Saturday, May 16, 2020

Comparing Book 9 And Book 24 Of Homer s Iliad - 951 Words

In this paper I will attempt to compare and contrast book 9 and book 24 of Homer’s Iliad, which touch upon similar issues, themes and characters, but often with a different intention and result. In particular, both books begin with a time of sorrow and feature examples of supplication and reconciliation, but in book 24 the mood gradually changes, while book 9 ends very much on the same note as it begun. Naturally, as the very first line of the Iliad states â€Å" Sing, goddess, the anger of the Peleus’ son Achilleus† (Iliad 1.1), the issue of Achilleus’s anger and his conflict with Agamemnon is central in both books and Iliad as a whole. In book 9 Achilleus is still very much consumed with his anger and not ready to let it go, even after Agamemnon recognizes his part in the conflict - â€Å"I was mad, I myself will not deny it† (Iliad 9.116) and sends an embassy to Achilleus in an attempt to honor him with great gift and reconcile, nor is he moved by the speech of Phoinix. In contrast, book 24 also starts with Achilleus’s anger, as Achilleus drags Hektor’s dead body across the tomb of his fallen companion Patroklos, but his anger subsides as Priam comes to his camp, supplicates him and evokes the thoughts of Achilleus’s own father, which causes Achilleus to think of how he would mourn him when his own death comes. This difference betw een book 9 and book 24 is very important in regards to the development of Achileus’s character. In book 9, his inability to see past hisShow MoreRelatedThe Importance Of Memory : Importance Of Memory1960 Words   |  8 PagesThe Importance of Memory Memory plays a significant role in a person s everyday life. Actions and emotions are based on the memories that are stored in a person s head. People then act in certain ways because of the thoughts that run around within their brains. These thoughts are born from the memories of past experiences and a person can recognize the emotions they felt when they were in a certain situation. Without these memoires, people would not know how to react under certain circumstances

Wednesday, May 6, 2020

Should College Degree Be A High School - 1841 Words

College Degrees Just a few decades ago, having a high school education was considered a luxury and sometimes an unnecessary amount of education for some individuals. Once the amount of students attending high school rose, college seemed to be the next best course of action, however it still was not something that became absolutely necessary in our economy up until this decade. The amount of college graduates has risen, yet the number of students either dropping out of college or not even considering it at all is still high. However, with the recent recession, wages falling, and the number of adults being fired from their jobs, graduating from college and getting a degree has become almost necessary in order for any adult to not have†¦show more content†¦With our economy it seems as if no one wins in the end as the wages for everyone fall and the expenses of college rise, but the reason that degree owners have a more stable future is because â€Å"the fate of workers with le ss than a college education is deteriorating even more rapidly than the fate of their college educated peers† (Kurtz). Still, even if the wages for workers of all kinds are dropping, they are dropping at a higher rate for adults who have jobs without a college degree and workers who do have college degree s, whether it be doctorate s, master s, bachelor s, or even associate s, still earn around 75 percent more than highs school graduates (Kurtz). Within the next few years the demand for workers with college degrees is expected to only increase which will make it much harder for individuals with a high school diploma to find and maintain jobs that will pay enough to support their expenses (Azziz). Along with that, â€Å"over the next decade, jobs requiring at least an [associate s] degree are projected to grow twice as fast as jobs requiring no college experience† (Cauthen). A college education has now become almost necessary in order to get at least a decent job (Cauthe n) which means â€Å"a college degree has become the new high school diploma – the bare minimal credential for entry into the workforce† (Snyder 31). Despite the recession affecting most adults with jobs,

Tuesday, May 5, 2020

Signal Processing and Computing Technologies †MyAssignmenthelp.com

Question: Discuss about the Signal Processing and Computing Technologies. Answer: Introduction: The increased use of different online services has presented a need to improve a secure system. The system be designed in such a way that it would be able to authenticate and validate the authorized user. In the recent times, several schemes of user authentication have been developed. Various methods of authentication such as token based, biometric based and knowledge based have been developed. The text-based system of passwords has been the major method of security medium over the years. Although the text based system of verification has been the base of authentication for several years, yet it has faced some drawbacks in the present times. The report discusses on the various attacks that are attempted to crack the systems. There are several attacks on the text based password method and graphical password techniques. The different kinds of attacks that are faced are brute force attack, dictionary attacks, guessing, spyware attacks, social engineering and shoulder surfing. The report provides a brief insight on these various kinds of attacks and the way in which they are imposed. This report focusses on a latest technique of the authentication of the user, which would be based on using a numeric scheme of One Time Password (OTP). This new method of authentication has been widely adopted by the government sector, banks and corporate sector based virtual private networks (VPNs) so as to diminish the effects of the compromise of the password. It also discusses a proposed algorithm model, which could be used in order to implement the newer technique of this user authentication scheme management. Advantages and Disadvantages of One Time Password Scheme This paper focusses on the new technique for authentication of a user, which may be implemented in the new IT systems. The research paper discusses about the various previously used methods of the authentication of the user This paper discusses about the various possible attacks that could be imposed on text based password schemes and techniques of graphical passwords. The paper also focusses on the newest technique of verification and also provides an insight of a proposed algorithm of one time password based scheme. The disadvantages of this research paper are: The research paper has lacked to describe the various possibilities of attacks that could be imposed by attackers on OTP based schemes. This paper also lacks the various mitigation strategies, which should be applied on OTP based schemes in order to avoid such vulnerable attacks on the system of the users. The paper discusses about the various tolerable attacks on text based systems but it fails to describe about their various mitigation schemes. Based on the different sections of the research paper, it can be concluded that the new feature of one time password scheme would be a great step towards the authentication of the users who would use any IT systems. The feature described in the research paper would be able to authenticate the user and thus provide a better insight for the betterment of the security technologies. Bibliography Gurav, S.M., Gawade, L.S., Rane, P.K. and Khochare, N.R., 2014, January. Graphical password authentication: Cloud securing scheme. InElectronic Systems, Signal Processing and Computing Technologies (ICESC), 2014 International Conference on(pp. 479-483). IEEE. Huang, Y., Huang, Z., Zhao, H. and Lai, X., 2013. A new one-time password method.IERI Procedia,4, pp.32-37. Ma, Y., Feng, J., Kumin, L. and Lazar, J., 2013. Investigating user behavior for authentication methods: a comparison between individuals with down syndrome and neurotypical users.ACM Transactions on Accessible Computing (TACCESS),4(4), p.15. Yassin, A.A., Jin, H., Ibrahim, A., Qiang, W. and Zou, D., 2013. Cloud authentication based on anonymous one-time password. InUbiquitous Information Technologies and Applications(pp. 423-431). Springer, Dordrecht.