Monday, December 30, 2019
Sunday, December 22, 2019
Life of a Vietnam Soldier - 582 Words
Wars are fought for freedom and independence and usually when soldiers come home we receive them with open arms ready to praise them and thank them for putting their lives on the line. If you were asked to describe a soldier, youââ¬â¢d probably say heroic, brave, courageous, or honorable. After the Vietnam War, parades werenââ¬â¢t the welcoming soldiers got; instead, they were shunned and booed at. Peopleââ¬â¢s opinion on the war was greatly influenced by the media. During the Vietnam War, the horrors that were happening on the battlefield were shown to Americans in their living rooms. There was no censorship meaning Americans back home saw dead bodies, Vietnamese children being shot and villages being burnt, all done by American Soldiers. Watching children, babies and old people being killed caused people to label soldiers as murderers and baby killers. Before Vietnam, soldiers had always been shown in a heroic way. But now, reporters would show only parts of a story, the parts that made soldiers look bad. In the Vietnam War, reporters could literally follow soldiers onto the battle fields and show it on television. Also, most photographers were interested in showing the bad aspects of the war such as the remaining destroyed village of Vietnamese or the suffering of soldiers. The media built stereotypes of soldiers at war as part of anti- war protests so photographers would show the parts that benefited anti-war protests and captured only half the story in his photograph. ForShow MoreRelated Sweetheart of the Song of Tra Bong as Metaphor Essay1150 Words à |à 5 PagesSweetheart of the Song of Tra Bong as Metaphorà à The Vietnam War is a strange and unexplainable event in American history. The controversies surrounding the American involvement in Vietnam and the need for Vietnam veterans to tell their stories of the war are prevalent in the post-Vietnam culture of America. The stories that will last forever are those that swirl back and forth across the border between trivia and bedlam, the mad and the mundane(89). The story of the sweetheart of the SongRead MoreThe Vietnam War, Grandpas Story1281 Words à |à 6 Pagesââ¬Å"The Vietnam war was a costly and very long conflict that eroded the communist regime of North Vietnam and its allies against the South Vietnam and its ally, us the United States of America (Unknown Source).â⬠The Vietnam War began on the eve of 1959, causing a struggle between two of our major national forces. These two forces were attempting to unify the country the both love, Vietnam. Many of the young souls were young men, such as my grandfather who felt that they were helping their country.Read MoreThe Impact of the Vietnam War on Veterans Essay966 Words à |à 4 PagesHow did a Vietnam soldiers life change during and after the war. Society had a lot of different views regarding the soldiers and the war. When coming home veterans faced many distinct challenges. The Vietnam Veterans Memorial helped to heal the nation. The Vietnam War had a major impact on the United States and the soldiers who fought in it. The Vietnam War was a violent and costly war that needed many men to fight for its cause. These men are now known as the Vietnam veterans. Numerous veteransRead MoreThe Things They Carried By Tim O Brien899 Words à |à 4 PagesDuring the Vietnam War, a range of emotions occurred within every soldier. Even though some veterans can move past their memories of war, many soldiers became haunted by their dark memories. In Tim Oââ¬â¢Brienââ¬â¢s fictional novel The Things They Carried, Oââ¬â¢Brien takes his readers through several different events and emotions that occurs to his character during the Vietnam War. Although his character sometimes faces a tough time telling the story, Oââ¬â¢Brien manages to inform his readers of the differentRead MoreThe Things They Carried By Tim O Brien1459 Words à |à 6 Pages1950ââ¬â¢s, the Vietnam War turned to be the modern pinnacle for battles resulting in the deaths of 58,000 American soldiers and millions of Vietnamese death. I t saw the viable destruction of modern technology such as the newly fashioned M-16 rifle and the Apache, a helicopter made for mass destruction. For the soldiers experiencing Vietnam, it was truly an experience which would shape their hearts and minds forever. As evidenced in Tim Oââ¬â¢ Brienââ¬â¢s The Things They Carried, The Vietnam War was an emotionalRead MoreThe Vietnam War Was A Long And Bloody1502 Words à |à 7 Pages The Vietnam War was a long and bloody one. The war began on November 1, 1955 and ended on April 30, 1975. The war lasted nearly 20 years. Over this period, 9,087,000 men from United States were deployed, 58,220 were killed and more than 300,000 were wounded. The war also killed an estimated 2 million Vietnamese civilians, 1.1 million North Vietnamese troops, and 200,000 South Vietnamese troops. The Vietnam War was the first war America ever lost and this lost would lead to a heavy impact on theRead MoreWar in Films: Universal Soldier1320 Words à |à 6 Pagesagainst the Vietnam War made their views known by many forms of protesting such as forming organizations, rallying, and anti-war protest music. Anti-war protest music was an opportunity to put peopleââ¬â¢s perspectives into song to hopefully spread their message. Buffy Sainte-Marie wrote the song ââ¬Å"Universal Soldierâ⬠in 1962 and her message was that ââ¬Å"Universal Soldier is about individual responsibility for w ar and how the old feudal thinking kills us allâ⬠(Boulanger). The song ââ¬Å"Universal Soldierâ⬠was usedRead MoreThe Effect of Vietnam War on the Soldiers1679 Words à |à 7 Pages The Vietnam War was the longest and the most unpopular American war of the twentieth century. The United States was involve in the Vietnam from 1944 to 1973, but it was only during the last years that the U.S deployed ground troops (Lawrence 1). For the first time the United states was the aggressor. Vietnam is situated thousands of miles from the United States, so Vietnam was not a direct threat to the United Statesââ¬â¢ safety. The Vietnam leader Ho Chi Minh seem to look up to the United States,Read MoreA Compare and Contrast Analysis of Experiences in the Iraq and Vietnam Wars832 Words à |à 4 Pages COMPARE AND CONTRAST EXPERIENCES OF IRAQ VIETNAM: Thousands were killed, and many more were wounded in the Vietnam war, a war that many are to this day still living with the consequences. The Things They Carried, written by William Timothy OBrien. The story takes place in Vietnam, during the war, sometime in the 1960s. First Lieutenant Jimmy Cross, and his unit are in Vietnam serving for the United States. Jimmy, is in love with a college woman named Martha from back home. Martha writes JimmyRead MoreReality of the Vietnam War843 Words à |à 4 Pagesof the Vietnam War During the Vietnam War the reality of warfare brought many soldiers back to a home that didnt want them. Their feelings torn by atrocities, the loss of friends, and the condition of loneliness only made the experience worse. Did the issues on the home front affect the issues on the frontline? The novel Fallen Angels by Walter Dean Myers is a perfect example of the conflict and diversity among other soldiers during the Vietnam War. It shows the reality many soldiers faced and
Saturday, December 14, 2019
My Trip Free Essays
If I have a lot of money, I will spend it by travelling around the world in 10 days with my friends. The country that I plan visit is Australia,Japan,Canada, Singapore. The purpose of this trip is to enjoy and relax our mind. We will write a custom essay sample on My Trip or any similar topic only for you Order Now The first day,I wake up at 7 oââ¬â¢clock in the morning and meet my friend at the KLIA at 8 oââ¬â¢clock. Our flight will be depart at 11 oââ¬â¢clock. We took the plane for 9 hour and finally arrive at the Melbourne Airport, Australia at midnight. After that we search for the hotel that we have booked named Melbourne Hotel get some rest for the day. The next day we will go to state capital of New South Wales, Sydney. One of the famous place you have to visit in Sydney is the Sydney Opera House. There they got 1000 rooms, 300 corridors and hundreds of tales and secrets. The next day weââ¬â¢ll go to the Art Gallery of New South Wales. the Gallery is one of Australiaââ¬â¢s leading museums of art and a Sydney institution, with five levels presenting a diverse range of art. And thatââ¬â¢s the end of the second day. The third day, weââ¬â¢ll take flight from Australia to Japan also for 9 hours. There we arrive at the Haneda Airport,Japan. After that we stayed at Hotel Metropolitan Tokyo. The third day, weââ¬â¢ll go to the Japanââ¬â¢s communications and observation tower,Tokyo Tower. The tower acts as a support structure for an antenna. Originally intended for television broadcasting, radio antennas were installed in 1961, but the tower is now used to broadcast signals for Japanese media outlets. The next day, we go to the Kaminari Gate in Asakusa, Tokyo. The Kaminari Gate was first built in 941 by Taira no Kinmasa a military commander. 2] It was originally located near Komagata, but it was reconstructed in its current location in 1635. The fifth day, we go to the Shinjuku for shopping because the Shinjuku is the center of this large district home to many malls, stores, restaurants. The sixth day, weââ¬â¢ll take flight from Japan to Canada for 10 hours and 50 mins. We arrive at the Montreal-Pierre Elliott Trudeau International Airport, Canada. We stayed at the Le Petit Hotel, Motreal and rest for the day. The next day, weââ¬â¢ll go to the Basilique Notre-Dame. This Catholic church has a stunning medieval-style interior that features walnut-wood arvings, exquisite stained-glass windows, 24-carat gold stars in a vaulted blue ceiling, as well as one of the largest Casavant organs in North America. The next day, weââ¬â¢ll go to the Mont (Mount) Royal. This 764-foot mountain provides excellent view of the city and is a popular recreation spot. The ninth day, weââ¬â¢ll take flight to Canada to Singapore about 16 hours and 30 mins. We stayed at the Marina Bay Sands. The next day we go to the Merlion Park. Merlion is a mythical creature with the head of a lion and the body of a fish, used as a mascot and national personification of Singapore. And the next day me go back to Malaysia How to cite My Trip, Papers
Friday, December 6, 2019
Spatiotemporal Dynamics Of Human Movement ââ¬Myassignmenthelp.Com
Question: Discuss About The Spatiotemporal Dynamics Of Human Movement? Answer: Introducation The technology known as the WiMAX, known as the Worldwide Interoperability for Microwave Access, is used to facilitate wireless connectivity among devices by using the IEEE 802.16 standard. The technology is used to command a wide ranges in connection by using the core principles of multiple input multiple outputs (MIMO) and orthogonal frequency division multiplexing (OFDM) techniques (Rengaraju, Lung and Srinivasan 2012). The less time for feasibility and the fewer requirements in cost is the main motivational need for the acceptance of this technology. The main encryption standards for these technologies are the DES, TripleDES and RC2. The Data Encryption Standard (DES) is termed as a symmetric key algorithm which is used for the encryption of the data. The main use of the technology is in the application of cryptography. The operational method of DES includes the transformation of a text bit of a specific length to a cipher bit text of the same length. The cipher block size is 64 bits. The method of encryption includes the presence of a key for decrypting the ciphered texts (Rengaraju, Lung and Srinivasan 2012). The symmetric key algorithm of the TripleDES is the same as that of the DES with the sole difference in its mode of operation. The application of encryption is usually done three times. The concept of this technology is used to cause an increase in the key size without applying any changes in the algorithms. This method uses two different keys (j, k) and applications of encryption are done by each of them (Kamali, Bennett and Cox 2012). As the two key methods are vulnerable to middle key threats and risks, the use for three keys is adopted to mitigate them. The RC2 algorithm is also termed as a symmetric key algorithm for encryption standards. However, the size of the key is 40 bits. The main developer of this standard is Ron Rivest. The size of the key is supposed to be variable (Kamali, Bennett and Cox 2012). The main specifications of the standards are the presence of 18 rounds where 16 of them are of one type and the remaining two are of another type. The two types are either MIXING or MASHING. Algorithm Developer Key size Block size Algorithm Rounds Compatibility to WiMAX DES IBM 56 bits 64 bits Feistel Network 16 Yes TripleDES IBM 112 bits 64 bits Feistel Network 48 Yes RC2 Ron Rivest 8-128 bits 64 bits Heavy source Feistel Network 18 Yes Table: Comparison between the three standards Personal area network (PAN) is basically used to connect among various devices present in the vicinity. The devices can range from computers to mobile devices with connectivity access. In addition, the devices can also be connected to the internet where one of them is used as the router for internet connections. As the technology is used to provide connectivity in the vicinity, the rage of connection is up to a few meters. This section discusses about the various PAN technologies namely the Bluetooth and the ZigBee. Bluetooth: The use of ultra high frequency (UHF) band is used to provide communication features accepting a short range in connectivity. The range used for communication is 2.4 GHZ and the modulation techniques used is the Gaussian Frequency shift keying (GFSK) and 8DPSK. Due to the advancement in technologies, the presence of various risks is evident in communicating with Bluetooth (Carpenter, Fowler Adler, 2012). These are default configuration of the device, loss or theft, person-in-the-middle, denial of service and service mapping. The default configuration is the presence of pre-installed configurations in the system which is already applied by the manufacturers during its development. Due to the complex nature of the configuration, people often neglect their reconfiguration. When the Bluetooth is in ON mode, the BD_ADDR and clock will be noticed by the other devices present in the vicinity of the user. This is the main problem where unethical attackers can get access to the systems to steal information. Loss or theft of information is another concern for risks in the systems. A Bluetooth device always stores the access keys of the other devices in their memory. In case a device falls into wrong hands, it can be used to get access to all the paired devices (Versichele et al. 2012). This is a main concern and the security implications are to be addressed. This can also be used to eavesdrop into the systems and steal information. The person-in-the-middle attack is also another security challenge of Bluetooth. Due to the advancements in technologies, attackers can get access to the private keys of devices in the vicinity. Their device can then be used to get access to the other devices in vicinity. The main mode of operation includes the mimicry of the attackers device to act like normal devices. When they try to establish connection to the other device, it is usually seemed to be a known device and thus connection is established. This is also another reason for unethical access and eavesdropping. The denial of service (DOS) attacks, are another risks of Bluetooth technologies. Although these attacks are not reported, it can be used to lock a user from accessing their devices. This implies that the device will not be able to do the normal operations. In addition, due to the presence of various home appliances in the system, the signal jamming is a common method for use against such devices. Moreover, the attacker may also try to drain out the battery of the device by sending constant requests to connect. The last method of attacking includes the service mapping techniques. In general, when a device has to connect, it sends out signals to connect to look for an open signal. This is mainly done by the service discovery protocol (SDP) which is the most universal method used by all devices (Versichele et al. 2012). This technique can be used to get the lists of devices in the vicinity and connect accordingly. However, for this attack to work, the attacker needs to stay close to the devices. ZigBee: ZigBee technologies have compliance to the IEEE 802.15.4 standards to facilitate small range connectivity. The main applications of these technologies are in home automations. The security implications of the ZigBee technologies are the absence of any security in physical access. In case a device is stolen, it can be used to get access to the home network (Rohitha et a., 2012). The technology mainly integrates the key in the physical hardware of the device which is used to get access. Thus, this is a big problem for the ZigBee network. The key attacks are other security implications of the technology. The technology uses two types of keys, the pre-shared keys and the over the air keys. Due to the lack of security measures and intruder detection in the IEEE 802.15.4 standard, access is easily acquisitioned. Energy harvesting in wireless sensor networks: The devices now-a-days need to utilize the various energy coefficients required for implementing the internet of things concept. As the presence of vulnerabilities and threats are increasing with each modernization trends, it is required for the devices to stay under working conditions for a long time (Energy harvesting in wireless sensor networks: A comprehensive review, 2017). The need for harvesting the surrounding energy is the main aim for an energy harnesser. In case when a certain node of a particular device goes offline, the work to be done is also removed. This creates a need for the devices to stay in working conditions for a long time. In addition, the provide source tells about the various sources for the energy harvesting. These sources are either natural or man-made. Moreover, the disadvantages of the systems are also considered in the document. The main considerations along with their installation, implementation of prototypes and compliance to the various standards or protocol are to be considered before commencing with the development of the technology required (Energy harvesting in wireless sensor networks: A comprehensive review, 2017). Furthermore, the journal concludes by showing the various advantages of the applied systems. Energy Harvesting Wireless Communications: A Review of Recent Advances The different contributions in the area of wireless communications are talked about in the journal. Along with this, the conceptual networks for implementing the connections as well as the resources needed and their compliance with the existing standards and policies are also included in the journal. In addition, the theoretical calculations for the process are also referenced in the provided journal (Energy Harvesting Wireless Communications: A Review of Recent Advances, 2017). In addition, the provide source tells about the various sources for energy harvesting which includes either natural or man-made sources. The main objectives of these advancements are their applications in the areas of medical science, environmental and safety related aspects. The summary of the theoretical recommendations are included in section 2 whereas the section 3 discusses the throughput optimization (Energy Harvesting Wireless Communications: A Review of Recent Advances, 2017). Moreover, the various co nsiderations to be taken care of are referenced in the next sections in a sequential order. References: Carpenter, C., Fowler, M. Adler, T., 2012. Generating route-specific origin-destination tables using Bluetooth technology.Transportation Research Record: Journal of the Transportation Research Board, (2308), pp.96-102. Energy harvesting in wireless sensor networks: A comprehensive review. (2017). [ebook] Faisal Karim Shaikh a,b,n , Sherali Zeadally c. Available at: https://1712033_1136814880_2016Energyharvestinginwireless.pdf [Accessed 22 Sep. 2017]. Energy Harvesting Wireless Communications: A Review of Recent Advances. (2017). [ebook] Available at: https://1712034_414472103_2015EnergyHarvestReview.pdf [Accessed 22 Sep. 2017]. Kamali, B., Bennett, R.A. Cox, D.C., 2012. Understanding WiMAX: An IEEE-802.16 standard-based wireless technology.IEEE Potentials,31(5), pp.23-27. Li, S.H., Cheng, K.A., Lu, W.H. Lin, T.C., 2012. Developing an active emergency medical service system based on WiMAX technology.Journal of medical systems,36(5), pp.3177-3193. More, S. Mishra, D.K., 2012, November. 4G revolution: WiMAX technology. InInternet (AH-ICI), 2012 Third Asian Himalayas International Conference on(pp. 1-4). IEEE. Olexandr, L. Sergiy, G., 2013, April. Slot allocation model and data burst scheduling in downlink WiMAX technology. InElectronics and Nanotechnology (ELNANO), 2013 IEEE XXXIII International Scientific Conference(pp. 455-459). IEEE. Rengaraju, P., Lung, C.H. Srinivasan, A., 2012, August. Communication requirements and analysis of distribution networks using WiMAX technology for smart grids. InWireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International(pp. 666-670). IEEE. Rohitha, P., Kumar, P.R., Adinarayana, N., Venkat, T. Narayana, R., 2012. Wireless networking through ZigBee technology.International Journal of Advanced Research in Computer Science and Software Engineering,2(7). Sergey, G. Abed, A.H., 2013, February. Slot allocation model and data burst scheduling in downlink WiMAX technology. InExperience of Designing and Application of CAD Systems in Microelectronics (CADSM), 2013 12th International Conference on the(pp. 97-100). IEEE. Talaviya, G., Ramteke, R. Shete, A.K., 2013. Wireless fingerprint based college attendance system using Zigbee technology.International Journal of Engineering and Advanced Technology (IJEAT) ISSN,2249, p.8958. Versichele, M., Neutens, T., Delafontaine, M. Van de Weghe, N., 2012. The use of Bluetooth for analysing spatiotemporal dynamics of human movement at mass events: A case study of the Ghent Festivities.Applied Geography,32(2), pp.208-220.
Subscribe to:
Posts (Atom)