Sunday, May 24, 2020

Common Ground Same Sex Marriage - 956 Words

Common Ground: Same-Sex Marriage Same-sex marriage, a controversial social issue in the U.S. for several decades, is constantly evolving. When viewed historically, great change has happened in a short period of time, in the movement for same-sex marriage, given that until recently, no society in thousands of years has ever allowed it. Futurist John Naisbitt, author of Megatrends, has studied the change in the public’s perspective on gay marriage. Naisbitt asserts: â€Å"In just my lifetime, we have gone from a taboo to even talk about homosexuality, to the sanction by governments of homosexual marriage. Few such large social considerations have ever before been turned over in such a short time† (Naisbitt). A metamorphosis in how the American judicial system perceives same-sex marriage, has developed over the past forty years. In October, 1971, the Supreme Court ruled that: The institution of marriage as a union of man and woman, uniquely involving the procreation and rearing of children within a family, is as old as the book of Genesis.† Just 43 years later, on October 6, 2014, the Supreme Court turned down appeals from states where gay marriage bans have been overturned, bringing the number of states supporting legal same-sex marriage to thirty-five. Only fifteen states remain with bans against same-sex marriage as of the writing of this essay (ProCon.org). In the state of Washington, gay marriage was legalized on December 9, 2012, by popular vote (La Corte).Show MoreRelatedEssay about Should Same-Sex Marriage Be Legalized? 1555 Words   |  7 PagesShould same-sex marriage be legalized? The same-sex marriage issue has ignited worldwide. Joseph Chamie- the previous director- and Barry Mirkin-the previous Population Policy Section Chief- of the UN’s Population Division aim to present up-to-date statistics and information on the same-sex marriage debate in â€Å"Same-Sex Marriage: A New Social Phenomenon.† They mention that same-sex marriage is a â€Å"recent phenomenon† that will possibly stick around for years in many countries because societal, religiousRead MoreSame Sex Marriage Debate785 Words   |  4 Pages The gay marriage debate is complex, to say the least. Bitter, emotional, and controversial are just a few words that can be used to describe it. In 2004, Massachusetts became the first state to legalize same sex marriage; since then twelve states have approved gay marriage (Shapiro). Even though some states have decided to legalize same sex marriage others are standing firm on constitutional amendments that ban it. Deciding whether or not gay couples should be allowed to marry is drawing passionRead MoreMarriage Benefits vs. Civil Union Benefits What is the difference between marriage and civil700 Words   |  3 PagesMarriage Benefits vs. Civil Union Benefits What is the difference between marriage and civil unions? There are many differences, mostly consisting of the benefits that married couples get that couples in civil unions do not receive. Marriage is different for homosexual and heterosexual couples. Even when homosexuals are married they do not receive the same benefits as heterosexual married couples. What if couples in a civil union could have the same benefits as a married couple? When heterosexualRead MoreMarriage Is The Voluntary Union Of One Man And One Woman1662 Words   |  7 Pagesâ€Å"Marriage is the voluntary union of one man and one woman†, which has been recognised by law and ceremony essentially in every society for centuries. However, throughout history marriages have taken many dissimilar forms. The Marriage (Same Sex Couples) Act 2013 was passed by Parliament which introduced civil marriage for same-sex couples in England and Wales. The legislation authorised religious institutions to be able to marry same-sex couples at their discretion, safeguarding religious institutionsRead MoreGay Marriage Should Be Legal966 Words   |  4 PagesGay marriage is one of the most debated and controversial issues in today’s society. Everyone has his or her opinions on gay marriage, whether it is acceptable or should not be allowed. According to The Washington post, â€Å"59 percent say they support same-sex marriage while 34 percent are opposed†(Craighil, P., Clement). While 59% of the supporting gay is a high number, however that number is skewed. There is a difference between tolerance and acceptance, but the 59% is the total of the both. PeopleRead MoreA Comparative Analysis of American and Kenyan Cultures790 Words   |  3 PagesSex and Marriage, Money and Success: A Comparative Analysis of American and Kenyan Cultures In the history of human societies, geographic differences are considered to be a factor that led to different lifestyles, values and beliefs that prevailed and have been the distinct characteristic of specific societies in the world today. From a broader viewpoint, it can be said that Asian cultures differ from North American, European, South American, and African cultures. However, it can also be said thatRead MoreThe Argument Against Gay Marriges1237 Words   |  5 PagesMuslims share two fundamental antigay arguments. The first is that homosexuality is wrong because it involves sex that doesn t create life. In the case of Judaism, a key Bible passage is the story of Onan (Links to an external site.), who sleeps with his dead brother s wife but, to avoid giving his brother offspring, doesn t ejaculate inside her. Instead, he spilt the seed on the ground. God slew him, which some might view as a sign of disapproval (Links to an external site.).The Catholic catechismRead MoreConscie ntious Objections to Same-Sex Marriage1460 Words   |  6 PagesResearch Topic: Conscientious Objections to Same-Sex Marriage: A Comparative Research Study of Scotland in United Kingdom and State of New York City in United States of America Part A: Methods of Research: The research on conscientious objection to same-sex marriage was carried out using mostly primary sources such as Scotland and State of New York Laws, this include constitution and laws enacted by the New York State Assembly and Scottish Parliament. Also past cases and accompanying judicialRead MorePolicy Advice Memorandum: Equality of Marriage1326 Words   |  5 PagesEquality of Marriage Issue: It is becoming increasingly difficult to defend the Defense of Marriage Act (DOMA). One of the Republican congresspersons who helped write the act is currently opposing it. In Lehmans words, many Republicans believe its only a matter of time until DOMA is repealed, (cited by Bendery, 2012, p. 2). Therefore, it would be wise for the president to take an affirmative, and firm, stances in favor of legislation that expressly and unequivocally supports marriage equalityRead MoreThe Canada And The Gay Rights Movement1003 Words   |  5 Pagesage of consent for anal sex from 18 and 14 for other sexual activity and it was recognized that a higher age for consent of anal sex was unconstitutional (BC Teachers’ Federation, 2016). Since then there have been many changes to the political and social system in Canada to be able to improve the rights not only individuals whom are part of the LGBTQ community, but also for those whom are in same sex relationships (BC Teachers’ Fe deration, 2016). As of 2005, same-sex marriage was legalized in Canada;

Wednesday, May 13, 2020

Biology Lesson Plan Eukaryotes and Prokaryotes - 663 Words

A Semi-Detailed Lesson Plan in BIOLOGY Date: January 22, 2013 Time: 7:30-8:30 Section: BSEd-2B I. Objective(s) At the end of the 60-minute period, at least 75% of the student’s should be able to: 1. Differentiate prokaryotic from eukaryotic cells. II. Subject Matter a. Topic: Prokaryotes and Eukaryotes b. References: b.1. Department of Education. 2002. Operations Handbook in Biology: 2002 Basic Education Curriculum Secondary Level. II. 1. 1.4. b.2. Department of Education. 2009. Science and Technology Biology Textbook. Book Media Press, Inc.: Quezon City. Page 29. b.3. Bernardo, Ma. Elena and Cruz, Vanice.2005. Hands and Minds on Activities for Biology II. Innovative Educational Materials, Inc.: Manila.†¦show more content†¦We call this a membrane. Thus, a â€Å"distinct, membrane-bounded organelle† is simply a structure within a cell that performs a specific task. Prokaryotic cells do not contain these internal structures. Nevertheless, they still can perform all of the necessary functions of life. e. Teaching Strategy(s): Identifying Similarities and Differences via Comparison Matrix III. Procedure Students will be grouped into two and given a microscope. Each group will be given two different prepared slides, one of which will be a prokaryotic cell and another of a eukaryotic cell. Each group will work together to point out and draw different parts of the cell that they see for each cell. In case the images beneath the microscope are difficult to see, each group will also be given a picture of a prokaryotic and eukaryotic cell. Each group will be tasked to list down the differences between the two images. We will discuss the two different cells PROKARYOTES | EUKARYOTES | No nucleus | With nucleus | No membrane-enclosed organelles | With membrane-enclosed organelles | Have one chromosome | Have chromosome in pairs | Have no cellulose in cell walls | Have cellulose in cell walls | Have smaller ribosomes | Have larger ribosomes | No movement of cellular materials within the cell | Cellular materials often appears to move (streaming) within the cell | Have simpleShow MoreRelat edThemes in the Study of Life5755 Words   |  24 PagesOverview: Inquiring About Life †¢ Organisms are adapted to the environments they live in. †¢ These adaptations are the result of evolution, the fundamental organizing principle of biology and the core theme of this book. †¢ Posing questions about the living world and seeking science-based answers are the central activities of biology, the scientific study of life. †¢ Biologists ask a wide variety of ambitious questions. ââ€"‹ They may ask how a single cell becomes a tree or a dog, how the human mind works

Wednesday, May 6, 2020

School Curriculum Free Essays

Language is the organized speech used as our means of communication. It is a differentiated system as used by a section of human race. A second language is learned after the mother tongue. We will write a custom essay sample on School Curriculum or any similar topic only for you Order Now It is an advantage to speak several languages since we are associated to multi-cultural environment, a preparation to orientation and exposure to variety of languages in the workplace. A second language contributes to the preservation of different cultural identity within a unified society and the medium of instruction of worldwide scope in education, business and different professions. Studies show that bilingual children score higher on standardized tests than those who speak only one language. In fact, students who have studied a foreign or second language for four or more years scored higher than students who had studied other subject for the same number of years. Finally, students who have studied four years of foreign or second language scored higher in mathematics than students who had taken four years of Math (Cook 45). Acquiring fluency and eloquence of a second language must be done in several yet systematic stages. The basis of language such as sound, vocabulary, grammar, enunciation and so on must be rigidly developed. There must be a learning situation which is generally applicable to learners of different first language backgrounds. The ideal time to start teaching is in childhood wherein a child can learn up to five different languages if a child is commonly exposed to this, commonly the language used in the household regularly. Children and adolescents respond more readily by means of cognitive and academic approaches. So each age range would seem to have pros and cons with regards to language learning. If on educational, political and philosophical grounds children are to be introduced to second languages based on psychological needs, it cannot be the only consideration. Age is not certainly the individual factor in language learning. Cognitive factors, style, personality, attitudes and motivation play a vital role in this complex question of second language learning. Correction of grammatical and enunciation errors does not have a direct influence on learning a second language. However instruction may affect the rate of learning but will undergo the same stages. Children and adolescents who know the systematic way of learning the second language comprehends faster than those who do not (White 354-356). Learners of the second language have knowledge that goes beyond the input they received in other words the whole is greater than the parts. Learners are able to construct utterances of phrases, sentences and questions that they have never seen or heard before. Furthermore children and adolescents who have limited input still acquire the first rather than the second language. Bilingual education should be repaired not replaced. It helps provide long periods of total English immersion as well as opportunities to interact with native speakers. There are several teaching methods that will help primary and secondary students learn a second language. The immersion training of which where regular hours are spent in schools in studying the language, taking a distinct language subject, the grammar translation method and the direct method. In the grammar translation a method student are instructed in grammar and are provided vocabulary with direct translations to memorize and was predominant in Europe in the 19th century. Today most instructors acknowledge the infectivity of the method itself and for written languages also. The teaching of grammar consists of a process of training in the rules of a language which must make it possible to the students to correctly express their opinion, to understand the remarks which are addressed to them and to analyze the text which they read. The objective is that after primary and secondary, the pupil controls the tool of the language which are the vocabulary, grammar and the orthography. By this time a pupil can be able to read, understand and texts in various contexts (Mangubhai 156-158). The teaching of grammar examines the texts and has developed the awareness of language constitutes a system which can be analyzed. This knowledge is acquired gradually by traversing facts of language syntactic mechanism, going from simplicity to complexity. The teacher is supposed to correct the exercises so that the pupil can follow his progress in practicing the language through comparison of results. The direct method, sometimes also called natural method, is a method that refrains from using the learners’ native language and just uses the target language. It was established in Germany and France around 1900. The direct method operates on the idea that second language learning must be an imitation of first language learning, as this is the natural way humans learn any language – a child never relies on another language to learn its first language, and thus the mother tongue is not necessary to learn a foreign language. This method places great stress on correct pronunciation and the target language from outset. It advocates teaching of oral skills at the expense of every traditional aim of language teaching. According to this method, printed language and text must be kept away from second language learner for as long as possible, just as a first language learner does not use printed word until he has good grasp of speech. Learning of writing and spelling should be delayed until after the printed word has been introduced, and grammar and translation should also be avoided because this would involve the application of the learner’s first language. All above items must be avoided because they hinder the acquisition of a good oral proficiency. India with its huge population and apparent new boom for English learning as mentioned by Gupta (12-18) is also a large beacon of English learning. Just these two countries alone and their appetites for English education give us a new sense of the increased diversity of language ownership; something Phan Le Ha (456-458) touches on in her article on the internationalization of the language and non-natives increasing critical role in teaching, development and learning. It signals the reality that those learning English will be significantly entered around or originating from Asia. Therefore educators need evermore to recognize the importance and distinctive context based needs of those requiring education in English outside the traditional native speaker contexts. This is not inherently contradictory with those with persistent arguments that many general principles of acquisition should be understood and appropriately applied by educators within their distinctive classroom settings and communities. Chew (144-149) in her article on reviewing the evolution of syllabi in Singaporean English education, indicates that the single centred approach to a syllabus may be ebbing, increasingly substituted by a more eclectic one. Whether this experience will be replicated in other countries in the region, may be difficult to exactly say. It may be that we are in a period of the â€Å"end of methods†. But like others in different social sciences who harkened the end of ideology, it may be more prudent to view change as largely evolutionary with recurring ebbs and flows depending upon the current contextual streams of challenges. However, the attractiveness of task based learning relates not only to the enumerated benefits. It provides rather a useful practice that that can be applied across many approaches, as well as boundaries. Task based learning may provide an enduring legacy that meets the test of time. It may also provide a curricular and syllabus framework of flexibility that logically students and teachers will be drawn to even if it need not be the central leitmotif for certain places. For example, tasks could include, completing a grammar bingo game after a contrastive analysis, grammar-translation based presentation. Subsequently, task based communicative teaching practices could be supported to incorporate the appropriate grammar into developing two way oral skills through an interview exercise. Again, the task approach does not deny that in some Asian classes -or anywhere in the world for that matter- that certain traditional approaches need to have their day. Rather it is especially supportive of an integrated approach, or even where the needs of the learner may be solely communicative. However, again task selection and development is the key to better ensure specific needs are met. In doing this, the educator needs to be conscious of principles and aspects of acquisition. In this respect Ellis (203-206) has so well summarized here with authority and clarity the general understanding in the profession on instructed language learning. We are further faced with the fact that the true task of learning a second language in the many EFL environments that Asian learners find themselves are removed from a lot of ‘naturalistic†, non-classroom, English speaking settings. Such an understanding of these realities and the principles that surround realistic classroom learning can be of service to classroom teachers wondering what methods, approaches and practices to choose at a specific time. It reminds us of the value of the extensive reading programmes to which Helgesen (514-516) alludes can be so useful for Asian learners where they are limited in their accessibility to communicative English in a natural environment. Teachers in such contexts may need to be reminded, at times to extend the task work outside the classroom with proper direction that permits students to develop independent learning skills that facilitate students to do the extensive work necessary to gain fluency. In cultures where top down approaches are in the main, instructors be they native teachers or not, need to be cognizant of these realities and limitations. We can not simply, for example, put all learners on the Internet or through CALL, clap our hands and say â€Å"go to it†. Again learning context, as related to acquisition can be highly relevant, which Ellis (256-258) would seem to imply. The process of language learning can be very stressful, and the impact of positive or negative attitudes from the surrounding society can be critical. One aspect that has received particular attention is the relationship of gender roles to language achievement. Studies across numerous cultures have shown that women, on the whole, enjoy an advantage over men. Some have proposed that this is linked to gender roles. Doman (511-512) notes in a journal devoted to issues of Cultural affects on SLA, â€Å"Questions abound about what defines SLA, how far its borders extend, and what the attributions and contributions of its research are. Thus, there is a great amount of heterogeneity in the entire conceptualization of SLA. Some researchers tend to ignore certain aspects of the field, while others scrutinize those same aspects piece by piece. â€Å"Community attitudes toward the language being learned can also have a profound impact on SLA. Where the community has a broadly negative view of the target language and its speakers, or a negative view of its relation to them, learning is typically much more difficult. This finding has been confirmed by research in numerous contexts. A widely-cited example is the difficulty faced by Navajo children in learning English as a second language. How to cite School Curriculum, Papers

Monday, May 4, 2020

Data Encryption Standards For Wimax Samples †MyAssignmenthelp.com

Question: Discuss about the Data Encryption Standards For Wimax. Answer: Comparison of data encryption standards for WiMAX WiMAX or Worldwide Interoperability for Microwave Access is a coalition of the wireless industry for the advancement of IEEE 802.16 standards for broadband wireless access (BWA) networks. WiMAX (Pareit et al., 2012) is commonly known as 4G network and is a wireless wide area network (WAN) that can cover the area same as DSL lines but without wires. 3DES (Data Encryption Standard) (Singh, 2013) and AES (Advanced encryption standard) (Ahmad Ismail, 2016) is used by WiMAX to encrypt the data transferred on the network. The 3DES uses three different keys to encrypt the data. Each data is of the length of 56-bits each. In some softwares the performance becomes slow due to the use of this three keys. The 3DES is becoming obsolete due to its slow performance and the limit of length of the keys. Advanced Encryption Standard (Rewagad Pawar, 2013) is the main tool used for encryption in WiMAX technology. Encryption key of 128-bit, 192-bit and 256-bit is supported by the advanced encryption s tandard. AES is a popular algorithm which was built from CCMP. 3DES is much slower than AES. Advanced Encryption standard is much more easy to implement and a very little memory is used. However, AES does not require dedicated processors on board the BS, and m their might be a risk of not being used by all end-user terminals. Initially this helps in considering the fact that 3DES still remains a vital encryption tool on the WiMAX (Dadhich, Narang Yadav 2012) network in spite of the presence of advanced encryption standard. Security challenges faced by WAPN technology: The most common WAPN technology are the Bluetooth and the ZigBee network. Both this technology faces the same difficulty as that of the security issues faced by the wireless technology. Security challenges faced by Bluetooth technology are listed below: Eavesdropping This is a process by which an attacker can sniff into the air of Bluetooth transmission and exploit the right vulnerabilities, read or listen to the data (Saliou et al.). That means someone is conversing using a Bluetooth headset then someone can potentially listen to it. Bluesnarfing This is a process in which an attacker can pair to a device and once devices are paired, access and steal information from the Bluetooth device becomes very easy. The pairing is usually done without the knowledge of the user, which possiblyresults in stolen contact information, photos, videos, calendar events, and more (Ketari Khanum, 2012). Blue bugging- An attacker caneasily remote control the various aspects of the users device. Sending of outgoing calls and texts, forwarding of incoming calls and texts, change of settings, and watching of screens and keypresses and many other things (Rawat Bhattacharya, 2016). Denial of servicein this process an attacker can put unwanted stuffs in the users device, block the communications, drain the battery of the device, or even crashes the device. Security challenges faced by ZigBee technology: Sniffing: there are many networks which do not use proper encryption as a result the attackers take advantage to sniff all the communications with the proper use equipments. in this attack all the information from a network is collected, which is possible in a network which implements the standard generic security level protocols for communication (Olawumi et al., 2014). Replay attack: Recording of the approved traffic on a network by the attacker is done in this type of attack and paly it later which causes a malicious effect. This attacks are straight forward for ZigBees which do not implement a do not implement any encryption for the communication (Vidgren et al., 2013). Physical Attacks: This attacks are most common which involves the interfering of ZigBee devices by locating it. Hard coded encryption keys which are loaded in the RAM are often employed by radios operating in the ZigBee network once the device is powered.as the devices in the network are disturbed and flashed so there remains a possibility of replacing the keys becomes less and having known the issues the attackers can set up special serial interfaces in order to intercept the encryption key in the ZigBee device when the power rises from flash to RAM (Ramsey, Mullins White, 2012). Denial of Service-This is an another method along with the one mentioned above which makes the ZigBee network unsafe. Signal jamming, reflexive jamming, maximization of frame counter are some other problems faced by the network (Bahl, Sharma Verma, 2012). Paper Review: Energy Harvesting Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016): 1041-1054. This article discusses about the energy harvesting techniques used in daily lives. Harvesting of energy is one of the emerging technology related to applications on indoor and outdoor environment. The demands for energy harvesting as increasing with the advancement of microelectronics and MEMS. This rep article also discusses about the problems and applications of energy harvesting. This has gained the attention of various stallholders which involves designs and implementation of this technology to face the energy demands of future wireless sensor networks. Moreover, this article focuses on the techniques required to meet the future energy demands of the WSNs. Specifically, this focuses on the classifications of the schemes used on energy harvesting techniques in WSNs. The article has thoroughly reviewed the classes and sub classes of energy harvesting techniques and the harvester mechanism along with the efficiency of the harvester. For each category the harvester hardware system ha s different design and has different harvesting capabilities. The different designs of the harvester determine the efficiency of the harvester. A survey has been conducted on various models aimed to predict the future energy cycles. The survey has proved that only few predictions technique has been used still far to in the area of modeling which states that the state-of-the-art is still immature. Addressing of several open research challenges still need to be done in the future which includes the need to focus on the miniaturized generic harvesters. This can later be used in different environments with energy sources that are dynamic. Major reason for deploying energy harvesting technique is due to the major problem faced by WSN regarding energy. In cases if the energy the sensor nodes depletes then the role is no longer played, unless and until a new source of energy is used or no other harvesting technique hasnt been introduced to fulfill the energy gap. Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381. 4. This article summarizes the application of energy harvesting in a broad area of wireless communication network. This article has covered a variety of topics which includes the information-theoretical and physical layer of performance limit to the scheduling policies and medium access control protocol. This article also discusses about the emerging model of energy transfer and cooperation that occurs with the information transfer of the wireless network. The article has also presented a model of total energy consumption. The threats faced by energy harvesting from physical and practical concerns has made this technique face new challenges. Taking practical conditions mathematical formulas are designed which increases the set of possibilities. The discussion of the energy and information transfer provides exciting possibilities that can be adapted in the future to adapt the network operations with improved performance. References: Ahmad, R., Ismail, W. (2016). Performance Comparison of Advanced Encryption Standard-128 Algorithms for WIMAX Application with Improved Power-Throughput.Journal of Engineering Science and Technology,11(12), 1-17. Bahl, N., Sharma, A. K., Verma, H. K. (2012). On Denial of Service Attacks for Wireless Sensor Networks.SYSTEM,17, 18. Dadhich, R., Narang, G., Yadav, D. M. (2012). Analysis and Literature Review of IEEE 802.16 e (Mobile WiMAX) Security.International Journal of Engineering and Advanced Technology,1, 167-173. Ketari, L., Khanum, M. A. (2012). A review of malicious code detection techniques for mobile devices.International Journal of Computer Theory and Engineering,4(2), 212. Olawumi, O., Haataja, K., Asikainen, M., Vidgren, N., Toivanen, P. (2014, December). Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned. InHybrid Intelligent Systems (HIS), 2014 14th International Conference on(pp. 199-206). IEEE. Pareit, D., Lannoo, B., Moerman, I., Demeester, P. (2012). The History of WiMAX: A Complete Survey of the Evolution in Certification and Standardization for IEEE 802.16 and WiMAX.IEEE Communications Surveys and Tutorials,14(4), 1183-1211. Ramsey, B. W., Mullins, B. E., White, E. D. (2012, October). Improved tools for indoor ZigBee warwalking. InLocal Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on(pp. 921-924). IEEE. Rawat, D. B., Bhattacharya, S. (2016). Wireless Body Area Network for Healthcare Applications. InAdvanced Methods for Complex Network Analysis(pp. 343-358). IGI Global. Rewagad, P., Pawar, Y. (2013, April). Use of digital signature with diffie hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. InCommunication Systems and Network Technologies (CSNT), 2013 International Conference on(pp. 437-439). IEEE. Saliou, D. A., Al-Khateeb, W. F. M., Olanrewaju, R. F., Fatai, S. Dual Authentication For Bluetooth Connection. Shaikh, F. K., Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A comprehensive review.Renewable and Sustainable Energy Reviews,55, 1041-1054. Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security.International Journal of Computer Applications,67(19). Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., Huang, K. (2015). Energy harvesting wireless communications: A review of recent advances.IEEE Journal on Selected Areas in Communications,33(3), 360-381. Vidgren, N., Haataja, K., Patino-Andres, J. L., Ramirez-Sanchis, J. J., Toivanen, P. (2013, January). Security threats in ZigBee-enabled systems: vulnerability evaluation, practical experiments, countermeasures, and lessons learned. InSystem Sciences (HICSS), 2013 46th Hawaii International Conference on(pp. 5132-5138). IEEE.