Wednesday, November 27, 2019

20 Deductive Essay Topics Hooking Ideas about Emma Larkin’s Finding George Orwell in Burma

20 Deductive Essay Topics Hooking Ideas about Emma Larkin’s Finding George Orwell in Burma If you are looking for viable deductive essay topics about the book â€Å"Finding George Orwell in Burma† then consider the twenty items below: The Many Tools Used by the Burmese Government to Control Their People The Most Important Tool Being That of Fear How the Military Intelligence Functions as One of the Tools Used by the Government How Local People Worked as Informers for Military Intelligence Spies How Burmese Government Controlled History by Changing Names and Buildings How Fear of Imprisonment or Torture Kept People from Considering Uprisings How British Names Were Removed And Physical Location Names Changed after 1988 Uprising How People Who Were Murdered by the Government Were Immediately Disposed of and The Blood on The Streets Was Washed Away How the Government Could Alleviate Risk of Any Future Generations Being Motivated by the Uprisings or Actions of Others How the Government Had Sensors in Magazines, Books, Music, and Movies through the Propaganda Branch How the Propaganda Branch Produced Pre-Approved Content for Magazines and Newspapers as Well as Educational Products for Schools How Free Thought Was Stifled through Limiting What People Could Read or Think How Foreign Journalists and Writers Were Not Allowed into the Country and People with Cameras or Notepads Would Be Searched by the Police How the Government Can Delete Anything Found on Cameras Brought into the Country And Sentence Anyone Who Helps Journalists to Death How the Emergency Provisions Act of 1950 Allowed Government to Sentence Citizens to Seven Years in Prison for Providing Information to Journalists Panopticon: a Term from George Orwells Writing Which Is at the Center of This Form of Surveillance How Words from George Orwell Like â€Å"Room 101† And â€Å"Newspeak† Are Represented in This Book How Methods of Surveillance in This Book Are Used Today in a Country Of Your Choosing How George Orwell’s Predictions Have Come to Pass by Way of Fear and Control over Communication How the Country Has Changed With Recent Elections Below you will find an example essay on one of these topics to give you a better idea: Sample Deductive Essay on the Methods of Surveillance In many ways modern governments functions similarly to this. Throughout Middle Eastern countries and even Western countries, the media is controlled by a select few. While the Internet allegedly provides free reign for mass communication and freedom of speech, individuals who speak out against other nations are still deemed a terrorist threat and can have some of their freedoms revoked. Governments will continually survey those they believe to be a threat. This is not something which happens just on the Internet but something which still happens in real time today. Foreigners who may be on a watch list could be permitted in another country but will be monitored the entire time they are there. The NSA was just recently revealed to use surveillance techniques which are illegal on all citizens, national or international. The exploits of the agency revealed that cellphone conversations as well as email correspondence, and Internet activity were surveyed and collected. This is a form of c omplete and comprehensive surveillance of the world. Of course this happens on local levels too, inside companies of all shapes and sizes. Employees of any organization are subject to continual monitoring of their email activity and phone records. In many cases email activity is logged as well as Internet searches and certain websites not permitted during work hours. While in these cases the changes are made to promote productivity and avoid wasting time in the workplace, the methods used are similar to countries which seek total control over the constituents. This is something which even permeates news. News agencies today in many Western countries are only able to remain profitable thanks to advertisements. Advertisements for particular products and/or services directly influence what information is recorded and what information is not. Individuals who might find a viable new story may not be allowed to promote that new story because it reflects poorly on a shareholder or on a subsidiary company of that shareholder. The same thing is true for politicians. Many politicians today are only able to maintain their seat in politics thanks to the donations of powerful and wealthy individuals who then dictate which laws can be passed and which laws cannot. Throughout the world, the media is controlled by a select few, access to internet sites is restricted in countries such as China. In China, even looking at activist sites or working to help Tibet is a punishable offense. Having the wrong books, teaching or talking about threats to the government, and helping a foreigner are all punishable in North Korea. All around the world Governments will continually survey those they believe to be a threat. The national surveillance agency was recently revealed to a completed surveillance on not only international citizens but American citizens. This revelation exposed that all cellphone conversations had been monitored as well as email correspondence and other types of Internet activity. Such complete and total monitoring would constitute that same idea of comprehensive surveillance. This is something which is even done at a much smaller level. Employees of any organization are subject to continual monitoring of their email activity and phone re cords. All of this information from these assigned readings really reflects on how well the Asian communities were controlled during terrible regimes. What is perhaps most disturbing is how long such things have been going on and what little has been done. Some of the most prominent displays of human rights violations have been going on with very little done about it for multiple reasons. The first seems to be reflected the control itself. With complete control over media both in the country and internationally, countries are able to maintain either a specific view of the functions of the country, or no view at all. When there is no view or no changes to the existing view, it makes it easy for citizens to ignore that country and even forget about the plight facing its citizens. By controlling what information reaches the citizens, the government can even make sure the people do not realize what they are missing, and fail to realize how things might be better for them. What these readings re ally bring forth for me though, is how prevalent some of those things are in modern society, and we don’t realize it. Today people use the internet, talk on cell phones, and accept that their actions are all monitored without even thinking twice. People don’t realize just how many of their freedoms they are giving up. References: Cady, John F.  A history of modern Burma. 1960. Davison, Peter, Hoepffner Prà ©face de Marie Hermann, and Jean-Jacques Rosat.  George Orwell. Palgrave Macmillan, 1996. Harvey, Godfrey Eric.  History of Burma. Asian Educational Services, 2000. Kyi, Aung San Suu. II. Freedom, Development, and Human Worth.  Journal of Democracy  6.2 (1995): 11-19. Larkin, Emma.  Finding George Orwell in Burma. Granta Books, 2011. Orwell, George.  Burmese days. Vol. 2. Random House, 1999. Smith, Martin John.  Burma: Insurgency and the politics of ethnicity. Zed Books, 1991.

Sunday, November 24, 2019

Explanation of Homomorphic Encryption

Explanation of Homomorphic Encryption Abstract Homomorphic encryption has been created to improve services in cloud computing. The encryption will enable organizations to use cloud computing in analyzing and mining data. Public cloud providers need the intervention of homomorphic encryption to promote security on the access of information.Advertising We will write a custom research paper sample on Explanation of Homomorphic Encryption specifically for you for only $16.05 $11/page Learn More Researchers have suggested that this system has the ability of analyzing information without decrypting (Geiselmann Steinwandt, 2002). It shows that homomorphic encryption develops a key that performs mathematical operations on encrypted data and enables the same results on unencrypted information (Kalai, 2003). Therefore, the connection between functions on unencrypted data and operations to be done on encrypted information in defined as homomorphism. Studies have showed that this invention would be used to provide security on the Internet because many people access this media to seek information. The growth of technology has made people consult the Internet using cloud providers such as Google and Yahoo. Communication Homomorphic encryption assists companies to encrypt their database of emails and post them to the cloud. The cloud assists the company to use the stored information to confirm how its workers are collaborating. Initially, when a firm is installing the new system, it may be able to run a few basic programs. However, as it continues with the system, it can apply it to all other operations. This indicates that after the data has been stored in the database, it can be downloaded without exposing any information (Lipmaa, 2005). The access of information on the Internet may be dangerous because other competitors may be able to access policies that the firm plans to initiate to dominate the market. Companies have classified information which should not be accessed by everyone. Therefore, when competitors are able to get such information, they can use it against the company. The company should device a safety device which will protect data from other cloud users. Some systems break down, and, as a result, people are able to get information stored. In this case, homomorphic encryption protects such information from being reached as the system is being reset. Firms face competition from other companies, which offer similar goods or services (Limpaa, 2005). These competitors will work to outshine other so as win customers and dominate the market. The company may use the information acquired to develop strategies so as to fulfill its interest.Advertising Looking for research paper on programming? Let's see if we can help you! Get your first paper with 15% OFF Learn More The above information shows that homomorphic encryption promotes business by safeguarding the firm’s data. Homomorphic encryption enables programs to be effectiv ely evaluated so as produce encryption on the output. The system has an enormous impact on outsourcing of private programs such as cloud computing. During the invention period, the system was challenging because people did not believe in full homomorphic encryption. It was supporting evaluation of an unlimited number of additions but could offer functions to one multiplication. The homomorphic encryption scheme is given as c =pq + m where c symbolizes the cipher text, m the marked text message, p is the key and q the random number (Mulmuley Sohoni, 2002). Addition, subtraction, and multiplication described the function of homomorphic encryptions. This system is efficient in arithmetic because it involves small numbers, which could be solved in parallel. Arithmetic performance is improved with the application of Residue Number System, RNS. Security Homomorphic computations are designed to function on data without exposing or accessing actual modulus so as to ensure security of data in programs. It promotes the confidentiality of data by adding confusion to the modulus. This indicates that, in cloud computing, homomorphic encryption transforms the modulus randomly through multiplication. Gentry (2010) indicates that a fully homomorphic encryption scheme was announced in 2009. This scheme supported evaluation of low polynomials on encrypted data (Endsuleit, Geiselmann, Steinwandt, 2002). According to Craig, the security of this scheme overlooked two problems, which were low weight sum problems and worst case on ideal lattices. The cipher texts in Gentry’s scheme did not depend on the length of the operations that evaluated encrypted data. Instead, it relied on the number of operations the computation time performed. Homomorphic computation promotes confidentiality by distributing the program to various clouds, and it verifies that the outcome of the cloud is exactly valid (Canetti, Krawczyk, Nielsen, 2003).Advertising We will write a custom rese arch paper sample on Explanation of Homomorphic Encryption specifically for you for only $16.05 $11/page Learn More This shows that homomorphic encryption prevents clouds from tampering with the module. It follows by developing a strategy to each cloud, which can reduce the impact of security because of collusion. This shows that researchers at every level were working on how to protect data from being accessed by unnecessary people. Cloud computing involves a network of machines to a single program for efficient monitoring and significant service delivery. However, these machines are independent in their operation. Therefore, homomorphism promotes confidentiality of information. It protects them from being reached by other machines on the Internet, and protects the security of data. Last but least, homomorphic encryption can make the computation on multiple systems so as to compare results. The client can use several ways to make sure that the cloud does not acces s the module set because it can affect the confidentiality of the program. References Canetti, R., Krawczyk, H. Nielsen, J. B. (2003). Relaxing chosen-cipher text security. In Proc. of Crypto 03, pages 565-582. Endsuleit, R.W. Geiselmann, Steinwandt, R. (2002).Attacking a polynomial-based cryptosystem: Polly Cracker. Int. Jour. Information Security, (1):143-148. Geiselmann, W. Steinwandt, R. (2002).Cryptanalysis of Polly Cracker. IEEE Trans. In- formation Theory, (48):2990-2991. Gentry, C. (2010). Computing arbitrary functions of encrypted data. Commun. ACM, 53(3):97–105, 2010Advertising Looking for research paper on programming? Let's see if we can help you! Get your first paper with 15% OFF Learn More Kalai. A. (2003) Generating Random Factored Numbers, Easily. J. Cryptology, vol. 16, no. 4, pages 287-289. Lipmaa. L (2005). An Oblivious Transfer Protocol with Log-Squared Communication. Proc. of ICS 05 pages 314-328, Mulmuley, K. Sohoni, M. (2002). Geometric complexity theory I: An approach to the P vs. NP and related problems. SIAM J. Comput., 31(2):496-526. Van Dam, W., Hallgren, S. Ip, L. (2006). Quantum algorithms for some hidden shift problems. In Proc. of SODA 03, pages 489{498. SIAM J. Comput. 36(3): 763-778.

Thursday, November 21, 2019

Freud psychosexual stages of development Research Proposal

Freud psychosexual stages of development - Research Proposal Example The mouth, anus and genital regions are the three major zones that Freud identified. The theory looks at the effects of sexual pleasure drive on a person’s psyche. A person cannot proceed to the next stage if the current stage’s developmental conflicts have not been resolved. This paper seeks to analyze the progression of a child through the five stages that result into a healthy or unhealthy person. The oral stage is the first Freud stage begins when the child is born up to when it is about one and a half years. The oral cavity or rather the mouth is the main focus of libido energy. The child accepts anything that comes close to its mouth and has great pleasure in sucking (Phillip, 2002: p224). The child also expects to be held, cared for and mothered. If a child doesn’t receive these services from the mother or the services were denied before the stage was over, the child is likely to get frustrated and will grow up to be pessimist, envious, sarcastic and suspicious. If the child on the other hand got an excess of these needs, it will grow to be optimistic, gullible and will always admire the individual in him. Weaning brings the stage to an end (Theo, 2000: p1). This is the second stage that takes place between one and a half years to three years. The erogenous zone at this stage is the anus and the child’s focus is on the retention and elimination of faeces. The parent’s child takes quite sometime in training the child on toilet issues trying to ensure that the child learns to control its anal stimulations. A child that doesn’t receive enough training in the field is more likely to be obsessed on perfection, cleanliness, meticulous, etc. On the other hand, a child who receives excess training is more likely to be messy, careless, reckless, disorganized, defiant, etc (Phillip, 2002: p224). The third stage occurs between the third and the sixth year. The erogenous zone at