Saturday, October 5, 2019

Love.Rapid weight gain during infancy and obesity in young adulthood Research Paper

Love.Rapid weight gain during infancy and obesity in young adulthood in a cohort of african American - Research Paper Example It involved selecting a cohort of 300 African Americans born at full term and their progress followed from birth to 20 years of age. The study was slow since it took the researchers two decades to get the appropriate outcome and results. The subjects used in the study were living and made for a more informative interview. The outcome of the research was general and gave satisfying results. The statistical analyses used in the study included; finding the weight of the subjects as recommended by Center for Disease Control and Prevention (CDCP) using the LMS method and a representative sample of the US population (Stettler et al, 2003). In analyzing, a pattern of quick rate of weight gain in the first 4 months of life, was defined as an increase in weight-for-age z score>b SD between birth and 4 months. The major result in table 1 show that the population attributes risk of young adulthood obesity was 30% for a pattern of rapid weight gain during infancy. 1 Â ½ of the obese young adults in the early infancy gained a quick weight (Stettler et al, 2003). 15% of African americans with and 6% without a quick mass increase throughout untimely infancy became ‘overweight –overfat’ in childish adulthood. In table 2, a quick weight gain in the early infancy and adult obesity was found out by sexual category, delivery weight, gestational time, firstborn condition, maternal BMI, motherly smoking condition or education (Stettler et al, 2003). OR information represents ‘odds ratios’ while CI represents ‘Confidence Intervals’. OR of 5.22 signifies harm in relation to the risk of quick weight gain as infant compared to weight as an immature adult, since gaining weight will affect the internal organs by fats blocking the body tissues. The biological facts of clinical knowledge are significant in comprehending and analyzing the results. The clinical implications of the study included using alternate definitions based on BMI or BMI combining it with

Friday, October 4, 2019

Greek Parthenon Architect Essay Example | Topics and Well Written Essays - 1500 words

Greek Parthenon Architect - Essay Example How the work is significant for the period in which it was created. It should be remembered that Greek religious society has anciently been controlled by gods. This magnificent construction was dedication to the Greek goddess Athena, and was completed in 438 BC. In those days, there was ancient believe that gods were to be offered sacred place. Again, it is prudent to consider that the development of the artifact was significant in emancipation of the Doric order. In this case, the Doric order is the magnificent facet of the building which in this case had flat pavements and with a base and vertical shafts. The nature of this building was used either for political or religious reasons (Mikalson, 44). In itself it was a symbol and facet of power. How the work perhaps challenges the conventions associated with the period. It is scholarly good to note that the Parthenon was a politically backed religious presentation. In this case, the Greek society held a powerful convention which had close similarities to this period. In light with this, attention is garnered towards realization of the Greek political nature alongside other effects. One of the prominent conventions of the time is Chronology. This classical Antiquity (c. 1200 – c. 800 BC), was geometric styles and proto-geometric designs applied in Architecture. This convention was substantial in the beginning of the Orientalizing influence which was initial stage of the end of dark ages. Based on this presumption, it is good to relate the Parthenon as an elucidator to the much common culture of modern artistic period. What are the main concerns of the artist/creator or architect? As analyzed in the above description, it is coherent to note that the architecture was more interested with elegance. The desire to retain the Doric order was substantive in improving the quality of the design. Firstly, it is imperative to consider that architecture was interested in attempting to establish the rules of harmony. The engineering concept focused in methods to change stones into cube in order to provide full support architrave load at the last column. This method was called the broader corner triglyph. However, it is prudent to understand this method was not satisfying in any event, engineers required to strengthen the corners more as this would withstand pressure. Therefore, in design, the architect was obliged to relate the two further corners together to form cohesion. What are some of the challenges the artist/creator or architect faced? It should be understood that engineering works attracted a significant challenge in relation to the aspect of suspension and comprehension. Firstly, in consideration that the building was done purely by stone block is a significance fact that attracted attention on the security of the building. Primarily, strengthening of the corners was a close consideration based on the fact that corners were to be classically oriented to provide solution about the chall enges of weather and time. To solve this architectural hiccup, the corners were terminated using Triglyph (Curlee, 21). Another significant challenge considered by architecture was the elevation. This was the subdivision of columns, entablature and crepidorma structures. Harmonizing these three considerations without technical aspects; for instance, cement always proved a technical hurdle for designers. In particular, the

Thursday, October 3, 2019

Electronic Medical Records Essay Example for Free

Electronic Medical Records Essay Electronic Medical Records (EMR) are becoming more widely used across the healthcare spectrum. One of the reasons for their popularity is the potential that is presented for increasing the quality of care delivered to patients by decreasing handwriting interpretation errors, reducing medication administration errors and eliminating lost charts. Time management is a crucial skill to have as a nurse. It allows for a smooth workflow which translates into quality patient care. Much time can be wasted not only by the nurse signing off illegible handwritten orders, but also by the other nurses that have to help interpret the handwriting. The EMR requires the physician to enter orders electronically, thereby eliminating handwritten orders. Electronic orders are more precise and more accurately followed (Sokol, 2006). Fewer errors make it to the patient, reducing unnecessary tests and increasing the quality of care that patients are receiving. Electronic medication administration records (MAR) are useful in displaying medications due at specific times. Not only is it possible to sort the medications due at one time, the MAR will also alert the nurse to potential drug interactions. Late medications will be displayed in red to be easily seen. If bar coding is implemented, medication errors can be reduced by a range of 60%-97% (Hunter, 2011). A lost chart can be very frustrating while trying to deliver seamless care to a patient. Paper charts are easily misplaced. Since there is only one, if a single provider is using it, no one else of the medical team can view the chart. The EMR can be viewed from any computer with secure internet access or on a handheld device. When the internet is down, a downtime view only access is available. Nursing Involvement Nurses are known as patient advocates. In advocating for their patients, nurses strive for what is best in their patient’s care. Since nurses will be using the EMR most frequently, it is imperative that they are part of the selection and implementation on an EMR. A nurse, on the EMR team, will represent all nursing. Nurses will be accessing the EMR through their shift several times and will become familiar with the layout and workflow and will be able to provide insight into what would work best to ensure quality of care. There is a saying that you don’t know what you don’t know. A nurse knows what she will need and is the best to supply this information. While researching which EMR would be the best for a facility, a nurse can provide information on time saving workflows between systems. Nurses must also be trained as super users to provide a seamless change from paper charting to electronic charting and provide support to fellow nursing staff. A nurse on the EMR team will be able to deliver new information in a way that other nurses are more receptive to. Handheld Devices If nurses were to use handheld devices in delivery of patient care, there would be a noticeable savings of time as well as more accurate charting. Nursing personnel carrying a handheld device would have immediate access to their patients chart to notice new orders, lab results, or medication admission records. The need to review the paper chart repeatedly throughout the day would be eliminated along with the long search that commences every time you have to look for the paper chart. This could add several minutes to a nurse’s time at the bedside, improving patient satisfaction. When vital signs are taken, written on a slip of paper and then transcribed into the paper chart, there are many opportunities for error and delay. Numbers can be transposed, written incorrectly or the wrong patient’s information could go into a chart. With the immediate availability of a handheld device, the information from the vital signs monitor would have the ability to interface into the patient’s chart virtually eliminating late charting and errors. Security Standards The Health Insurance Portability and Accountability Act (HIPAA) was initiated in 1996 as a standard for protecting individually identifiable health information (U. S. Department of Health and Human Services). HIPAA requires that all information, either written or electronically, that falls under the criteria is protected from unauthorized viewers. An EMR carries more stringent HIPAA guidelines than a paper chart due to the risks associated with computer based files and there are a few key steps that must be taken to ensure compliance with this act. Access control: each user will have a unique user name and password that must not be shared. Firewall protection must be used on the internet server the hospital utilizes to prevent hackers from obtaining access to protected information. If users are authorized to access patient information from home, there must be a secure server used (Arevalo, 2007). Storage: Data must be encrypted to enhance the security while information is being stored and while it is transferred. Encryption entails protection of files and data that is only viewable to authorized users. Compliance of these regulations should be audited on a regular basis with any violation being swiftly remedied (Medical Records, 2013). Healthcare Costs Purchasing an EMR can cost hundreds of thousands of dollars. In order to justify such a large purchase, one must examine the potential ways that money can be saved while using an EMR. After spending hours training users and with a little practice, nurse’s workflows will improve and less time will be wasted. A chart will not have to be searched for, double or triple charting is eliminated by using handheld devices for immediate charting. The quality assurance team will be able to run reports on compliance of core measures and be able to recommend changes to nursing personnel to implement. Fewer medication errors will be made by using the electronic MAR. Most importantly, these time and money saving factors will enhance patient safety. With fewer paper charts to store, valuable space can be remodeled into patient care areas that offer services not previously offered due to space issues (Power, 2013). This will increase revenue for the facility. Comparison Epic offers a computerized management system that is utilized by everyone in the healthcare setting including, nurses, nurse aids, physicians, dietary, radiology, emergency department and the business office. Each department will have a unique look and functionality to their program. There is no need to use multiple systems to gather information on a patient. It can be used in medium size ambulatory settings such as a clinic as well as in a hospital setting for either inpatients or outpatients. With all departments having access to the same information on a patient, errors will be reduced in delivery of patient care. The chance for entering erroneous lab results or miss- documentation will also be reduced with department specific workflows. Not only will this result in better patient care, but also in a nurse’s ability to delivery effective, efficient, quality care without delay. In addition, all physician order entry is electronic, every time. Order sets can be customized for each prescriber, saving time and hassle while maintaining meaningful use and following core measures. For added security, the system can be set to automatically sign a user out after a specified length of time of non-use. And while all of the patient’s information is available to each user, audit trails are left enhancing patient security. Epic has pre-loaded patient teaching materials available as well as the option to custom make information. After visit summaries are easily printed upon discharge and an electronic copy is permanently attached to the chart. Patient would benefit from a facility the uses the Epic system by having access to MyChart. MyChart is a portal of access between a patient and their provider for communication as well as a portable computerized health record. IF a patient were to access care from a facility that does not utilize the Epic system, that patient would have access to MyChart and would then be able to provide critical information that would enhance their care. Another computerized management system available is one from Cerner. This system can be used in all settings in a hospital including nursing. For medication administration, Cerner has available barcode identification of medication to help nursing staff complete their five rights verification prior to administration. It also allows charting at the bedside to enhance accuracy either through a handheld device or a stationary computer. All order entry by physicians is done on the computer allowing the providers to follow built in prompts for allergy information and adverse drug interactions as well as prompts that will aid in the order of care protocols to enhance patient care. Cerner also has a portal designed for patient to have access to their records no matter where they are as well as tracking information for health goals a patient and their provider have established. The portal allows progress tracking and provides information on steps that can be used to help the patient reach their goals. This gives patients more responsibility for their health while providing the incentive needed. Nursing care will be escalated similarly to the way it would be in Epic. Patient information is easily accessible through intuitive workflows allowing nursing staff to make responsible decisions regarding patient care. My recommendation for a computerized management system would be the one available from Cerner. It is the most user friendly for staff including nursing and offers intensive training and yearly upgrades. The different departments systems appear to work together seamlessly resulting in increased savings of time and money (Cerner, 2013).

Cryptographic Techniques For Network Security Cryptography Computer Science Essay

Cryptographic Techniques For Network Security Cryptography Computer Science Essay The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Message exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Cryptography provides solutions to all these problems. Cryptography, a word with Greek origins means secret writing. We use the term to refer to the science and art of transforming messages to make them secure and immune to attacks. Cryptography is the practice and study of hiding information. In modern times, cryptography is considered to be a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering. Cryptography is used in applications present in technologically advanced societies; examples include the security of ATM cards, computer passwords, electronic commerce, which all depend on cryptography. SECURITY GOALS Availability Integrity Confidentiality Security goals CONFIDENTIALITY Confidentiality is probably the most common aspect of information security. We need to protect our confidential information. An organization need to guard those malicious actions that endanger the confidentiality of its information. In the military, concealment of sensitive information is the major concern. In industry, hiding some information from competitors is crucial to the operation of the organization. In banking, customers account need to be kept secret. Confidentiality not only applies to the storage of the information, it also applies to the transmission of information. When we send a piece of information to be stored in a remote computer or when we retrieve a piece of information from a computer, we need to conceal it during transmission. INTEGRITY Information needs to be changed constantly. In a blank, when a customer deposits or with draws money, the balance of her account needs to be changed. Integrity means that changes need to be done only by authorized entities and through authorised mechanisms. Integrity violation is not necessary the result of a malicious act; an interruption in the system, such as a power surge, may also create unwanted changes in some information. AVAILABILITY The third component of information security is availability. The information created and stored by an organization needs to be available to authorized entities. Information is useless if it is not available. Information needs to be constantly changed. Which means it must be accessible to authorised entities. The unavailability of information is just as harmful for an organization as the lack of confidentiality or integrity. Imagine what would happen to a bank if the customers could not access their accounts for transactions. SECURITY SERVICES It is easy to relate one or more of these services to one or more of the security goals. It is easy to see that these services have been designed to prevent the security attacks that we have mentioned. Data confidentiality It is designed to protect data from disclosure attack. The service as defined by X.800 is very broad and encompasses confidentiality of the whole message or part of a message and also protection against traffic analysis. That is, it is designed to prevent snooping and traffic analysis attack. Data integrity It is designed to protect data from the modification, insertion, deletion, and replaying by an adversary. It may protect the whole message or part of the message. Authentication This service provides the authentication of the party at the other end of the line. In connection oriented communication, it provides authentication of the sender or receiver during the connection establishment. In connectionless communication, it authenticates the source of the data. Non repudiation Non repudiation services protects against repudiation by either the sender or the receiver of the data. In non repudiation with proof of the origin, the receiver of the data can later prove the identity of the sender if denied. In non repudiation with proof of delivery, the sender of data can later prove that data were delivered to the intended to the intended recipient. Access control It provides protection against unauthorised access to data. The term access in this definition is very broad and can involve reading, writing, modifying, executing programs, and so on. CRYPTOGRAPHIC TECHNIQUES SYMMETRIC KEY ENCRYPTION It is also called as secret key cryptography is a cryptographic technique where the two parties share a secret key. Data are encrypted and decrypted using the same key. The sender encrypts data using the key. Once transmitted, the receiver should use the same key to interpret the message. C:UsersmadhuDesktopsyymm.PNG Figure 1. Symmetric encryption algorithm Symmetric encryption is computationally fast, meaning that it can occur in real time on content that is unknown previously. All securely transmitted live traffic today is encrypted using symmetric encryption algorithms for example such as live telephone conversation, streaming video transmission, high speed data link. Asymmetric Key Encryption In asymmetric key encryption, different keys are used for encrypting and decrypting a message. The asymmetric key algorithms that are most useful are those in which neither key can be made public while the other is kept secure. There are some distinct advantages to this public-key-private-key arrangement, often referred to as public key cryptography; the necessity of distributing secret keys to a large numbers of users is eliminated. And the algorithm can be used for authentications as well as for cryptography. Asymmetric cipher algorithms are based on heavy mathematical operations, thus they are not efficient at processing large blocks of data. They are often used to safely exchange small session keys. C:UsersmadhuDesktopasymm.PNG Figure 2: Asymmetric Encryption Algorithm Cryptanalysis As cryptography is the science and art of creating secret codes, cryptanalysis is the science and art of breaking those codes. In addition to studying cryptography techniques, we also need to study cryptanalysis techniques. This is needed, not to break other peoples codes, but to learn how vulnerable our cryptosystem is. The study of cryptanalysis helps us create better secret codes. There are four common types of cryptanalysis attacks Cryptanalysis attack Chosen ciphertext Chosen plaintext Known plaintext Ciphertext only Figure 4: cryptanalysis attacks Ciphertext Only Attack In ciphertext only attack, Eve has access to only some cipher text. She tries to find out the corresponding key and the plain text. The assumption is that Eve knows the algorithm and can intercept the cipher text. The cipher text only attack is the most probable one because Eve needs only the cipher text for this attack. To thwart the decryption of a message by an adversary, a cipher must be very resisting to this type of attack. Various methods can be used in ciphertext only attack. Brute force attack In the brute force method or exhaustive key search method, Eve tries to use all possible keys. We assume that Eve knows the algorithm and knows the key domain. Using the intercepted cipher, Eve decrypts the cipher text with every possible key until the plain text makes sense. Using brute force attack was a difficult task in the past; it is easier today using a computer. To prevent this type of attack, the number of possible keys must be very large. Statistical attack The cryptanalyst can benefit from some inherent characteristics of the plain text language to launch a statistical attack. For example we know that the letter E is the most frequently used letter in English text. The cryptanalyst finds the mostly used character in the cipher text and assumes that the corresponding plain text character is E. After finding a few pairs, the analyst can find the key and use it to decrypt the message. To prevent this type of attack, the cipher should hide the characteristics of the language. Pattern attack Some ciphers may hide the characteristics of the language, but may create some patterns in the ciphertext. A cryptanalyst may use a pattern attack to break the cipher. Therefore, it is important to use the ciphers that make the ciphertext look as random as possible. Known Plaintext Attack In a known plaintext attack, Eve has access to some plain or ciphertext pairs in addition to the intercepted ciphertext that Eve wants to break. The plain or ciphertext pairs have been collected earlier. Alice has sent a secret message to bob, but Alice later made the contents of the message public. Eve has kept both the cipher and the plaintext to use them to break the next secret message from Alice to Bob, assuming that Alice has not changed her key. Eve uses the relationship between the previous pair to analyze the current ciphertext. The same methods used in the ciphertext-only attack can be applied here. This attack is easier to implement because Eve has more information to us for analysis. However, it is less likely to happen because Alice may have changed her key or may have not disclosed the contents of any previous messages. Chosen Plaintext Attack The chosen plaintext attack is similar to the known plaintext attack, but the plaintext or ciphertext pairs have been chosen by the attacker. This can happen, for example, if Eve has access to Alice computer. She can choose some plaintext and intercept the created ciphertext. Of course, she does not have the key because the key is normally embedded in the software used by the sender. This type of attack is much easier to implement, but it is much less likely to happen. Chosen Ciphertext Attack The chosen ciphertext attack is similar to the chosen plaintext attack, except that the Eve chooses some ciphertext and decrypts it to form a ciphertext or plaintext pair. This can happen if Eve has access to Bobs computer. TRADITIONAL CIPHERS We can divide traditional symmetric key ciphers into two broad categories substitution ciphers and transposition ciphers. In a substitution cipher, we replace one symbol in the cipher text with another symbol; in a transposition cipher, we reorder the position of symbols in the plaintext. Substitution ciphers A substitution cipher replaces one symbol with another. If the symbols in the plaintext are alphabetic characters, we replace one character with another. For example, we can replace letter A with letter D, and letter T with letter Z. If the symbols are digits (0 to 9), we can replace 3 with 7, and 2 with 6. Substitution ciphers can be categorized as either monoalphabetic ciphers or polyalphabetic ciphers. Monoalphabetic ciphers We first discuss a group of substitution ciphers called the monoalphabetic ciphers. In monoalphabetic substitution, a character in the plaintext is always changed to the same character in the ciphertext regardless of its position in the text. For example, if the algorithm says that letter A in the plaintext is changed to letter D. In other words, the relationship between letters in the plaintext and the ciphertext is one to one. Example: we use lowercase character to show the plaintext; we use the uppercase characters to show the ciphertext. The cipher is probably the monoalphabetic because both 1s are encrypted as 0s. Plaintext: hello ciphertext: khoor Caesar cipher Caesar cipher is a special case of substitution techniques wherein each alphabet in a message is replaced by an alphabet three places down the line. Caesar cipher is susceptible to a statistical ciphertext only attack. Julius Caesar used this additive cipher to communicate with his officers. For this reason additive ciphers are referred as Caesar cipher. Caesar cipher used a key of 3 for his communications. P a b c d e f g h i j k l m n o p q r s t u C A B C D E F G H I J K L M N O P Q R S T U V 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 v w x y z V W X Y Z 21 22 23 24 25 For example: let the message hello is encrypted with the key of 15. Then all the characters in the ciphertext will be shifted from 15. Then the answer is hello= WTAAD Mathematically C (ciphertext) = (P+K) mod 26 (K= key) P (plaintext) = (C-K) mod 26 To encrypt message hello Plaintext h= 7 encryption (7+15)mod 26 C= 22=> W Plaintext e= 4 encryption (4+15)mod 26 C= 19=> T To decrypt WTAAD Ciphertext W=22 decryption (22-15)mod 26 P= 7=>h Ciphertext T=19 decryption (19-15)mod 26 p= 4=>e Cryptanalysis Caesar ciphers are vulnerable to ciphertext only attacks using exhaustive key searches (brute force attack). The key domain of the Caesar cipher is very small; there are only 26 keys. However, one of the keys, zero, is useless (the ciphertext is same as the plaintext). This leaves only 25 possible keys. Eve can easily launch a brute force attack on the ciphertext. Caesar cipher using cryptool Working the same example using cryptool, first of all, to acquaint ourselves with the Caesar encryption algorithm we will open a document, encrypt it and then decrypt it again. We will then try to get the computer to work out the key with which a plaintext is encrypted. This plaintext document is encrypted using the Caesar encryption algorithm by selecting the menu crypt/decrypt. C:UsersmadhuDesktopcaseaer 5.PNG Then the following dialog box appears. The key we enter is the number 15. Additionally, we change the options how to interpret the alphabet characters. The first alphabet character is set to 1 (if we set the character to 0 and use A as key, then the resulting ciphertext is the same as the plaintext). C:UsersmadhuDesktopcaesar 3.PNG Clicking on the Encrypt button opens a new window that contains the encrypted text. It becomes apparent that the letters have been shifted by 15 positions. So the word hello, is now wtaad C:UsersmadhuDesktopcaeser 6.PNG The plaintext version of this encrypted document can now be obtained by selecting crypt/decrypt again. In this dialog box which appears we now enter the key with which the document was encrypted (15). This time it has to be decrypted so decrypt button must be selected. Now the next step is to find the key using cryptanalysis. The plaintext window is made active by clicking on it. Now the entropy is selected via the menu selection Analysis/General/Entropy) C:UsersmadhuDesktopentropy.PNG Now the frequency distribution of the letters is calculated. The histogram of the encrypted document letter frequencies have been shifted by 15 positions. That means the encryption algorithm is not secure. Moreover Z shifts the text by 26 positions so that the encrypted text is actually identical with the unencrypted text. Hence there are really only 25 keys. The Caesar encryption algorithm can be broken easily by a ciphertext only attack. To perform such an attack, restore the window containing the encrypted text to the window and select Analysis/ciphertext only/ Caesar. The text will automatically be analyzed. By analyzing the superposition it is possible to discover the key which was used to encrypt this document. In this case it was the letter P. When the decrypt button is clicked the plaintext appears, i.e. the text that has been decrypted with the key p that was discovered. So the cryptool successfully found the key with which the document has been encrypted. C:UsersmadhuDesktopcaesar 8.PNG Analysis of Caesar Cipher Advantages Very easy to use The encryption and decryption can be done very quickly Disadvantages The encryption and decryption algorithms are known There are only 25 keys to try The language of the plaintext is known and easily recognizable. Applications It was used biblical times can be found on the back of Mezuzah where it encrypts the name of the god. During the First World War the Russian army used this method to relay messages to troops. It is used as an application in the Android version 1.4.0 Polyalphabetic Cipher In polyalphabetic substitution, each occurrence of a character may have a different substitute. The relationship between characters in the plaintext to a character in the ciphertext is one-to-many. For example, a could be enciphered as D in the beginning of the text, but as N at the middle. Polyalphabetic ciphers have the advantage of hiding the letter frequency of the underlying language. Eve cannot use single letter frequency statistic to break the ciphertext. To create a polyalphabetic cipher, we need to make each ciphertext character dependent on both the corresponding plaintext character and the position of the plaintext character in the message. This implies that our key should be stream of subkeys, in which each subkey depends somehow on the position of the plaintext character that uses that subkey for encipherment. In other words, we need to have a key stream k= (k1,k2,k3.) in which ki is used to encipher the ith character in the plaintext to create the ith character in the ciphertext. Playfair Cipher Playfair cipher is the example of polyalphabetic cipher. The secret key in this cipher is made of 25 alphabet letters arranged in a 55 matrix (letters I and J are considered the same when encrypting). Different arrangements of the letters in the matrix can create many different secret keys. One of the possible arrangements is shown below L G D B A Q M H E C U R N I/J F X V S O K Z Y W T P Before encryption, if the two letters in a pair are the same, a bogus letter is inserted to separate them. After inserting bogus letters, if the number of characters in the plaintext is odd, one extra bogus character is added at the end to make the number of characters even. The cipher uses three rules for encryption If the two letters in a pair are located in the same row of the secret key, the corresponding encrypted character for each letter is the next letter to the right in the same row (with wrapping to the beginning of the row if the plaintext letter is the last character in the row). If the two letters in a pair are located in the same row of the secret key, the corresponding encrypted character for each letter is the letter beneath it in the same column (with wrapping to the beginning of the column if the plaintext letter is the last character in the column). If the two letters in a pair are not in the same row or column of the secret, the corresponding encrypted for each letter is a letter that is in its own row but in the same column as the other letter. The playfair cipher meets the criteria for a polyalphabetic cipher. The key is a stream of subkeys in which the subkeys are created two at a time. In playfair cipher, the key stream and the cipher stream are the same. This means that the above mentioned rules can be thought of as the rules for creating the key stream. The encryption algorithm takes a pair of characters from plaintext and creates a pair of subkeys by following the above mentioned rules. We can say that the key stream depends on the position of the character in the plaintext. Position dependency has a different interpretation here the subkey for each plaintext character depends on the next previously neighbour. If P= P1, P2, P3 C= C1, C2, C3. K= [(k1, k2), (k3, k4) ] Encryption: Ci = ki Decryption: Pi = ki Example: keyword is PLAYFAIR P L A Y F I R E X M B C D G H J K N O S T U V W Z ENCRYPT: hide the gold underground plaintext HI DE TH EG OL DU ND ER GR OU ND ciphertext BM ND ZB XD KY CV VN XE CX KW VN DECRYPT: DMYRYKEVGHWGNGPXM ciphertext DM YR YK EV GH WG NG GP XM plaintext HE LX LO AN DG OX OD BY EX Message: Hello and Goodbye. Cryptanalysis of a Playfair Cipher Brute force attack on a playfair cipher is very difficult. The size of the key domain is 25! (Factorial 25). In addition, the encipherment hides the single letter frequency of the characters. However, the frequencies of diagrams are preserved. So a cryptanalyst can use a ciphertext-only attack based on the diagram frequency test to find a key. Analysis of playfair Advantages The main advantage of the system is it robs a cryptanalyst as they are no longer looking for recurring encoding as in an letter e can be encrypted as different letter each time. Playfair was long time considerably unbreakable. There are 26 letters so it is 26*26=676 diagrams which are quiet difficult to break. Disadvantages Still leaves much of the language structure Frequency distribution of letters Few 100s of ciphertext letters are enough for cryptanalysis. Applications Playfair cipher was used by British army during World War 1. When John F. Kennedys PT-109 was sunk by a Japanese controlled plum pudding island and was able to send an emergency message in playfair from an allied coast watchers hut to arrange the rescue of the survivors from his crew. Playfair crossword by Beetlejuice is an example puzzle using playfair as a gimmick. Vigenere Cipher Vigenere cipher made an immediate success as a field cipher. This type of polyalphabetic cipher was designed by Blaise de Vigenere, a sixteenth century French mathematician. A vigenere cipher uses a different strategy to create the key stream. The key stream is a repetition of an initial secret key stream of length m, where we have 1 P= p1p2p3.. C= c1c2c3 K= [(k1,k2,k3km),(k1,k2,k3km),] Encryption: Ci= Pi+Ki Decryption: Pi= Ci-Ki One important difference between the vigenere cipher and the other polyalphabetic ciphers is that the vigenere cipher key stream does not depend on the plaintext characters; it depends only on the position of the character in the plaintext. In other words the key stream can be created without knowing what the plaintext is. Example mathematically She is listening this message should be encrypted using the keyword PASCAL. plaintext s h e i s l i s t e n i n g P values 18 7 4 8 18 11 8 18 19 4 13 8 13 6 key 15 0 18 2 0 11 15 0 18 2 0 11 15 0 C values 7 7 22 10 18 22 23 18 11 6 13 19 2 6 Ciphertext H H W K S W X S L G N T C G Another way to look at viginere ciphers is through what is called a Vigenere Tableau. The first row shows the plaintext character to be encrypted. The first column contains the characters to be used by the key. The rest of the tableau shows the ciphertext characters. To find the ciphertext for the plaintext she is listening using the word pascal as the key, we can find s in the first row, p in the first column, the cross section is the ciphertext character H. We can find h in the first row and A in the second column, the cross section is the ciphertext character H. The same method should be followed until all the ciphertext characters are found. C:UsersmadhuDesktoptable.PNG Vigenere Tableau Cryptanalysis of Vigenere Cipher Vigenere ciphers do not preserve the frequency of characters. The cryptanalysis here consists of two parts for finding out the length of the key and finding the key itself. Several methods has been devised to find the length of the key but one method called kaisiski test, the cryptanalysis searches for repeated text segments, of atleast three characters, in the ciphertext. Suppose that two of the segments are found and the distance between them is d. The cryptanalyst assumes that d/m where m is the key length. If more repeated segments with distances d1,d2,d3.dn then gcd (d1,d2,d3,..dn)/m. This assumption is logical because if two characters are the same are k*m (k= 1,2,) characters part in the ciphertext. Cryptanalyst uses segment of at least three characters to avoid the cases where the character in the key are not distinct. After the length of the key is found, the cryptanalyst uses the idea of dividing the ciphertext into m different pieces and applies the method used to crypt analyze the additive cipher, including the frequency attack. Each ciphertext piece can be decrypted and put together to create the whole plaintext. Vigenere Cipher Using Cryptool To perform vigenere cipher encryption a new document is opened and then the encryption and decryption is performed. C:UsersmadhuDesktopvin1.PNG This plaintext document is encrypted using the vigenere encryption algorithm by selecting the keys crypt/decrypt/vigenere following which another dialog box appears. C:UsersmadhuDesktopvin3.PNG By clicking on the Encrypt button opens a new window that contains the encrypted text. C:UsersmadhuDesktopvin2.PNG The plaintext of this document can now be obtained by selecting crypt/decrypt/vigenere. In the dialog box which appears then where the key with which the document was encrypted. This time the document is to be decrypted. Therefore the decrypt button must be selected. C:UsersmadhuDesktopvin3.PNG By clicking on the decrypt button the plaintext document appears immediately. C:UsersmadhuDesktopvin4.PNG To find the key with which the document was encrypted. Restore the encrypted document window and then select analysis/ciphertext only/vigenere, following with which the text will automatically be analyzed. C:UsersmadhuDesktopvin5.PNG It is possible to work out the key length from the regular peaks in the autocorrelation. It is correctly calculated at 6 characters. C:UsersmadhuDesktopvin6.PNG When the continue button is clicked, another dialog box opens to display the key that has been computed. C:UsersmadhuDesktopvin7.PNG By clicking on the decrypt button the dialog box disappears and another window opens which contains the plaintext. C:UsersmadhuDesktopvin8.PNG Hill Cipher Hill cipher is invented by Lester S. Hill. This polyalphabetic cipher divides the plaintext into equal size blocks. The encrypted one at a time in such a way that each character in the block contributes to the encryption of other characters in the block. Hill cipher belongs to the category of ciphers called block ciphers. C1= (+ + ) mod 26 C2= (+ + ) mod 26 C3= (+ + ) mod 26 The encryption algorithm takes m successive plaintext letters and substitute for them m ciphertext letter. The substitution is determined by m linear equations in which each character is assigned a numerical value (a=0, b=1,c=2, ..z=25). This can be expressed in terms of column vectors and matrices = mod 26 C = KP mod 26 where C and P are column vectors representing the plaintext and ciphertext. K is the encrypting key. Example for Hill Cipher: Plaintext: pay more money Key (K) = C = KP mod 26 = mod 26 = = LNS For plaintext pay, ciphertext is LNS. The entire ciphertext is LNSHDLEWMTRW. For the decryption of the hill cipher is done using the inverse of the matrix K. Cryptanalysis of Hill Cipher Ciphertext-only attack on hill cipher is difficult. Even brute force attack on a hill cipher is extremely difficult because the key is an m*m matrix. Each entry in the matrix can have one of the 26 values. At first glance, this means that the size of the key domain is. Secondly the hill ciphers do not preserve the statistics of the plaintext. Frequency analysis cannot be run on single letters, diagrams and trigrams. A frequency analysis of words of size m might work, but this is very rare that a plaintext has many strings of size m that are the same.

Wednesday, October 2, 2019

Native Son, A Critical Review :: essays research papers

Bigger, Crime, and Society In the heated trial that determines whether Bigger Thomas will live or die, his supportive defense attorney exclaims, â€Å"You cannot kill this man, your Honor, for we have made it plain that we do not recognize that he lives!† Living in the Chicago slums as a poor, uneducated young black man whose only confidence can come from acts of violence, Bigger Thomas of Richard Wright’s novel Native Son is destined to meet a poor fate. Anger and hopelessness are a daily reality for him as he realizes that his life has no real meaning. When he accidentally murders a young, rich, white woman, however, his actions begin to have meaning as he accepts the crime as his own, even while he lies to the authorities. Bigger is, of course, taken down by a society who takes offense at the remarks of his supporters and seeks to justify itself. Bigger himself is doomed, but his emotions, his actions, and his motivations all help to give the reader a window into the mind of a criminal and a r epressed inner city African American. Fear, flight, fate. These are the three simple and meaningful words chosen by Wright to mark Bigger’s sad existence. Growing up angry at the white world, he is forced into working as a chauffeur for a rich white family, the Daltons, to support his struggling family. He is frightened and angered by the attempts of Mary Dalton and her Communist friend Jan to be friendly to him and interprets their actions as condescending. As he tries to stifle a drunken Mary to avoid detection after carrying her upstairs, he accidentally kills her. In a time of panic, he burns the body in the furnace and concocts an elaborate lie imputing the Communist Party. He lies, dodges questions, and even tries to demand ransom, but this can only last for so long before Bigger is named as chief suspect. He brings with him in flight his girlfriend Bessie and later kills her, as she cannot continue with him nor return home. After being caught and brought to trial he is supported by attorney Boris Max who de fends him intensely with his own eloquence and conviction. Bigger discovers that the man, though white, feels genuinely for him, but in the end, as dictated by fate, he is sentenced to death and is granted no clemency by a society refusing to take any responsibility for a member for whom it has failed to care.

Home Decorating Plan :: Interior Decorating Marketing Strategies Essays

Home Decorating Plan 1.0 Executive Summary Interior Views is a retail home decorator fabrics and complementary home accessories and services concept that is now in its third year. This destination store offers the advantages of providing fabrics specifically designed for home decorator use in fabric widths of 54 inches and greater. Over 900 fabrics are available on the floor at any time with more than 3,000 sample fabrics for custom "cut" orders. Customers see, touch, feel, and take the fabric to their home as they work through their purchase decision. Market research indicates a specific and growing need in the area for the products and services Interior Views offers in the market it serves. The market strategy will be based on a cost effective approach to reach this clearly defined target market. The three-phase approach will utilize resources to create awareness of the store and encourage customers to benefit from the convenience and services it offers. Interior Views will focus on its selection, accessibility of product, design services, and competitive pricing. The marketing objective is to actively support continued growth and profitability through effective implementation of the strategy. 2.0 Situation Analysis Interior Views is a retail store heading into its third year of operation. The store has been well received, and marketing is now critical to its continued success and future profitability. The store offers the most extensive selection of in-stock decorator fabrics as well as a resource for special ordered fabrics. The basic market need is to offer a good selection of decorator fabrics at reasonable prices, for the "do-it-yourself" and the "buy-it-yourself" customers, through a personalized retail store that offers excellent service, design assistance, and inspiration for people to redecorate their homes. 2.1 Market Summary We possess good information about our market and know a great deal about the common attributes of our most prized and loyal customers. We will leverage this information to better understand who we serve, their specific needs, and how we can better communicate with them. Target Markets 2.1.1 Market Demographics The profile of the Interior Views customer consists of the following geographic, demographic, psychographic, and behavior factors: Geographics  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Our immediate geographic market is the Boise area, with a population of 168,300.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  A 50-mile geographic area is in need of our products and services.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The total targeted area population is estimated at 568,800. Demographics  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Female.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Married.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Have children, but not necessarily at home.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Have attended college.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  A combined annual income in excess of $50,000.

Tuesday, October 1, 2019

Penfolds Grange Brand Prism

It was released in 1951 and kept it position for more than 50 years. But in 2009, Pinfold's launched a special bottle, it was considered as a wrong action of it because that reduced the value of Grange. That is the reason our marketing plan is revitalization Grange, which will be launched in 2014. Before making a detail MIMIC plan, I will create the brand identity for Pinfold's Grange relying on the brand identity prism of Seafarer (2008). ‘Brand identity prism' is a diagrammatically analysis to identify one brand which is presented by a hexagonal prism.It illustrates that brand identify has six facets which are Physique, Personality, Culture, Relationship, Reflection and Self-image. Fanfold Grange is a vintage wine which is recognizable with a strong, distinctive, individual style record for cellaring performance. It is seen as an authentic voice of Australian fine wine and the strength of Pinfold's winemaking culture and heritage. A brand has physique, according Keller, combi nes of either salient objective features (brand awareness) or emerging ones. Physique is not only backbone of brand but also its tangible added value.It may include product features, brand attributes and benefits. Simply, brand physique are basic things relying on it, customer can recognize and aware of the brand. The Pinfold's Grange displays unique character and style and reflects the essence of Pinfold's winemaking philosophy and provenance. It utilizes fully-ripe, intensely-favored and textured Shirrs grapes. It has an interesting history, an unbroken line of production since the very first vintage, consistent quality in each vintage, worldwide claim, longevity and limited production.Pinfold's Grange is still loyal with the dark color, the design is quite simple and original but elegant with the sign of Pinfold's which is the red Pinfold's signature. Two main colors are white and red of the label which is not only for Grange but also or all lines of Pinfold's and the early Grang e label looked like a postage stamp – an attractive one. Although Pinfold's is famous with many kinds of wine lines, Grange is still Australia's most famous red wine regarded as Australia icon which most people have heard of or at least in passing. It was released in 1951 and kept it position for more than 50 years.This is a wonderfully opulent and a magic vintage. The Grange style is the original and most powerful expression of Pinfold's multinational, multi- district, blending philosophy. Pinfold's are the masters at understanding the power f an iconic sub-brand delivering a positive halo over the full brand range. Every year when the new vintage is released it becomes a media event of significant proportions. Pinfold's Grange once again graced the prestigious Top 100 list of the US magazine ‘Wine Spectator', having already been named in their Millennium edition as one of the ‘Top 100 wines' of the 20th century.Granges have won 111 gold medals in shows, 63 silve rs and 33 bronzes, 26 trophies and six championship awards, maybe seven or eight now. There are three Jimmy Watson trophies, in 1964, 1966 and 1968. All of these things make Grange's reputation that every people can recall about it whenever they heard about it and it will be long lasting over the years. A brand has a personality. Personality is about what kind of person Grange would be if it were human including character and attitude. The human personality traits that are relevant for Pinfold's Grange which are sophisticated, classic, elegant and reliable.Pinfold's Grange is truly a unique brand from the first day it was released until now. A brand is a culture which takes a holistic view of the organization, its origins and the value it stands for. Every brand should have its own culture which is not only a concrete representation but also a means of communication and it is no doubt that Pinfold's Grange really did it. Grange is the product of Australian culture regarded as the pr ide of Australian about one of the most famous wine in the world.If Frenchman is proud of their Champagne, to Australians, that is Grange-the Australia's icon. Grange is not Just a symbol of luxury red wine in Australia, it is Australian image in the international wine market. Pinfold's and Grange in particular is always representative of Australia now and in the future. Limited production and Just lease in a period of time also make the culture of Grange. The Grange fruit is from particular area, here is the grapes from Grange vineyard at Magical, South Australia. This is also a factor that makes Grange become special and have its own culture.Because Pinfold's Grange is known as a luxury red wine line, the cultural facet is more meaningful in differentiating its brand which refers to its fundamental ideals and to its sets of values. A brand is a relationship: the strength of the relationship between the brand and customer. The Wall Street Journal has even published a DOD Jones Gran ge Index; the accompanying text was, ‘Wine lovers remember their first Grange the way they remember their first kiss! ‘. Pinfold's' advertisements carry the slogan â€Å"To those who do things for love not money' and it's also adapted to Grange.The relationship between Pinfold's Grange and its customers are trust, consistent, dependability and exclusiveness. This is reflected by the loyalty of customers to their favorite wine brand. Grange was first released in 1951, but until now it is still the most famous wine and attract amount of number wine lovers who are willing wait for its new line ear by year despite the price rises and supply tensions, even promote this brand among others. It means that Fanfold Grange has built the trust and strong consistent in its customers' mind by its quality and reputation themselves.Although Grange was launched in the market for more than five decades, it still has strong sales. The relationship between Pinfold's Grange and its customer s is also stronger because Pinfold's always envelop its users with the image they want to signal to their social surroundings. A brand is a customer reflection. When mentioning about brand reflection, it is about he customer should be reflected as he or she wishes to be seen as a result of using a brand. Pinfold's Grange is the sort of wine language for people who have deep pockets need to hear.Target segment of Pinfold's is the customers who fall in medium and high disposable income, general from business background, have an average age of 35 plus, and are very loyal to a brand and aware of the wines in the market. In addition, these customers demand high quality wines with taste and texture. That is the reason why prestige, discerning and high social status are the thoughts of others to Grange lovers when they drink this wine. In addition, person who drinks Pinfold's wine seems to be successful and looks like enjoying her/his successful life.A brand speaks to our self-image. Diffe rent from reflection which is how others see the brand's users, self-image is the feeling of users themselves when they use the brand. Pinfold's lovers in general and Grange in particular, feel confident and sophisticated when they drink this wine due to they are enjoying one of the most luxury and the highest quality in the world. Moreover, they feel special because we all know that with its luxurious and high-cost wine label, Pinfold's Grange would push their grandmothers over for.And â€Å"it's clearly cemented itself as a gift worthy of someone who's Just been elected premier of Australia's most populous state†. A customer might see himself fabulous and capable of drinking Pinfold's Grange. Customers wish to display themselves that they are a part of community in which people have social approval, they are elegant, sophisticated and successful when they choose Pinfold's Grange. In conclusion, this brand identity prism is a helpful tool in positioning Pinfold's Grange in t he wine market at the current time which help our group come up with a MIMIC plan for the release event of Grange in next October.