Thursday, October 31, 2019

In Preventing a Brave New World (pp. 317-329), Leon Kass concludes Essay

In Preventing a Brave New World (pp. 317-329), Leon Kass concludes that reproductive and therapeutic cloning of human embryos - Essay Example He points out that â€Å"revulsion† (Kass, 2001) is not the basis of his argument as he points out that â€Å"repugnance† (Kass, 2001) of the past is silently accepted in the present. He moreover observes that disgust is not something that is emotional and hence he is not being emotional when he criticizes the cloning of the human embryos but it is a deep thought into the matter makes him talk against the mechanism. He compares cloning with the incest relationships and other unethical activities like disfigurement of corpse or feeding on human flesh. Kass observes that as murder, rape or bestiality cannot be ethically justified, in the same manner reproductive and therapeutic cloning of human embryos stands unjustified on the ground of ethics. Kass (2001), in his composition, says that cloning is resisted not only because it is strange to take up something like this but because he â€Å"intuit† that it is not novel and cloning for him is the violation of things t hat he dearly holds. In the book he criticizes cloning on the grounds of unethical experimentation, threatening the identity of human being and his or her individuality, transforming the essence of procreation into manufacturing. He also argues against it on the ground of despotism that it heralds on the children, thereby becoming the harbinger of parenthood perversion. He makes sure he is not misinterpreted when he is arguing against cloning. He points out that he is against the creation of reproductive cloning and not against the cloning that is used for the research work (Kass, 2001). On ethical grounds Kass argues that the cloning experiment has an adverse and unethical effect on the child to be born. Its not that they would be only affected adversely on the ethical grounds there can serious dangers to their life, as the experiment of cloning has failed mostly among the animals. Incidents of fetal deaths and the deaths of the stillborn infants cannot be avoided in the process of cloning. He also points out that the so called proclaimed successes are actually failure. It has also been revealed very recently that there remains a high chance of disability and deformity among the cloned animals that lives after birth. He justifies his argument by citing examples of clone crows which has heart and lungs problems and cloned mice which develops pathological obesity later on in its life span. It has been also observed that a cloned animal fails in attaining normal development milestones. Though he argues on the ethical grounds of relationships and the associated problem that would arise from cloning he actually argues on a strong scientific and logical terms. His argument against cloning stands justified on the basis of the facts and figures that have been provided by him (Kass, 2001). He also puts forward an argument on the basis of identity and individuality crisis. It will be like a dilemma for the person who has been cloned, as not only will he have concerns a bout his distinguishing characteristics but also that he will have an identical appearance as his father or mother. This would lead to serious identity crisis. He indicates the adverse effect that a homey case can have if engaged in infra familial cloning. Cloning of the husband and the wife gives birth to a twin parent child relation. Eventually no parent will be competent to take care of the clone of himself or herself as one treats his or her own child. This creates a series of perplexity in the relationship, the way they are perceived. Like if the daughter is the clone of

Tuesday, October 29, 2019

Evaluate to what extent intellectual property law adequately protects Essay - 1

Evaluate to what extent intellectual property law adequately protects the rights of enteratinment business personalities(real persons only) - Essay Example Intellectual property law mainly covers copy right law. Copyright is a measure of protection that deals with published and unpublished literary, scientific and artistic works, whatever the form of expression, provided such works are fixed in a tangible or material form 1. Copyright laws provide the creator the exclusive right to reproduce, prepare derivative works, distribute, perform and display the work publicly. Hence the violation of copy right becomes severe challenge for persons of entertainment industry. The main challenges are in the form of theft of ideas, violation of intellectual property law i.e. infringement of trade mark and copy right leading to the injustice to the genuine artists (Maskus, 2000 and Peter Drahos, 2006). Fortunately there have been some legal instruments in the world which provide optimum justice to the genuine artists. Intellectual property law is one of the most crucial instrument which certainly protects the rights of the artists in the entertainment industry (Robert M. Sherwood, 1990 and Brainbridge David,2006). The introduction of intellectual property law has been done keeping these things in to consideration. However one must question oneself regarding the efficacy of this intellectual property law in the context of protection of the interests of the artists in entertainment industry. Taking these above points in view, the present study has been conducted with the following objectives: The different aspects of the copy right law and trade mark have to be analyzed relating to their role in balancing mechanism between the right of privacy of artists and the right of freedom of information of media. There is a lot of probability of having conflict with implementation of intellectual property law in case of licencing and sponsiorship which is quire common in both sports and entertainment industry. The regulation of intellectual property in cases of

Sunday, October 27, 2019

An Introduction To Cryptology Computer Science Essay

An Introduction To Cryptology Computer Science Essay Cryptography was used only for military and diplomatic communication until the development of public key cryptography. Secrecy is one of most important requirement for any communication and it becomes more important when the content of communication is for military and diplomatic purpose. Hieroglyphs used by Egyptians are earliest known example of cryptography in 1900 BC. These hieroglyphics were used to write the stories of the life of kings and describe the great acts of his life. Around 500 BC Hebrew scholars used mono alphabetic substitution cipher such as Atbash cipher. Around 400 BC the Spartans also developed a Scytale cipher that used ribbons of parchment for writing any secret message after wrapping it around a cylindrical rod named as Scytale. In second century BC Greek historian Polybius invented Polybius Square a type of substitution ciphers. Around 1st century BC the Roman emperor Julius Ceaser used the substitution cipher named after him as Ceaser Cipher. The Caesar Cipher is a Monoalphabetic type Cipher. Around 9th century AD the Arab Mathematician AbÃ…Â « YÃ…Â «suf YaÊ »qÃ…Â «b ibn Isà ¡Ã‚ ¸Ã‚ ¥Ãƒâ€žÃ‚ q al-KindÄ « popularly known as Al-Kindi published the first text book on cryptnalysis of ciphers named Risalah fi Istikhraj al-Muamma (On Deciphering Cryptographic Messages). This book can be stated as the pioneer of the medieval cryptography. In this book Al-Kindi described the frequency analysis technique for deciphering substitution ciphers and some polyalphabetic substitution ciphers. The relative frequency of symbols is used in Frequency analysis to decode the message. Al-Kindi used this technique on Quran to understand the meaning for religious purpose. The field of cryptography had not made any significant development until 15th century when the Italian mathematician Leon Battista Alberti known as The Father of Western Cryptology, developed the concept of polyalphabetic substitution. Although he had not made any practical cipher but by using this concept a practical Poly-Alphabetic substitution cryptographic system was developed by French cryptographer BLAISE DE VIGENERE, which was named after him and called as VIGENERE SQUARE. For a long time this cipher was believed to be secure but around 1854, CHARLES BABBAGE, an English mathematician and engineer, better known as father of Computer Science for his development work of difference engine that become the first mechanical computer, successfully cracked the Vigenere Square Cipher by using the method of statistical analysis. Cryptography was widely used in World War I and II. The most famous incident of World War I is of German foreign Minister Zimmerman Telegram that changed the whole World War I and involved the America in world war which was neutral till that date and Germany was finally defeated. Unlike the past cryptographic algorithms in which the main concentration was on hiding the algorithm or technique the modern ciphers needed the technique or algorithm which can be widely used and whose security should not be compromised if the algorithm is known. To encrypt and decrypt the information, a key is used in modern cryptographic algorithms which convert the message and data in such format which are senseless to the receiver through encryption and then return them to the original form through decryption process. Claude E. Shannon, father of modern cryptography has contributed his work to cryptography in the form of A mathematical theory of cryptography and A Communications Theory of Secrecy Systems which are considered as the foundation of modern cryptography. In seventies the field of cryptography has witnessed two major developments. First was the development of Data Encryption Standard (DES) by IBM, which was accepted as standard after some modification by the NSA in 1977 and it was later replaced by the Advanced Encryption Standard (AES) in 2001. The second development which is more important and that changed the whole working process and use of cryptography is the development of Public Key Cryptography. It was started with the publication of the paper titled New Directions in Cryptography, by Whitfield Diffie and Martin Hellman and similar development made by Ron Rivest, Adi Shamir and Leonard Adleman, who were the first to publicly describe the algorithm in 1977 and it was named after them as RSA algorithm. An Introduction to Cryptology: The word cryptology is a combination of two greek words, kryptos, which means hidden and logos means study. Cryptology is as old as writing itself and it has been primarily for thousands of years it had been used for securing military and diplomatic communications. The field of Cryptology can be further classified into two main fields, namely: Cryptography and Cryptanalysis. On the one hand the cryptographers try to develop a system or algorithm that will be safe and secure for communication while on the other hand the cryptanalysts seek weaknesses in the developed system and try to breach the security of the system. The two works can be considered against each other but the work of cryptanalysts cannot be always negative and they can work for the betterment of the developed system by trying to find out the weaknesses in the cryptographic algorithm and fix it. Cryptography: Cryptography is the technique for writing secretly so that the unintended recipients cannot comprehend the original message. It transforms the information into such an unintelligible form so that illegitimate or unintended users cannot devise the original meaning of the message and it looks like a garbage value for them. But the main consideration during the transformation is that the process must be reversible so that the intended user can get the original information after applying the original key and process. This is the traditional use of cryptography but in modern times the scope of cryptography has widened. Cryptanalysis: Cryptanalysis is the field of study that deals with the techniques that verify and assert the security of the protocol or system. The objective of the cryptanalysis techniques is to assess the security claims of the cryptographic algorithm or system. Cryptanalysts try to develop an attack to show that claimed security level is not achieved due to weaknesses in the cryptographic system. It is difficult to define when a cryptosystem is broken. Generally, efficiency of an attack is compared with the efficiency of exhaustive key search attack and if the efficiency of attack is less than it then it is considered an attack on the cryptographic system. Classification of attacks can be made on the basis of the amount of information available to attacker: à ¢Ã¢â€š ¬Ã‚ ¢ Ciphertext-only attack: The attacker has access to the ciphertext only. à ¢Ã¢â€š ¬Ã‚ ¢ Known-plaintext attack: In this case the attacker has access to both the plaintext and the corresponding ciphertext. This attack can be employed when the attacker has limited access to the encrypting device. à ¢Ã¢â€š ¬Ã‚ ¢ Chosen-Plaintext attack: The attacker selects a plaintext and generates corresponding ciphertext using the correct key. This can only be applied if the attacker has access to encryption device and is able to encrypt a message of choice using this device. The goal of such type of attack is to discover the secret key or algorithm for any given encrypted text. à ¢Ã¢â€š ¬Ã‚ ¢ Chosen-Ciphertext attack: The attacker selects a ciphertext and generates corresponding plaintext using the correct key. This can only be possible if the attacker has access to decryption device and is able to decrypt a message of choice using this device. The goal of such type of attack is also to discover the secret key or algorithm for any given encrypted text. The goals of such attacks in general can be classified as secret key recovery, plaintext recovery without recovering the key or the discovery of the encryption/decryption algorithm. Classification of Cryptographic primitives: Unkeyed Cryptography: Unkeyed cryptosystem is that cryptosystem which does not use any key or parameter for application. Examples of such system are one-way functions, cryptographic hash functions, and random bit generators. Public Key or Asymmetric Cryptography: Public Key or Asymmetric Key cryptography is the latest addition to the cryptographic techniques that has changed the basic uses of cryptography. Two different keys are used for encryption and decryption in Public or asymmetric key cryptography. Public key is being used for encryption and it is known to everyone and is freely distributable but the encrypted message can only be decrypted by using the private key corresponding to public key which is known only to the authorized person. Public key cryptography evolved to solve the problems of Secret key cryptography but it is very slow in comparison to secret key cryptography. Public key cryptography cannot be used for high volume encryption. Therefore we use combination of Public and Private Key cryptography for practical applications. Secret Key or Private Key or Symmetric Key Cryptography: In Symmetric Key or Secret Key cryptography, only a single key is used to encrypt and decrypt. It is also called Private Key cryptography. The main problem of the secret key cryptography is the sharing of same key by sender and receiver. In the case of unsecure channels, there is no mean to exchange key securely. The secret key must be shared using any secure channel before communication take place and for such purpose Public Key cryptography is generally used. An overview of Symmetric Algorithms: Symmetric key cryptography is still highly used due to its efficiency and is generally used where high volume of data is encrypted. Symmetric key primitives can be classified into two basic designs; namely Block Cipher and Stream Cipher. Block Ciphers: Block cipher is a symmetric key encryption which divides the input stream of plaintext into fixed size of blocks, generally 64, 128 or 256 bits long and using a fixed transformation (substitutions and permutations) on every block on by one. These transformations are repeated many times to obtain highly nonlinear output bits. The two most popular block ciphers are DES and AES. Modes of operation: A block cipher performs fixed transformations on any block of data and results in same ciphertext for same plaintext, hence can only be considered secure for a single block of data. A mode of operation is actually a way of encryption using a block cipher securely for data more than one block. The Block ciphers are used in one of the five modes to operate for breaking the linearity. A cryptographic mode usually consists of basic cipher, some sort of feedback, and some simple operations. Electronic Code Book (ECB) Mode Cipher block Chaining (CBC) Mode Cipher Feedback (CFB) Mode Output Feedback (OFB) Mode The counter (CTR) Mode Stream Ciphers: Symmetric Cryptographic systems encrypt plaintext messages unit by unit, and unlike block ciphers, which encrypt block of plaintext using fixed transformation, Stream Ciphers encrypt individual units or character of plaintext using a time-varying transformation. It takes the secret key and initialization vector (IV) as input and generates a pseudo random sequence of digits called keystream using pseudo random generator, usually part of Stream Ciphers. ciphertext digits are generated by XORing the keystream digits with the plaintext digits. The stream ciphers are classified into two parts as synchronous and asynchronous stream ciphers on the basis of application of internal state in further encryption of digits. Stream ciphers have played an important role in cryptography and still being used due to its efficiency and especially, in hardware implementations where hardware resources are restricted. Stream ciphers are the main topic of research in this thesis and it will be discussed more comprehensively in later chapters. For a general description of stream ciphers, see chapter 2. Scope of Cryptology: Today the cryptology is not just limited to data encryption and decryption as mentioned above, it has a wide range of usages. The field of cryptology is an emerging field in which continuous expansions and modifications are taking place. The field of cryptography was evolved for military usage but it has now expanded and is highly used in civilian applications also. Cryptography is the study of mathematical techniques, algorithms and protocols that can provide four basic services for information security, namely privacy, authentication, data integrity and non-repudiation. Privacy or confidentiality: The basic goal of cryptography is to keep the information secret from unauthorized persons. Cryptography is the most common mean to provide confidentiality or privacy to the information. Data Integrity: Data integrity means that system must be able to detect the unauthorized manipulation of the data. Data manipulation refers to insertion, deletion or substitution of data. Authentication: Authentication service provides the ability to correctly identify the parties in the communication and origin of the data. Non-Repudiation: Non-repudiation service prevents an entity from denying any activity done by itself or existence of a communication at any later stage in case of any dispute. Stream Cipher Standardization: Major effort towards standardization of cryptographic primitives was started by European Commission research project funded from 2000-2003 in form of NESSIE (New European Schemes for Signatures, Integrity and Encryption). In March 2000 NESSIE urged the public for submissions of cryptographic primitives, and against this call 42 primitives were submitted in February 2003. The submissions were selected in different categories for standardization. Various cryptographic primitives were standardized except Stream Ciphers and none of the six submitted stream ciphers were considered as upto standard. During this period another organization, the International Standards Organizations ISO/IEC 18033 also initiated a similar project for standardization and selected two stream ciphers: SNOW 2.0 and MUGI. Other than these two efforts a Cryptography Research and Evaluation Committee was set up by the Japanese Government which started a project CRYPTREC in 2001 to evaluate and recommend the cryptogr aphic primitives in different category for use. In the stream cipher category, three ciphers were recommended that are MUGI, MULTI-S01 and RC4 (128-bit keys only). But, Later on these ciphers were also found to be susceptible to the cryptanalytic attacks This failure on the side of cryptographic primitives in stream cipher category prompted Adi Shamir in 2004 RSA Data Security Conference to question, whether there is a need for Stream Ciphers or not. He also defined two areas were Stream Ciphers can still be useful where exceptionally high throughput is required in software and exceptionally low resource consumption is required in hardware. To explore the Stream Cipher condition and to develop a state of art stream cipher which can secure and fulfill the above mentioned requirements, ECRYPT launched the eSTREAM project in 2004. eSTREAM made a call for submission in two categories; hardware based and software based stream ciphers. In response to this call 34 ciphers were submitted in both the categories. In different phases of this project, cipher profiles were declared. The final profile issued in January 2012, seven ciphers were selected. The selected ciphers are HC-128, Rabbit, Salsa20/12 and SOSEMANUK in profile 1 (Software based Ciphers) and Grain v1, MICKEY 2.0 and Trivium in profile 2 (Harware based cipher). Even after these standardization efforts, many weaknesses were found in these ciphers. This state of Stream Ciphers has led me to involve in the research of the Stream Cipher and work towards a secure and efficient Stream Cipher.

Friday, October 25, 2019

nixon :: essays research papers

The Nixon Memo is a case study of Richard Nixon's quest for political rehabilitation by Marvin Kalb. At issue is the key role of this former president of the United States who is best known for his involvement in the famous Watergate scandal. Nixon was trying to clean up his name in the post-cold war debate about aiding Russia in its uncertain revolution. Kalb, begins his book on March 10, 1992. Nixon had just written a private memo critical of President George Bush's policy toward Russia to his closest friends in hopes of a leak. The memo leaked and exploded on the front page of The New York Times. Nixon attacked President George Bush, by using the press to convey his ideas of what should be done with the falling Giant, Russia. Kalb goes on to show how the conventional wisdom on United States foreign policy is shaped by the insider's game of press/politics to manipulation. This story of Nixon's efforts to pressure the White House, by way of the press, into helping Boris Yeltsin and Russia â€Å"Marvin Kalb read the documents behind the Nixon memo and interviewed scores of journalists, scholars, and officials in and from Washington and Moscow.† Drawing on his years of experience as a diplomatic correspondent, for NBC he identifies the press and politics in the fashioning of public policy. With the memo criticizing the president of the United States in 1992 this helped dictate the outcome of the presidential election. It put Bush as an outsider to a then up and coming Bill Clinton. With all the information out on the memo, such as the media coverage the information had to be exact knowing the significance of the topic. Marvin Kalb, portrayed Nixon perfectly as in what kind of a man he was, a leader, and a fallen president. Kalb stated that â€Å"no other president would have been able to take the embarrassment, and hounding he took from the media, others faded away while he continued to express his views† (p.9). This memo served Nixon as his last way to soften his name in history.   Ã‚  Ã‚  Ã‚  Ã‚  Kalb made it clear early on in his writings that he was on the hate list of Nixon throughout his candidacy, such as his house being wire-tapped, along with his work office for NBC. But he gave credit to how Nixon played the media for what they were worth.

Thursday, October 24, 2019

The Kindergarten Teacher

The kindergarten teacher A teacher is someone whose job is to teach especially in a school whether it is a secondary school, primary school or even kindergarten. Every teacher should have their qualification in order to be a teacher in a school. So, I think that a kindergarten teacher should have at least a basic degree to qualify them to be a good kindergarten teacher. The kindergarten teacher is the most important corner of the educational process and function is not confined to education. Teachers with a basic degree will ensure the children get a good early education.As we all know, world nowadays needs people with high level of education and to fulfill this mission, we need a teachers with wide knowledge and experiences which is a graduated students with basic degree can provide. . Besides, the children are like a white and black cloth so it is teachers and parents who will colour them. The teachers with a basic degree have good enough knowledge to teach their students and they can provide correct and good education for the kids thus producing good generation for the future.Kindergarten teacher must love the children, respects children , parents, patient, kind, caring, and understanding. Also she must use learning centers and has a child-centered classroom. In addition to teacher must be able to provide for all levels of students from enrichment to remedial and willing to give many extra hours. They should have a goal of wanting to ensure that each child is successful. The needs for kindergarten teachers to have at least a basic degree can increase the competition among the university students nowadays.The rate of failure rate among the students in the university nowadays is increasing so the increase of qualification in order to get a job will ensure the students to study hard to achieve good results when they graduated. This will increase the level of education in our country thus producing good image for the country. In conclusion, the kindergarten teac hers should have at least a basic degree to make sure the children get a well early educated God willing . ( http://allbestessays. com/English/Kindergarten-Teachers-Should-Have-Least/6793. html )

Wednesday, October 23, 2019

Group Development Essay

First, here is a summary of the development stages of a team. In the forming stage, team members come togetherand form initial impressions. They socialize in order to get to know each other and bond with other team members. In the storming stage, team members experience hostility and infighting over tasks and how the team works. In the norming stage, team members start to come together and realize what needs to be accomplished. In the performing stage, team members are well-organized and well-functioningand maintain a positive balance. In the adjourning stage, team members achieve closure when the project is accomplished. At the end of the cask study the team is still in the storming phase of team development. The team has not fully come together. There is still some infighting with Mike and the presence of cliques is developing, for example, the situation in the cafeteria. Overall, I think there is tension within the team. Christine’s leadership abilities could benefit by having knowledge of the stages of group development. Aside from the very first meeting Mike was not present at any subsequent meetings. He missed out on the forming stage of team development. During this stage Mike could have talked with the team about his outside distractions, job and girlfriend, that may prevent him from fully participating at the meetings, and on the project. If Christine had some knowledge of team development she would have recognized this lapse in the forming stage and could have been able to address this issue with Mike before it became a bigger problem. Christine, as the team leader, could have pulled Mike aside and talked to him about the importance of attending the meetings. She could have spoke with him after the cafeteria incident to reassure him that he was not being excluded, but that all the team members being there was truly a coincidence. Also, she could have told Mike her opinion about how she felt he had a lot to offer the team, the value of his contributions and how it would help with the success of the team. PART II – Problem Identification The primary problem that appears in this case is Christine’s lack of knowledge in team development and as a team leader. The secondary problem is Mike’s unwillingness to contribute to the team. Since Christine did not have knowledge of team development or experience she was ineffective as the team leader. She could have organized the team better by assigning tasks’, scheduling meetings in advance, and possible scheduling a team building event to solidify the forming stage of development. Mike was the second problem to overall team success. Although Mike had issues outside of the team he should have talked to the team at the beginning and asked for assistance and support. After the incident in the cafeteria Mike simply walked away. He should have stayed for a few minutes and discussed the situation with the other members. I don’t fell Mike did his part to interact with the team to enhance the forming stage of development. After the first meeting he immediately set himself as an outsider. Christine as a leader must understand the each group of individuals is going to have its own personality, both individually and collectively. When you understand the needs of each member, and the dynamic that each one brings to the group, then and only then, are you able to develop a strategy to utilize team development to achieve the groups ultimate goal. The goal is to complete a quality project on time. If Christine’s knowledge of team synergy, social facilitation, and overall team effectiveness would have server her well in her role as project leader. Lastly, Christie needs to learn how to assign tasks based on the strengths, and weaknesses of each team member. Other members of the team each had something to offer, including Mike. He was classified as a clown. Clowns tend to be very spontaneous in their thinking; this is a possible source of new and innovative ideas. This should have been communicated to Mike as well as the rest of the team. PART III – Retrospective Evaluation In order for Christine to solve her primary problem two things need to occur. First, Christine should take a class in organization behavior. Understanding the team development process, as well as, team effectiveness, and teams in an organization will definitely help Christine. She will be able to understand, and identify positive and negative aspects of her project team and would have been able to implement steps to correct any deficiencies. The second aspect was Christine’s lack of effectiveness and her inability to integrate Mike into the team. After the first meeting which Mike attended, the problems started. Mike did not make meeting, and was submitting hand written notes. Christine should have structured a meeting that Mike could attend, or scheduled a team building social event. in addition, she could have started reviewing his notes with the other team members at the meetings since he was not there to do it himself. This would at least have given the other team members the knowledge that Mike was making an effort on his part of the project. PART IV – Reflection In my opinion Christine was presented with a challenge that was way above her level of experience. Her lack of knowledge in team development, and as a team leader was evident in the project team. The team did not make it past the storming phase, and therefore never fully developed into an efficient team. She failed to integrate one individual into the team. This caused friction within the team and left one section of the project incomplete with one week remaining until the deadline. Overall, I do not believe Christine was an effective group leader. REFERENCES 1. Schermerhorn, J.R. Jr.,Osborn, R.N., Uhl-Bien, M., & Hunt, J.E., Organizational Behavior 12th Edition (2012), John Wiley & Sons, Danvers, MA.