Tuesday, December 31, 2019

How to Find the Gemini Constellation

The Gemini constellation is one of the most ancient known star patterns. People have been observing it since earliest human history, and it was first charted by the Greek-Egyptian astronomer Claudius Ptolemy as part of his sky mapping activities. The name Gemini is the Latin word meaning twins, and most star-chart makers depict the stars in this constellation as a pair of twin boys.   Finding Gemini Constellation Look for Gemini in the sky near the constellations Orion (which has some fascinating sights of its own) and Taurus. For northern hemisphere viewers, its a winter star pattern and its two brightest stars, Castor and Pollux, are part of an unofficial asterism called the Winter Hexagon. That pattern contains six bright stars from the constellations Gemini, Orion, Canis Major, Canis Minor, and Taurus. Gemini looks like two long strings of stars extending down from Castor and Pollux, which are the heads of the twins. The easiest way to find it is to look for Castor and Pollux east of the vee-shaped Hyades cluster, which makes up the face of Taurus the Bull. The best views of this star pattern are available when it is straight overhead early in the new year. It remains visible until late spring, when it disappears into the sunset glow.   The Winter Hexagon is made up of the brightest stars from the constellations Orion, Gemini, Auriga, Taurus, Canis Major and Canis Minor. Carolyn Collins Petersen The Story of Gemini The mythology of the ancient Greeks and the Babylonians concerned a pair of twins in the sky.  For the Babylonians, these boys were in the realm of the gods, and they called them Meshlamtea and Lugalirra. They were related to a more important god, named Nergal, who presided over the Underworld and was thought to bring about all kinds of misfortune, disease, and other ills. The Greeks and Romans called these stars after the twin sons of Zeus and the maiden Leda. The Chinese saw a bird and a tiger in these stars. The modern constellation of the twins was set by Ptolemy and formalized by later stargazers. The formal area of the sky that contains the twins was set by the International Astronomical Union and contains other stars beyond the main ones, plus nearby deep-sky objects.   The Stars of Constellation Gemini Gemini constellation is dominated by the bright stars Castor and Pollux. These are also known as ÃŽ ± (alpha) Geminorum (Castor) and ÃŽ ² (beta) Geminorum (Pollux). Castor may look like only one star, but in reality, it contains six stars in orbit with each other. It  lies some 52 light-years from Earth. Twin brother Pollux is an orange giant star that lies about 34 light-years away from the Sun. Pollux also has at least one planet in orbit around it.   The official chart showing the stars of the constellation Gemini, provided by the IAU. IAU/Sky Telescope.com   Stargazers who want to explore other stars in Gemini might find ÃŽ µ (epsilon) Geminorum, which is interesting since its a binary star that can be seen through telescopes. One member of the pair is also a Cepheid variable star that brightens and dims with a period of about 10 days.   Deep-Sky Objects in Gemini Constellation Gemini isnt enriched with a lot of deep-sky objects. This is because its situated away from the plane of the Milky Way, where most of the clusters and nebulae exist. However, there are a few things that observers can search out in the constellation. The first is a star cluster called M35.  Its what astronomers call an open cluster. That means that its stars are fairly scattered through space but are still traveling together. There are about 200 stars in M35, and this cluster can be seen with the naked eye from dark-sky sights. Its also a lovely sight through binoculars or a telescope. Look for it near Castors foot.   The open star cluster M35 (lower right) in the constellation Gemini. 2MASS/NASA.   Skygazers up for a challenge can also search out two dim planetary nebulae in Gemini. These are clouds of gas that have formed around dying sun-like stars. The first is the Eskimo Nebula (also known as NGC 2392).  It has been imaged by the Hubble Space Telescope and is about 4,000 light-years from Earth.  Search it out by looking just to the left of Polluxs waist (marked 2392 on the chart). The other object is called the Medusa Nebula, and its a real challenge to see.  Search for it along the border with Canis Minor, below Polluxs knee. The Eskimo Nebula in Gemini, as seen by Hubble Space Telescope. NASA/ESA/STScI   Finally, meteor shower fans spend each December 13-14 observing the Geminid Meteor shower. Its a shower created by a stream of material left behind by the asteroid 3200 Phaethon as it orbits the Sun. The meteors are not actually from Gemini, but they appear to radiate from the constellation. In a good year, observers can spot upwards of 100 or so meteors per hour from this shower.   Gemini in Modern Culture As a starry constellation, Gemini has appeared in both space science and astronomy, as well as science fiction. NASAs Gemini missions were named for this star pattern because they each carried two astronauts to space. The Gemini Observatory has two domes, one in Hawaii and one in Chile, both inspired by the starry twins. Finally, science fiction writer Robert A. Heinlein named two of his teenaged characters after the two bright stars Castor and Pollux.

Monday, December 23, 2019

Essay about Reaching My Students Through Real World...

Reaching My Students Through Real World Experiences High school teachers face the challenge of preparing their students for the real world. Students need real world preparation, not just acumen. Reaching my students involves building encouraging relationships and a sense of security within the classroom. Sharing my personal experiences, as well as the testimonies of others, can be an effective motivational tool for preparing college-bound students for the real world. My role as a teacher involves communicating the many obstacles college students face. Providing students the psychological preparation they need will alleviate fears and frustrations high school seniors often face while anxiously anticipating the vast college experience.†¦show more content†¦The real world exists far beyond the college level, as every day we are learning. John Spayde’s article, Learning in the Key of Life, emphasizes this lifetime learning process as connections to the real world. How will secondary education prepare one for college, or mo re importantly, for life? Learning is constant, necessary for success beyond economic factors. Success should not be measured by dollars, but to a peaceful state of mind. I have personally found that wisdom does not equal knowledge. Wisdom propels the spirit, builds the character of a person, and enhances one’s view of life. Wisdom is attained through time and experience, not in the classroom. Spayde addresses a richness of life within the knowledge of the humanities. He defines something he calls â€Å"slow knowledge,† a knowledge â€Å"shaped and calibrated to fit a particular ecological and cultural context.† His aim of slow knowledge is â€Å"resilience, harmony, and the preservation of long-standing patterns that give our lives aesthetic, spiritual, and social meaning† (61). I believe this generation has not been exposed enough to learning through slow knowledge. Teachers must incorporate these basic fundamentals in learning that enable students to a cknowledge and appreciate the rewards of their endurance. The greater rewards areShow MoreRelated Educational Goals and Philosophy Essay examples1264 Words   |  6 PagesGoals and Philosophy As a student of education, I have been able to gather many ideas and opinions about practices and ideals I want to implement in my future classroom. My philosophies about education are still being formed and continually change with every class I visit and with every educator I encounter. My ideas, admittedly, come from random experiences and intangible texts, but as I gain more experience in the field through my courses, my philosophies about teaching will becomeRead MorePlato’S Idea Of A Teacher Is One Whose Soul Boldly Faces1291 Words   |  6 Pagesself-motivated seeker of truth. In his allegory The Cave, he describes guiding minds toward what is real and important and allowing them to seize it for themselves. In this cave, prisoners’ backs are to the sun and they are only experiencing life through the shadows that the sun casts. However, by removing the shackles and turning towards the light, the prisoners will be able to see and experience the rea l things that have cast the shadows. Consequently, a student’s back can be to the light and onlyRead MoreThe Broader Picture Of Education924 Words   |  4 Pageslife lessons and basic knowledge of the world around them. It helps them become a better person to be around and work with. Education is important in many ways. Students learn to solve the bigger problems as well as learning communication and organizational skills which are key components to success not only in school, but out of school as well; but these important life lessons are becoming more difficult to achieve due to the growth of technology. Through the learning of the basic subjects in schoolRead MoreIs Charitable Donations The Current Situation Of Education Inequality?1382 Words   |  6 Pagessense I think it does a lot of good things.† (Lin) Again, the governor’s approach will only aid the current situation of education inequality. I believe this is just one step in the right direction for creating more educational opportunities for students in dire need. We still need to pressure him and government officials to do more. We need to make a more concrete plan to end education discrimination. The Jay Pinson STEM education program at San Jose State is one organization pulling togetherRead MoreMusic, Theater, And Dance From The Inside Out900 Words   |  4 Pages At age eighteen, I underwent one of the most strenuous experiences of my life when I attended a prestigious musical theatre conservatory. From 7:30a until 10:00p Monday through Friday, I never stopped moving. I committed to studying music, theatre, and dance from the inside out. I consulted newspaper archives and interviewed playwrights in order to understand my characters’ backgrounds. I delved into every aspect of the plays I was assigned, like an investigator rather than a performer, learningRead More Example of a Personal Statement Essay examples632 Words   |  3 Pages  Ã‚  Ã‚  Ã‚  Ã‚  During my years of living, I have experienced many things. Many of which have made me who I am today. Many of the things I have done have caused me to want more in life, to expand not only my knowledge, but also my horizons. In reflecting back on what I have done in life, it shows me that I am well on my way of doing that. I feel as though I am a very determined, hard-working, versatile person who is ready for college and the world. Various factors have caused me feel this way.   Ã‚  Ã‚  Ã‚  Ã‚  My interestRead MoreMy Ability As An Effective Teacher1342 Words   |  6 PagesI have always questioned my ability as an effective teacher. Every lesson I teach or conjure up in the wee hours of the night requires the learner in mind. Hospitals are for patients, so schools should be for students. Yet, there is a constant gravitation towards running schools based on money and logistics. These issues are out of the educator’s hands, but the ideals, and the decision makers, that fuel them can have detrimental effects on the teachers recruited to the field and the effectivenessRead MoreReflection Paper1022 Words   |  5 Pagesorder for her students to mimic the strategy so they can internalize it, in hopes for the students to use the strategy when reading in order to become self-regulated learners. At one point of the video, the teacher uses a peer sharing strategy where the teacher ask the students to turn to their neighbor and come up with a good summary of the story they just read, this is an example of cooperative learning. Cooperative learning, (as cited by Slavin and Schunk, 2017) is when â€Å"students work togetherRead MoreTeaching Diversity And Equitable Classrooms Versus Teacher Activism Essay1155 Words   |  5 Pagesbetween teaching diversity and equitable classrooms versus teacher activism. In this paper, I will be reflecting upon my experiences teaching, learning and unlearning as a teacher candidate. Throughout this course, I learned that educators should engage in critical social action, and these actions can come in many different forms. The school is a place where students can share experiences and knowledge differences. Educators can start by create a classroom environment where these conversations can occurRead MoreEvaluation Of An Integrated Lesson Plan901 Words   |  4 Pages Through the lesson plans that we developed, I’ve learned how to implement art that is developmentally appropriate, meaningful, and challenging for students. The integration of art must be meaningful to the lesson but also challenging for the students. The integrated lesson plan must also consider a diverse classroom, allowing all students equal access to what is being taught. Most importantly, art experiences must help each child meet challenging and achievable learning goals. As teachers, we must

Sunday, December 15, 2019

The Picture of Dorian Gray Free Essays

ure Khadijah Wiley Boswell British Literature 12-5-10 The Picture of Dorian Gray Social classes are very evident in The Picture of Dorian Gray; they are represented through some of the main characters. The goal of this analysis is to identify the factors, which influence people’s ideals about social classes. The theme of social classes in The Picture of Dorian Gray is effectively revealed through the main characters Dorian, Lord Henry, and Basil. We will write a custom essay sample on The Picture of Dorian Gray or any similar topic only for you Order Now In opposition, social classes are seen as possible supplement to beauty, wealth and intelligence. The proponents of vanity would say that it is the reoccurring factor in the book, being that all of Dorian’s actions revolved around a gorgeous portrait painted by Basil. Dorian’s portrait had changed his behavior tremendously making it seem as though he was overcome by his own beauty that he could not judge his actions accurately. â€Å"People have cognitive bias. They assume that if someone is attractive, she possesses other positive traits, such as kindness and intelligence,† says behavioral psychologist Stephen Josephson, Ph. D. , of Weill Cornell Medical College (Landman par. ). The actions of Dorian Gray are mainly due to the influence of the high-class society. The upper class in modern capitalist societies is often distinguished by the possession of largely inherited wealth. (Characteristics of the Principal Classes par. 2). The influence of the high class had tremendous effect on Dorian. The people associated with the upper class influenced his behavior to become detrimental to his overall mental health; along with that the pressure to be the best and to be on the throne of society eventually lead to Dorian’s demise. The fact that his picture was changing with his actions shows that he clearly had a conscious and knew that the actions he was displaying were inhumane. The dominant class, according to Marx, controls not only material production but also the production of ideas†¦(Karl Marx’s Social Theory of Class par. 1) Therefore, social classes can be seen as corrupt influences that dangerously affect a human’s behavior, through Dorian’s struggle with himself. Lord Henry had so much power in society that he lost track of what really was important. Lord Henry played a big part in Dorian’s demise, he told him many times that intelligence, wealth, and beauty, is the only way to succeed in life. Dorian took these words to heart and did everything possible to be known in the high classes. He had become obsessed with being known for his money and his social standpoint, and lost sight of what was important in his life. â€Å"Geniuses†¦ are always talking about themselves, when I want them to be thinking about me. †(Wilde, An Ideal Husband). Lord Henry was divorced from his estranged wife who probably could not take his insistent lectures about what it means to be high class. His lectures on social class and power heavily influence Dorian. Basil believed in the power of social classes, and he revealed it through his portrait of Dorian. Basil was very fond of Dorian and his looks. He called his painting by far the prettiest he has ever created. (Wilde, pg 15). Basil painted Dorian picture because he thought he was handsome, intelligent, and wealth, that intern he felt that he was high on the social chain. Basil felt that Dorian could take him places in his career. Basil also was influenced by the high-class life; this is partly the reason that he became an artist. He wanted to be known with the big names of society, and he wanted to become one of the great artists of all time. The need to be known contributed to his death. As he tried to change Dorian’s behavior, Dorian became enraged and murdered Basil in cold blood. Even though he tried to change his viewpoint on life, it was too late, and there was no going back. In conclusion, vanity is a relevant theme in the novel but; social classes play a bigger part. The theme of social classes is clearly represented through each of the main characters in different ways. Dorian was overcome by his own reflection that his behavior was dangerously affected in a negative way, which eventually lead to his suicide. Lord Henry was so focused on his intelligence and social standpoint that he lost everything that was valuable to him. Basil was trying to be successful, but went about it in the wrong way, which eventually lead to his murder. All these things play a part not only in a novel, but in life as well. â€Å"Never speak disrespectfully of society. Only people who can’t get into it do that. † says Oscar Wilde in an interview. Works Cited â€Å"Characteristics of the Principle Classes. † Encyclop? dia Britannica Online School Edition. Web. 08 Dec. 2010. http://school. eb. com. â€Å"Karl Marx’s Social Theory of Class. † Encyclop? dia Britannica Online School Edition. Web. 08 Dec. 2010. http://school. eb. com. Landman, Beth. â€Å"Why Looks Matter. † EBSCO Publishing Service Selection Page. Web. 08 Dec. 2010. http://web. ebscohost. com. Wilde, Oscar, and Alvin Redman. â€Å"Genius. † The Wit and Humor of Oscar Wilde. New York: Dover Publications, 1959. Print. Wilde, Oscar, and Alvin Redman. â€Å"Society. † The Wit and Humor of Oscar Wilde. New York: Dover Publications, 1959. Print. Wilde, Oscar. The Picture of Dorian Gray. New York: Modern Library, 1992. Print. How to cite The Picture of Dorian Gray, Essay examples

Saturday, December 7, 2019

Computer Security And Encryption Samples †MyAssignmenthelp.com

Question: Discuss about the Computer Security And Encryption. Answer: Encryption Symmetric key encryption Encryption of data has become an important part of data storage in every sphere. The messages and files which is being sent form one person to another using the internet or any other mode of transfer should have proper security and it must be kept in mind that the message is sent to the actual recipient of it and not in someone elses hands. In the method of symmetric key encryption, there is a separate key for each of the computer system (Sindhuja Devi, 2014). The key is used to help in the encryption procedure and then transfer it over to the receiver of the message using the network they are connected to. During the process of sending the message over to the receiver of the message it is important to know which computer system is going to interact with the message. This would mean that the key for the decryption of the message needs to be installed into the system or else the receiver will not be able to view the message. The drawback of using this process is that the transferring of the key is the most important aspect of the message relay. If the key falls into the wrong hand or is sent to a wrong receiver then the whole message system is compromised (Bashyam et al., 2015). The use of symmetric key means that both the sender and the receiver of the message system has to know a single encryption key which will help them to encrypt and decrypt the message and continue exchanging information. The use of the same key is the most beneficial dorm of messaging system in the symmetric key encryption. Public key encryption The method of public key encryption is often referred to as the system of cryptographic exchange of messages with the help of two un-identical keys a public key shared among the users and a private key confidential to a single person in the network (Abdalla, Benhamouda Pointcheval, 2016). The public key is known to everyone in the network they are connected to and the private key is only share with the person on the receiving end of the message. The security aspect of the use of this mode of message sharing is the generation of the private key if someone gets to know what the public key is. Looking from the point of view of the hackers it would be practically impossible for them to generate the private key which would help them in decrypting the message (Xu et al., 2013). Hashing The use of hashing function is the available in all the applications which are using information system as a part of their system (Lin et al., 2014). The use of this technology is important from the point of view of the user. The technology offers security measures to the use of the internet and thee communication medium that the user is using. The hash function is basically a mathematical function which had the property of converting the input value into a much more compressed value of the same type. The hashed value returned is termed as message digest or hash value. Technique Used For Confidentiality and Authentication The most popular implementation of the cryptography standard is the use of Hashing. This process can directly ensure the process of confidentiality and authentication (Xia et al., 2014). In the world of computer system the use of confidentiality and authentication plays a very important role from the aspect of data storage. Everyone on the same network has to keep their data safe from the hackers and others on the same network. Two direct application of the hash function are discusses below: Password Storage: the storage of password is integral part of keeping information safe. If the passwords fall into the wrong hands then valuable information may get stolen from the individual. Hashing of the passwords make it unreadable to the hackers who are prying into the individuals passwords (Bhullar, Pawar Kumar, 2016). After hashing even if the data is not hidden then the hacker will only be able to see hashes. Logging into the system using these information or decrypting the information will be next to impossible for the hacker. This is due to the fact that the hashing is done with the help of pre image resistance. Integrity Data check: the data checking integrity can be defined as the most common application of the working of hashing function in the process of generating the checksums o the data files in the servers. The integrity check can help the user to detect the changes in the original file. The concept does not provide and sort of positive assurance related to keeping the originality of the data file in the server (Patel, Kasat, 2017). The use of this concept can be helpful for the user who knows that there is a change in the originality of the data. Secure Networks Denial of service attack is a passive attack on the network server where the server or the network traffic is flooded with unrequired resources which results in the network to slow down. The result makes the whole network to slow down and the resources are not able to be accessed (Tan et al., 2014). The server gets congested with requests from different websites which eventually makes the server to fall down. The server crash then does not let any work to happen which can be resolved by rebooting the whole server. There are some steps which can be followed by an organization to stop the process of denial of service attack: Monitoring the traffic level of the network: the main working procedure of the denial of service attack is the dumping of unrequired resources into the data stream of the network. This produces an increased amount of requests to different servers and floods the network with the acknowledgements form the requests (Merlo et al., 2014). The best way to implement the stopping procedure for the denial of service attack is to use a monitoring system of the network that is connected to the server. This way if there is a hike in the traffic requests the administrator monitoring the server will be able to check the system and stop before the attack even begins. The administrator has to keep up with the amount of requests that will be getting generated and instantly shut the server down as soon as there is a hike in the amount of requests. The administrator can also set up an upper limit in the threshold limit which will help is directly disconnecting the systems from the server. Produce a risk mitigation plan for the attack: the main aspect of the process is to stop the attack as soon as it happens. The other way is to redirect the attack procedure to another server which would be able to take up the denial off service attack. Though the use of this process is not foolproof but it might help in the mitigation of the risk that can be associated with the attack. The server can be configured separately which will be redirected to when there is a high rise in the traffic flow in the network (Guo et al., 2015). Log datas should be dumped regularly after correct monitoring of the data to ensure that the network is not being misused by the employees and also to check whether there are any kind of other IP connecting the network. There should be a confirmation procedure in the server which will help in obtaining the DNS time to live for the systems connected to the network which might help in understanding which of the system are vulnerable to the attack. Access Control Rules of working in secure areas Integrity of physical security: Closing of door after the authorized person has entered. Not to leave any door open or unguarded in the working area. Debar from unauthorized and unsupervised access of data by the technicians and maintenance workers (Peppard Ward, 2016). Integrity of environmental security: No eating of foods and beverages in the work environment. Not to store hazardous materials in the work environment Use of good fire protection mechanism. Mechanical failures should be reported at once (Pearlson, Saunders Galletta, 2016). Authorization of different activities: Approval from the ITS is necessary to go on with any changes in the work. Risk mitigation document should be created and followed Equipment cabinet should not be opened without authorization. Damaged system and materials should be looked after at once (Chang et al., 2015). Reduction in the unauthorized use of desktop PC Security protocol with respect to computer system can be defined as restricting the use of the system with an unauthorized access. The task of securing a system is challenging. Hackers has always been considered to have the upper hand in the technological aspect of accessing such files and system with unauthorized access (Bila et al., 2015). Though the best decision would be the use of security measures to secure the system. The following are some of the ways which can be used by the administrator to secure the access of the computer system connected to a network: Regular system update and upgrades: the use of the operating system is to help the user ot work freely on the system. Though this help can become a bane when the system updates are not installed on the correct time and the hackers can find the backdoor to the system using the codes lagging due to the updates not being done (Bila et al., 2015). Web browser: to stay connected to the internet it is important for the user to use a web browser. There are many options available in the market which would help the user to stay connected. They are mainly open source in nature and can be changed by anyone with the knowledge of coding. This becomes a drawback as hackers can change the coding of the web browser and send the pirated version to the users as an update. This would make any data entry into the web browser be logged remotely and the web browser may also be used as a secret route inside the system network thus getting access to the files on the server (Bila et al., 2015). Pirated softwares: the use of pirated softwares has increased in the recent times. Due to the high pricing of the original software users often tend to look for cheap or practically free. This makes the pirated software to pose a threat to the system network. The most notorious attacks are launched from java based programs and servers. This is the reason that the Homeland Security asks to disable the java updates on their systems (Pearlson, Saunders Galletta, 2016). Malware and virus: a simple virus is able to do tasks that any normal person with the full access to a system cannot do. This is the reason virus and malwares are dangerous for any system. Some of virus in the system often try not to damage the hardware and just damage the files and on the system and eventually spread to the server. A spyware can get activated when the file is opened in the system. The virus can also get downloaded when the user suddenly clicks on any pop up box from the browser (Pearlson, Saunders Galletta, 2016). Firewalls The installation of an intrusion detection system helps in monitoring any unknown source of entry into the system. The result then can be analyzed to find any suspicious pattern in the system which might imply that someone was trying to get into the system form outside (Lin et al., 2014). The use of an intrusion detection system can be termed as a passive help to the monitoring of the network. It would just be suggesting the organization that there had been an unauthorized access to the network from outside. There are two ways in which the working can be done; first by the use of ID filtering and the second is to have packet stream analysis of the traffic data. Deep packet inspection (DPI) The use of deep packet inspection does not imply only to the checking of the header and the footer of the packets of information that is travelling to and from the server. The DPI has to look at every single packet as a whole and check if it legal or not (Bremler-Barr et al., 2014). This is the process of decision making procedure used by the firewall to sieve out the wrong and illegal packets from the stream of data. The DPI checks into the packets passing through the stream and does the decision making procedure and then finally allows the correct packet through the stream. The Deep packet inspection can be used to enforce a strong foundation in the security aspect of the organizations servers. The officer is responsible for the checking of the packets one by one and telling the firewall or the system that the packet is not illegal. The use of different network management tools can be also used to filter out the different packets from the data stream (Hofstede et al., 2014). These tools can also be used to provide better insight to the packets that are being filtered. They can eventually make up a report for the network usage and the informations which has been requested and analyzed. The data can also be later used for forensic analysis of the network. Packet Stream Analysis The use of a packet stream analysis can be done in both legitimate way and illegitimately. During the use of the technology in a legitimate way transmission error and network and data can be tracked (Lim et al., 2014). The main objective of this technology is the use of network detection. The process of using packet capture can be compared to process of telephone tapping in sense of detecting any problem in the computer network. The implementation of this process can help in the troubleshooting of nay network problem. The use of a packet sniffer in the network can be used for a variety of network procedure and analysis. This can be used to find an intrusion in the network of the system. Thus it can be said that the method can be used to serve the primary process of the network (Martin, Brito Fetzer, 2014). References Abdalla, M., Benhamouda, F., Pointcheval, D. (2016). Public-key encryption indistinguishable under plaintext-checkable attacks. IET Information Security, 10(6), 288-303. Bashyam, S. L. R., Shankar, K., Kadiyala, S., Abuzneid, A. S. (2015). Hybrid cryptography using symmetric key encryption. Research Gate, (6). Bhullar, R. K., Pawar, L., Kumar, V. (2016, October). A novel prime numbers based hashing technique for minimizing collisions. In Next Generation Computing Technologies (NGCT), 2016 2nd International Conference on (pp. 522-527). IEEE. Bila, N., Wright, E. J., Lara, E. D., Joshi, K., Lagar-Cavilla, H. A., Park, E., ... Satyanarayanan, M. (2015). Energy-oriented partial desktop virtual machine migration. ACM Transactions on Computer Systems (TOCS), 33(1), 2. Bremler-Barr, A., Harchol, Y., Hay, D., Koral, Y. (2014, December). Deep packet inspection as a service. In Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies (pp. 271-282). ACM. Chang, M. J., Jung, J. K., Park, M. W., Chung, T. M. (2015, July). Strategy to reinforce security in telemedicine services. In Advanced Communication Technology (ICACT), 2015 17th International Conference on (pp. 170-175). IEEE. Guo, Y., Ten, C. W., Hu, S., Weaver, W. W. (2015, February). Modeling distributed denial of service attack in advanced metering infrastructure. In Innovative Smart Grid Technologies Conference (ISGT), 2015 IEEE Power Energy Society (pp. 1-5). IEEE. Hofstede, R., ?eleda, P., Trammell, B., Drago, I., Sadre, R., Sperotto, A., Pras, A. (2014). Flow monitoring explained: From packet capture to data analysis with netflow and ipfix. IEEE Communications Surveys Tutorials, 16(4), 2037-2064. Lim, C. L., Lee, K. S., Wang, H., Weatherspoon, H., Tang, A. (2014, March). Packet clustering introduced by routers: Modeling, analysis and experiments. In Information Sciences and Systems (CISS), 2014 48th Annual Conference on (pp. 1-6). IEEE. Lin, G., Shen, C., Shi, Q., Van den Hengel, A., Suter, D. (2014). Fast supervised hashing with decision trees for high-dimensional data. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 1963-1970). Lin, Y. D., Lin, P. C., Prasanna, V. K., Chao, H. J., Lockwood, J. W. (2014). Guest editorial deep packet inspection: Algorithms, hardware, and applications. IEEE Journal on Selected Areas in Communications, 32(10), 1781-1783. Martin, A., Brito, A., Fetzer, C. (2014, May). Scalable and elastic realtime click stream analysis using streammine3g. In Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems (pp. 198-205). ACM. Merlo, A., Migliardi, M., Gobbo, N., Palmieri, F., Castiglione, A. (2014). A denial of service attack to UMTS networks using SIM-less devices. IEEE Transactions on Dependable and Secure Computing, 11(3), 280-291. Patel, F. S., Kasat, D. (2017, February). Hashing based indexing techniques for content based image retrieval: A survey. In Innovative Mechanisms for Industry Applications (ICIMIA), 2017 International Conference on (pp. 279-283). IEEE. Pearlson, K. E., Saunders, C. S., Galletta, D. F. (2016). Managing and Using Information Systems, Binder Ready Version: A Strategic Approach. John Wiley Sons. Peppard, J., Ward, J. (2016). The strategic management of information systems: Building a digital strategy. John Wiley Sons. Sindhuja, K., Devi, P. S. (2014). A symmetric key encryption technique using genetic algorithm. International Journal of Computer Science and Information Technologies, 5(1), 414-6. Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P. (2014). A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE transactions on parallel and distributed systems, 25(2), 447-456. Xia, R., Pan, Y., Lai, H., Liu, C., Yan, S. (2014, July). Supervised Hashing for Image Retrieval via Image Representation Learning. In AAAI (Vol. 1, pp. 2156-2162). Xu, P., Jin, H., Wu, Q., Wang, W. (2013). Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Transactions on computers, 62(11), 2266-2277.