 01000101 00100000 00110001 00110000 00110001 Now select a random sequence of equal length, example: 1010011 1000011 0101101 1101110 0110010 1010001 1101010 The encrypted message is then: E C E SPACE 1 0 1 45x 43x 45x 20x 31x 30x 31x 1000101 1000011 1000101 0100000 0110001 0110000 0110001 $oplus$ 1010011 1000011 0101101 1101110 0110010 1010001 1101010 = 0010110 0000000 1101000 1001110 0000011 1100001 1011011 16x 00x 68x 4Ex 03x 61x 5Bx SYN NULL h N ETX a [ 2The Decryption Process To decrypt the encrypted message it must be xored with the same random sequence that was used for encryption. SYN NULL h N ETX a [ 16x 00x 68x 4Ex 03x 61x 5Bx 0010110 0000000 1101000 1001110 0000011 1100001 1011011 $oplus$ 1010011 1000011 0101101 1101110 0110010 1010001 1101010 = 1000101 1000011 1000101 0100000 0110001 0110000 0110001 45x 43x 45x 20x 31x 30x 31x E C E SPACE 1 0 1 Fundamentally, this works because $0 oplus 0 = 0$and $1 oplus 1 = 0$ $x oplus 0 = x$, for x=0 or x=1. 3Comparison of secret key and public key cryptography Uses of Encryption There are five uses of encryption: Uses of encryption Details Confidentiality The person correspondent or the recipient can normally be implicit of encrypted data Error Detection The inside of the message have not unintentionally changed will be checking User Authentication The recipient that the correspondent is the real creator and not someone else by the verification Message Authentication The messages have not been lost or interfered with when do the verification Proof of Origin The message came from the declared correspondent is providing to the third party Types of Encryption Algorithms There are six types of encryption algorithms. They are RSA, DES/3DES, Blowfish, Idea, Seal and RC4. The key length is discerned by the strong encryption used the algorithms. RSA The idea of a public key system was proposed in 1977. After, this proposed the 3 mathematicians, Ron Rivest, Adi Shamir and Len Adleman give a concrete example of how the method can be implement. A private and public key was used by this system and this method refers to RSA Scheme. This system used the term n=p*q. DES/3DES U.S was developed and endorsed the Data encryption Standard (DES) in 1977 as official standard form. A block cipher with 64-bit block size that uses 56-bit keys by DES. Some of them not concern about the DES secure. The Triple-DES (3DES) has emerged with a strong method. With the help of DES/3DES giving it a cumulative key size of 112-168 bits. BLOWFISH This is like a symmetric block cipher same as DES or IDEA. The blowfish was created on 1993 by Bruce Schneier. Then it gets acceptances as a strong encryption. IDEA On early 1990s the International Data Encryption Algorithms (IDEA) by Dr.X.Lai and Prof.J.Massey in Switzerland replacing by the DES standard. This system uses encryption and decryption at 8 bytes in a time. SEAL In 1993 Software-optimized Encryption Algorithm (SEAL) was designed by Rogaway and Coppersmith. Block Ciphers is slower than Stream Ciphers. This SEAL is considered very safe because it has 160 bit key. RC4 Ron Rivest was invented RC4 cipher. Commercial systems like Lotus Notes and Netscape was used this cipher. This cipher used 2048 bits (256 bytes) key size. It relatively fast and strong ciphers. Advantages and Disadvantages Encryption is playing a most important role in day-to-day. Even it play role in important, there also have some negative points. Advantages Disadvantages The information that stored in the computer from not permitted access-even from people who not have access the computer system that can be defend An aggressor can cooperation the encryption series itself The transmission from one computer to another computer can protect the information An aggressor might find a earlier anonymous and comparatively simple way to translate messages encrypted with the algorithm that using The data can be used to deter and detect accidental or intentional alterations The deleting all the data cannot be prevent by attacker To know the author of the document can be verify Before it is encrypted or after it is decrypted could access the file by attacker Cryptography VS Encryption Cryptography Encryption The science and study of secret writing is defined as cryptography The desktop-computer insurgency has made it likely for cryptographic techniques to become widely used and accessible to no experts Cryptography is a part of the history, on the ancient years complex based codes and algorithms and machines was created By having some secure communications the Enigma machine was developed by Germans, throughout the World War I The secret Ultra project through World War II was Enigma codes that decrypted by the British Users suggestion is always encryption of the unbelievable on system, or the holder or the law of the enforcement This system changed a plaintext to the cipher text, which always has the look of casual The encrypted form called as cryptogram, the process of the encryption will be determined by the encryption algorithms The transformation will be truthfulness, genuineness and privacy provides by the encryption The information that send by the A is authentic and has not been tampered Algorithm Compression Loss Authenticity IEDS No No Yes SCAN Yes No No MIE No No No CIE No No No VQ Yes No No DRP No No No VC No Yes No 4Figure 2.1 Image Encryption Algorithm Property Comparison Table Importance of Encryption This is a very mysterious subject. The administration seems have no realistic application outer surface. The computer has distorted the age. In this world has do whole thing was recorded on computers that was connected to the Internet. There are many areas use encryption: The outsiders cannot snatch a copy of the transit that will assure by the encryption. The transit will be going between the commerce with many places of work locations needs to send computer data files among themselves. The encryption system allows them to hide the information among themselves when dissimilar people share the computer system. But nowadays almost they share similar in some form. The possible document only can read by the person who designed the encryption. Even others have the physical access to it. This issue modified encryption keys to the people. If everybody keeps their personal data in encryption form, this was worried by the law enforment authorities. Because of this, they tried a limit of using the strong encryption by the general public. The encryption software treats as military ammunition by the laws of the United States of America and it will be allowed export with case-by-case permission from the government. Examples of Encryption There are few examples of encryption. This example can easily break by the unauthorized people. By this examples, can understand more about the encryption. Reverser Decode EncodeThis type will be the reverse of whole message. If someone want to look the encrypted words, they can see the words by the backwards. Example: hello olleh hello Shifter Decode EncodeThe letters incremented by one so a becomes b, b becomes c and so on. The message will be more easier when incremented. By this type of encryption also others can see the letters. Example: hello ifmmp hello Flipper Decode EncodeThis is done by flipping every two characters. This is done by switched the 1st and 2nd letters, 3rd and 4th letters and so on. This also easy to encrypt the letters again. Example: hello ehllo hello Caesar Cipher Decode EncodeThis was made by Julius Caesar. This can be seen in the history. This also can be easily broken. The encrypted message is being used to replace the real message. Example: hello khoor hello Challenges and Technologies 5The encryption is very useful to the worldwide. Even it is useful, there are some challenges that faced by the encryption: GLBA compliance and emerging technologies by Paul Rohmeyer, Contributor The second decade of managing information risks under the regularly oversight of Section 501. RSA 2008: Financial industry security challenges The unique security challenges facing the financial industry its talks by the Executive Director Ed Zeitler. This can put strain on IT. Overcoming USA Patriot Act challenges This was contributors by Michael Rasmussen and Michael Landers. The authority to regulate various activities of financial institutions and they required them to maintain anti-money laundering programs. Regulatory and competitive forces The privacy laws are required to protect identity and personal financial information from unauthorized parties. Key management challenges and best practices This explains that to all procedures related to generation, exchange, storage, safeguarding, use and replacement of keys. BITS releases guide for implementing email authentication protocols 500s consumer-facing services brands adopted DKIM and Sender ID (SIDF), Microsofts version of SPF. The challenge is to locating all their sources of email. 6Other than that, there some technologies in the encryption. RSA encryption system was the top of the list, it developed by Ronald Rivest, Shamir, and Leonard Aldeman in the late of 1970 at the Massachusetts Institute of Technology. Security Sockets Layer (SSL) is a public-key encryption seems widely used in client-to-server applications. It was developed by Netscape and supported by Microsoft browsers. This SSL was suffered from its complex computation system, which prolongs the time it takes to perform the encryption and decryption processes. Besides that, Pretty Good Privacy (PGP), also a technology was developed by Phil Zimmermman. It was released on 1991. This was easy to use and strong encryption. After 1996, PGP was launched as commercialize the software. Then, Zimmerman man continued to develop more the PGP. There are some companies operating over a large network to protect the information on their hard drives, the program was Symantec Corps Norton Your Eyes Only. On 2000, Wi ndows 2000 was equipped with automatic encryption schemes. Alternatively, the programs could encrypt data onto a company server and allow with authorized access the files to decrypt them. 7Language that used to develop the encryption The application in programming language must be in order form to develop it. There are two popular and relevant high level programming languages that is Java and C#. The features in terms and portability were compares between Figueroa n.d. and Java and C#. By this comparison can be identify which has the better performance in processing images. The both languages are portable based on the study. The architectures and operating systems in different to run a program in flexibility is refers to portability. The term of the programming languages was only portable for C#. Java in the other hand is portable for in source code, hardware and OS. When manipulate the image is converted into matrix where elements of the matrix represent a pixel of the image. There are two types of size, they are vector size and matrix size. C# is faster when both sizes are greater than 4096. Java is faster when processing small sizes. 8Technique of encryption Younes Jantan, 2007 has proposed a simple and strong method for image security using a combination of blocks based image transformations and encryption techniques. The original message divided into blocks, which is rearranged into a transformed image using a transformation algorithms and then transformed image is encrypted using the Blowfish algorithm. Without the key, encryption and decryption process cannot take place. The following figure shows the model of the proposed technique: Original Image Key Transformation process Encryption process Ciphered Image à Figure 2.2 An Overview Diagram of the Proposed Technique Depending on the key supplied by the different cipher codes have the similar image. The confidentiality and security will provide when the image based data transferred with the help of suitable user-defined key. The resulting image will not be generated because of the result of hash embedded inside the image file. The below figure shows the architecture proposed: Image Encryption Model Image Cipher Code (An encrypted image) User Defined Key Decrypted (Original) Image Image Decryption Model User Defined Key Figure 2.3 The Architecture of the Image Encryption and Decryption Model Future Improvements The future of encryption is brighter than ever before. The protection of corporation information assets and third-party information is increasing spectacularly and it is demand for more control. Even five years ago, the amount of information being communicated and stored by electronic means is hugely great. The information security products are growing at a higher rate than any other aspect of IT technology must be more effective within the enterprise today. From the perimeters of communication, the Internet and the mobility of its users have removed it. For the modern day enterprise the last line of the defense is encryption. In future, the encryption systems will be more useful to the users. Moreover, this encryption is tough, complicated, jargon and it is not user friendly. Even, by the IT people also cannot know what is actually encryption. How about the the common people. Many of them said that encryption is so great, why Microsoft did not use this. Because it is very expansive, too advance for the unknowledgeable persons and is not simple to use it. In future, the encryption will improve the PIN security. The unique encryption key can be used only by the EFT networks members only. But this costs high implementations, since some of the ATM owners ignored it. The remote key distribution may improve the compliance rates. There are 6 critical market drivers that will be the shape the future encryptionà [9]à : Email privacy and regulatory requirements The global enterprises provided easy way exchange information can conduct the business electronically by the Internet and adoption of Internet protocols. Increasing compromises and unauthorized access to critical business information To improve the quality and level of protection enterprise employ to guard their information assets and the assets of their customers and business partners. The expanding enterprise The increasing number of regulations are aimed in a part at ensuring enterprises maintain and fulfill their fiduciary responsibilities. User mobility Ensure that the information during travel safe and the electronic communication also remain safe as it is transmitted across the Internet. Communications appliances Credit card may need protected for much longer periods of time. The Art of Storing and Retrieving Corporate Information Assets There are emerging the solutions for how to communicate among the various enterprise members in a secure manner. Conclusions The future of the encryption will be using by electronically for the purpose of enterprise conduct business. In future the encryption and the innovation of the applications providers. At Backblaze is protecting the privacy of the users data is a top priority that means encryption system. This is easy to use as a key part of the vision and makes the product hard to use for the encryption. For the military grade encryption made easy by mix of the public/private and symmetric key algorithms. The encryption is refers to the translation of a data into a secret code by using the algorithms. In the science of cryptography the process that involved is encryption. The messages must be securely sent. These messages could be numeric data, text or secret codes. For example, Missile Launch Codes. This encryption systems providing privacy for the authorized peoples communications.
Subscribe to:
Comments (Atom)