Friday, November 29, 2019

From The Time I Was Nine Or Ten Years Old, I Have Had Many Adult Respo

From the time I was nine or ten years old, I have had many adult responsibilities. My parents are not always able to do the normal functions of the household, so I had to learn at an early age. My three responsibilities include cooking, cleaning, and taking care of my dog, Libby. Looking back now, I really have had an advantage from doing chores around my house. I feel it gives me a head start for when I am out on my own. I have been cooking dinner for my family since I was ten or eleven. My dad started teaching me, and before long, I was cooking by myself. Since I have been cooking for so long, now I can just cook what sounds good to me. I love to experiment when I cook. Cooking is something that not everyone can do. Along with cooking, I also do most of the shopping. Doing the shopping entitles me to plan the dinners, pick up the necessary ingredients, and then cook it. Doing this has taught me to be responsible with money. Cleaning is another thing I do around my house. My main priorities consist of my bedroom, the bathroom, and the kitchen. Even though I am supposed to clean all three rooms, often I just try to work on my room. With the basic cleaning I do, I also sweep the floors, do the laundry, and dust. Being busy myself, I almost never get everything done. Cleaning is a very important task to acquire. Taking care of my five year old dog Libby can be a real chore, also. I have been responsible for her for the two years she has been in our household. There are several things I have to do for her on a daily basis. For example, making sure she has plenty of food and water, taking her outside, morning through night, and also trying to spend some time with her. I have to admit, having her can get expensive at times. Every year I buy her registration tags and take her to the veterinarian to get her shots and various pills she might need. As needed I buy her food, treats, and toys. Having all these responsibilities, I feel will help me in the future. Sometimes, of course I get sick of doing all these things, but knowing how to do all these things, will really be beneficial to me both in college and after.

Monday, November 25, 2019

Collins online Essay Example

Collins online Essay Example Collins online Essay Collins online Essay Essay Topic: The Breadwinner I am going to discuss the aspects that help shape our identities and how much control we have over forming our own identity.  Also how identity provides a link between the personal and the social.  The definition of identity from the Collins online dictionary. the individual characteristics by which a person or thing is recognized  In my view the above mentioned characteristics could be factors including colour, race, gender, class, status and place to name but a few. Identity is not the same as personality.  Personality is made up of inherited traits and behavioral patterns.  Identity comes from choices we make; we have an active role in the forming of our own identity.  Gender we have no control over. Gender is not the same as sexuality. Sexuality is the choice we make.  From the moment we are born we are categorized as either male or female depending on the genitalia we have. This is not a choice we can make.  A gender role is a perceived set of behavioral norms associated with males or females, in a given social group or system. (Wilkipedia, 2007) We are put into the stereotypical groups for our gender: girls wear pink and play with dolls; boys wear blue and play with cars.  Sir Thomas Moore (p49) thought that a girls gender was formed because of the absence of a penis. He thought Boys were superior to girls because of this.  On reaching adulthood we are expected to go into certain job roles. i.e men as builders and practical skills and women as homemakers or secretaries.  Louis Althusser claimed that a persons identity is formed when people are drafted into a specific identity they are interpellated (called) into. For example Mother, Husband Scottish, Irish. These identities can change with time, in the example of a mother or housewife, they may no longer be only a mother / housewife as they may have been in the 1950s but they may have full time careers as well. Or the husband may stay at home because the wife earns more money as so she can be the breadwinner. In 2001 there were 13.2 million women a workforce of 23.5 million (Woodward2003). Our identity can be fluid and changing. Agency allows us to identify with certain groups or people that share similar interests. In the example of religion, if we were Jewish we may attend the synagogue with like minded worshipers.  Or we may wear the claret and blue of West Ham Utd when watching Saturday football on TV, because this identifies you as a West Ham supporter.  This shows that as individuals we take up identities of things we enjoy and relate it to the social. The West Ham supporter is a member of a club where he can discuss his main interest and share common opinions with others. The wearing of the symbols, colour or badge shows this. The above person may change his identity when he goes to work as a teacher.  Discussing West Hams game may not be appropriate in a math lesson. This persons body language will change as will the verbal language.  Here structure is directing him in his identity in the appropriate way to act and dress in a professional role. This person then goes home to his wife and becomes a lover and a father and again identity changes to the family man.  Ervine Goffman believed that we act out roles of identity and this may change depending on the place we are or the people we are with. Mead believed that our identities were formed via visualization and symbolization and there is a clear link between how we see ourselves and how we believe others see us.  Freud believes that our identities are formed by unconscious feelings or repressed experiences from childhood. These early experience come out through the way we treat others and the decisions we make through life.  From these three theorists it shows that identity is formed in many different ways and that identity is clearly linked to the social.  To conclude there seems to be no rigid ideas regarding how identities are formed. Identity is influenced by various factors in society, people are able to change their identity to a certain extent; identity is also brought about how other people see you as well as how we see ourselves.  (personal to social) The control we have is via agency and making choices to join certain social groups. The restrictions we have are from our gender, our race or ethnicity.  Ã‚  TMA01 part b  How does class influence identity in a contemporary society?  I am going to look at how class influences our identity in todays society.  The three key question are: How do economic structures shape our understanding of who we are?  And, what is the justification for saying that there has been a move from collective to individual identities? Which social science arguments support the idea that class identities are eroding? To look at economic structure shaping identity, I am going to look at occupation  in the contemporary world.  Occupation is a useful tool to link a persons situation to class or status. The first questions asked in first encounters is what do you do?, which means what is your occupation. By having a particular occupation societys discernment will differ, for example doctors are perceived different to hospital cleaners. This will affect the way we perceive ourselves and have an impact on identity.(personal to social). Life in the western world has faced many diverse changes creating insecurity of work identity, mainly due to the changes in societys expectations, the creation of new technology and the disintegration of labour intensive, heavy industry occupations such as mining.  People are migrating to different areas for work, consequently there is a fragmentation of the traditional large work orientated communities that once existed. Resulted in the degeneration of collective identity to individual identity, which is important for a sense of belonging to a community. John Hargreaves(2004) testimony clearly suggests that we are not able to exercise much control over identity. He claims that prior to 1984 he was part of a traditional mining industry, where communities and culture grew; John was interpellated by that collective identity (Kath Woodward 2004).  After 1997 as a result of unemployment he had lost his financial security and also his collective identity, which was his sense of belonging. Johns account put a large emphasis on the importance of paid work, suggesting paid work provides self worth.  If this is the case then people who work, but are not paid such as carers or housewives may be valued less in the community.  This finding clearly emphasises how the importance of paid and unpaid work can influence a persons identity our identities are influences by the shape of the income distribution(Kath Woodward 2004)

Friday, November 22, 2019

What effect does the pressure of standardized testing have on student Thesis Proposal - 1

What effect does the pressure of standardized testing have on student expectations and performance - Thesis Proposal Example oposed research will play a significant role in enabling educators to improve the process of standardized testing that may result in a positive impact on students’ performance rather than vice versa. Research Questions In order to collect data, the researcher has identified following questions that will enable the researcher in fulfilling abovementioned aims and objectives of the proposed research: You need to paste your questionnaire here LITERATURE REVIEW The statement â€Å"What effect does the pressure of standardized testing have on student expectations and performance?† has come under many studies, researches and theories since it is one of the most vital and significant subject of concern for the youth of twenty first century as they are living in the world of paramount competition. This topic has been under constant discussions and disputes with many controversial results amongst the academic researchers, professors and lecturers, and parents as everybody has a different perspective on the influence and performance on students of the standardized testing. However, the preliminary concept of standardized testing has emerged in order to assess and calculate the knowledge, understanding, and efficiency of students within the academic learning systems that comes under practice in the United States and many other countries. In addition, education systems even exercise the standardized testing with a purpose to establish, form and outline the program of study for the students according to their performance and skills level (Henningfeld, 2007).   Various educational institutions carry out numerous standardized tests as eligibility criteria of admission in the college or school all around the world includes â€Å"Scholastic Assessment Tests (SAT), Graduate Management... The statement â€Å"What effect does the pressure of standardized testing have on student expectations and performance?† has come under many studies, researches and theories since it is one of the most vital and significant subject of concern for the youth of twenty first century as they are living in the world of paramount competition. This topic has been under constant discussions and disputes with many controversial results amongst the academic researchers, professors and lecturers, and parents as everybody has a different perspective on the influence and performance on students of the standardized testing. However, the preliminary concept of standardized testing has emerged in order to assess and calculate the knowledge, understanding, and efficiency of students within the academic learning systems that comes under practice in the United States and many other countries. In addition, education systems even exercise the standardized testing with a purpose to establish, form and outline the program of study for the students according to their performance and skills level (Henningfeld, 2007). Various educational institutions carry out numerous standardized tests as eligibility criteria of admission in the college or school all around the world includes â€Å"Scholastic Assessment Tests (SAT), Graduate Management Aptitude Tests (GMAT), Law School Admission Testing (LSAT) and Medical College Admission Tests (MCAT) and numerous others† (Henningfeld, 2007).

Wednesday, November 20, 2019

Priori Theory Criminal Justice Research Design Coursework

Priori Theory Criminal Justice Research Design - Coursework Example The most used method of data collection is the research interview, but can also include observation or group discussions, as well as use of pictures and texts (Cresswell, 2009).. This type of research categorizes various data into different patterns for reporting results. The researcher typically relies on various information gathering methods such as: Participant and non-participant observations, field notes, unstructured interview, documents analysis as well as structured and semi-structured interview. The data obtained is then streamlined to definite patterns or themes. Thereafter what follows is the formulation of the alternative hypothesis which forms the research statement basis (Cresswell, 2009).. In data analysis, observer impression is commonly used. In observer impression, an expert examines and interprets the data by forming an impression then reports it in a quantitative and structured form. Coding organizes data and introduces some interpretations into quantitative methods. Some data that are highly structured like close-end response and interview questions that are tightly defined are coded without any additional segments of contents. In this case, the codes are applied on top of these data as layers (Cresswell, 2009).. Recursive abstraction is often employed whenever analysis is done without coding. Here, summary after summary of the datasets is done, producing a summary that is more compact which can not be easily arrived at without the previous steps. The weakness of recursive abstraction is that; should the initial summaries be poor or inadequate, then the final report yielded may be inaccurate (Cresswell, 2009). In summary, qualitative method of research investigates why and how a decision is made. In conventional view, a qualitative method produces information on the particular cases that are studied only, and any additional conclusion is only an informed assertion. Quantitative methods are then used to seek support for these research

Monday, November 18, 2019

Special Populations (Health care) Essay Example | Topics and Well Written Essays - 500 words

Special Populations (Health care) - Essay Example In 2009, African American was accounted for half of all new HIV diagnoses (Avert International HIV and AIDS Charity, 2011). In 2009, the diagnosis of men with AIDS showed that 56 percent consisted of Black American men; 79 percent were consisted of white men; while 65 percent were Latino men. For females, the diagnosis of AIDS in 2009 showed that 78 percent of African American women were affected by this disease; 75 percent of Latino women were the victims and 68 percent were white women (LatinVoices, 2011). According to reports, the basic transmission route among men is from male-to-male sexual contact; 74 percent of the people become affected through it. It is followed by heterosexual contact which constitutes 14 percent; while 8 percent of the men become infected through injecting drug use. Whereas, the women are infected due to heterosexual contact and its percentage is 84.9 percent. The next leading source of AIDS in women is injecting drug use which constitutes around 14.8 percent (United State Statistic by Race and Age, 2011). In the USA more than half a million people have died due to AIDS. Approximately two-thirds of these people did not reach to the age of 45. The survey of 2009 shows that the most affect age group is comprised of 20 – 24 years (United State Statistic by Race and Age, 2011). In 2010, a study by the Centres for Disease Control and Prevention revealed that in America poorest urban neighbourhood indulge in heterosexual activities by 2.1 percent (Avert International HIV and AIDS Charity, 2011). Although HIV and AIDS affect all the sectors of American society, however, the impact has been more serious among some groups than others. The most commonly identified groups are gays, bisexual men, and those people who are injecting drugs. However, it cannot be only because of the individual behaviour but rather due to the

Saturday, November 16, 2019

Fully Homomorphic Encryption and cryptography

Fully Homomorphic Encryption and cryptography Introduction Transferring files between machines (and users) is a common daily occurrence although the confidentiality of the data is a basic condition. Now problem was how to secure them from inadvertent addressee from observing the data, which are supposed to confidential and likely on risk if prepared well-known to negligent parties. In each of these cases, its important to know what options are available to get your file from point A to point B and to comprehend whether the technique you choose provides sufficient security given the sensitivity of the data being transferred. Cryptography is ability of secret text, or more precisely of stock up resource (for a long or shorter period of time) in a shape which allows it to be revealed to those you wish to see it yet hides it from all others. A cryptosystem is a technique to accomplish this. Cryptanalysis is to put into practice to overcome such endeavors to hide information. Cryptology comprises of both cryptography and cryptanalysis. The unique information to be hidden is called plaintext. The concealed information is called ciphertext. Encryption or Decryption is any modus operandi to convert plaintext into ciphertext. A cryptosystem is designed so that decryption can be consummated only under certain conditions, which usually means simply by persons in control of both a decryption engine (these days, generally a computer program) and a meticulous piece in sequence, called the decryption key, which is supplied to the decryption engine in the course of decryption. Plaintext is transformed into ciphertext by process of an encryption engine (again, generally a computer program) whose operation is fixed and determinate (the encryption method) nevertheless which functions in practice in a way dependent on a piece of information (the encryption key) which has a major effect on the output of the encryption process. The main purpose was to make sure privacy while you transferring your private data from one place to another place do not matter electronically or via users. There were many scheme but very complicated to follow them and most important less security. So time by time many scientists discover different techniques but Gentrys technique â€Å"Fully Homomorphic Encryption† got a tremendous value against all technique. All others techniques were performing well but with restriction but Gentrys scheme user can perform unlimited action. Objective Cloud computing Literature review â€Å"Homomorphic encryption is a paradigm that refers to the ability, given encryptions of some messages, to generate an encryption of a value that is related to the original messages. Speciï ¬ cally, this ability means that from encryptions of k messages (m1,†¦,mk), it is possible to generate an encryption of m* = f(m1,†¦,mk) for some (efficiently computable) function f. Ideally, one may want the homomorphically generated encryption of m* to be distributed identically (or statistically close) to a standard encryption of m*. We call schemes that have this property strongly homomorphic. Indeed, some proposed encryption schemes are strongly homomorphic w. r. t some algebraic operations such as addition or multiplication.† (Rothblum R, 2010). â€Å"An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: 1. Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. Only he can decipher the message, since only he knows the corresponding decryption key. 2. A message can be â€Å"signed† using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in â€Å"electronic mail† and â€Å"electronic funds transfer† systems.† (Rivest et al, 1978) â€Å"Homomorphic encryption enables â€Å"computing with encrypted data† and is hence a useful tool for secure protocols. Current homomorphic public key systems have limited homomorphic properties: given two ciphertexts Encrypt (PK, x) and Encrypt (PK, y), anyone can compute either the sum Encrypt (PK, x+y), or the product Encrypt (PK, xy), but not both.† (Boneh et al, 2006) ARMONK, N.Y 25 Jun 2009: â€Å"An IBMResearcher has solved a thorny mathematical problem that has confounded scientists since the invention of public-key encryption several decades ago. The breakthrough, called privacy homomorphism, or fully homomorphic encryption, makes possible the deep and unlimited analysis of encrypted information data that has been intentionally scrambled without sacrificing confidentiality.† (IBM, 2009) â€Å"We propose the first fully homomorphic encryption scheme, solving a central open problem in cryptography. Such a scheme allows one to compute arbitrary functions over encrypted data without the decryption key i.e., given encryptions E(m1) ,†¦,E(mt) of m1,†¦.,mtone can efficiently compute a compact ciphertext that encrypts f(m1,†¦.,mt) for any efficiently computable function Æ’. This problem was posed by Rivest et al. in 1978.† (Gentry C, 2009) â€Å"Searching databases is usually done in the clear. And even if the query is encrypted, it has to be decrypted (revealing its contents) before it can be used by a search engine. Whats worse is that databases themselves are stored as plaintext, available to anyone gaining access. The smarter way to handle sensitive information would be to encrypt the queries, encrypt the database and search it in its encrypted form. Impossible until now, IBMs T.J. Watson Research Center (Yorktown Heights, N.Y.) recently described a homomorphic encryption scheme that allows encrypted data to be searched, sorted and processed without decrypting it. Fully homomorphic encryption schemes theoretically allow ciphertext to be manipulated as easily as plaintext, making it perfect for modern cloud computing, where your data is located remotely.† (Johnson R C, 2009) Body History of Cryptography In earliest era communications or correspondence among recipient and correspondent were only possible through extremely safe and sound way like loyal pigeon, physically or any other source but must be trusted. That was a time when it was very tough to believe or trust on available sources. There was a little doubt and big risk for the sender was if transporter discloses the information then any one can harm them. Progressively a newly ideas came with world called Cryptography/Encryption† means this is a technique in which the sender encrypts the communication using proper key and its only possible for receiver to decrypt it if he possessed the key. Key based Encryption. In key based encryption keys are the most important part of creating new ciphertext. A sequence of small piece used generally in cryptography, letting people to encrypt/decrypt facts and the same key can be used to carry out additional mathematical business as well. Specified a secret message, a key established the connection with the sequence to the ciphertext. The key we use for a special cryptosystem has worth so whenever this key used to ciphertext, always lets the encrypted communication to be decrypted and always doing reverse like encrypt the plaintext. In ancient era because calculation was very hard so they prefer to use not lengthy keys in respect of bits but on the other hand its safe to use longer key. Communications also one can encrypt in n-bit blocks. It is true that the longer a key is, more difficult for one to break the encrypted message. Encryptions consist of two categories. Private Key or Symmetric Key Encryption Public Key or Asymmetric Key Encryption Private Key / Symmetric Key Encryption This was thousands of years ago when Julian Caesar used this scheme to send his communication to his military. He used very simple key based classic cryptographic algorithm in which he just shifted each letter with preplanned key number 4. In his algorithm key varies so thats why we cannot guess what number he will use next. Lets take said number 4 which means â€Å"A† will swap with â€Å"D† and â€Å"B† will swap with â€Å"G† and so on â€Å"X† will swap with â€Å"A† etc. ABCDEFGHIJKLMNOPQRSTUVWXYZ DEFGHIJKLMNOPQRSTUVWXYZABC The same letter changing technique was useful to small case correspondence and also covering around the letters as well. (S. Tewksbury). Cryptography history is very old so we can divide it in to two categories. Classic era Cryptography Computer era Cryptography In classic era there was no computer or any electronic machine to solve this problem so people were used pen and paper to unreveal the truth of letters. Julian Caesar technique is classic era practice. Until WWII all cryptography techniques are none as classic era cryptography. After WWII development of machine made cryptography life very complex and that time was very easy to break all classic time encryptions mostly called key based techniques. Key word was very important in these practices and because of the key it was very easy to break through encryption algorithm. ROT13 is the best practice of encryption algorithm which we know its famous name Caesar cipher and this is extension of Julian Caesar scheme. The most useful technique was ROT13 in which they used fix key 13 to encrypt the letters. This algorithm was very famous in the beginning of computer era and anyone wants to use ROT13 scheme, both side parties must use the same key to encrypt and decrypt the code. This key calle d secret key. The development of the machine set a stander in respect of key codes and then everyone prepared a code book to share as a key code book. For example in ROT13 simply they rotate the letters by 13 places. Application of this scheme is very easy like Julius Caesar technique where he swapped letters with fix key 4 and now in ROT13 with key 13 and wrapping around like â€Å"a† become â€Å"n† and â€Å"m† become â€Å"z† and wrapping continue if necessary but the problem was user can play only English alphabet. The beauty of this technique was it made its function its own inverse like for any text x we can write its function mathematically inverse of ROT13(x) or ROT13 (ROT13(x)) where x is belong to a character which one wants to encrypt. This characteristic furthermore called an involution in arithmetic and a give-and-take code in cryptography. This scheme work as below ABCDEFGHIJKLM ↔ abcdefghijklm NOPQRSTUVWXYZ ↔ nopqrstuvwxyz In this scheme problem was again if someone steel or rob your data then it is very easy to decode it. This is not reasonable cryptographic proposal even though its known as secret key cryptosystem. If we observe closely the ROT13 is partially homomorphic particularly with respect to the concatenation function because it has a reciprocal property. Lets write a function to prove its homomorphic property using secret key 13, in this function we encrypt the text using said algorithm and we will add the encrypted text to see its homomorphic property and then finally decrypt the result. Java ROT13 Code. import java.util.*; public class ROT13 { static int x,y,n,fx,l,m; public static void main(String[] args) { Scanner sc=new Scanner(System.in); System.out.println(Enter your text); String t = sc.nextLine(); int j=0; int key=13; for (int i=0; i { char ch3 = t.charAt(j); if (ch3 >= a ch3 else if (ch3 >= n ch3 else if (ch3 >= A ch3 else if (ch3 >= A ch3 System.out.print(ch3); j++; }}} OUTPUT Enter your text HelloWorld UryybJbeyq The above algorithm is very uncomplicated algorithm to illustrate how ROT13 scheme works and in above output â€Å"Uryyb Jbeyq† is encrypted cipher formed with above algorithm. To check its homomorphic property now anyone can break this cipher text and then apply a concatenation (addition operator) to this text. After getting a new text anyone can apply ROT13 algorithm to decode it to see if he/she is getting the original text. import java.util.*; public class ROT13 { static int x,y,n,fx,l,m; public static void main(String[] args) { Scanner sc=new Scanner(System.in); System.out.println(Enter yout text); String t = sc.nextLine(); int j=0; int key=13; for (int i=0; i { char ch3 = t.charAt(j); if (ch3 >= a ch3 else if (ch3 >= n ch3 else if (ch3 >= A ch3 else if (ch3 >= A ch3 System.out.print(ch3); j++; } System.out.println(); System.out.println(Enter yout 2nd text); String t1 = sc.nextLine(); int j1=0; int key1=13; for (int i1=0; i1 { char ch3 = t1.charAt(j1); if (ch3 >= a ch3 else if (ch3 >= n ch3 else if (ch3 >= A ch3 else if (ch3 >= A ch3 System.out.print(ch3); j1++; } System.out.println(); System.out.println(Enter the 1st encrypted result=); String a=sc.nextLine(); System.out.println(); System.out.println(Enter the 2st encrypted result=); String a1=sc.nextLine(); String con = a+a1; System.out.print(con); System.out.println(); int j2=0; int key2=13; for (int i2=0; i2 { char ch3 = con.charAt(j2); if (ch3 >= a ch3 else if (ch3 >= n ch3 else if (ch3 >= A ch3 else if (ch3 >= A ch3 System.out.print(ch3); j2++; }}} OUTPUT Enter the 1st encrypted result=Uryyb Enter the 2st encrypted result=Jbeyq UryybJbeyq HelloWorld Explanation of Output Text a = Encrypt (13, Hello); a = Uryyb Text b = Encrypt (13, World); b = Jbeyq Text c = Concat (a,b); c = UryybJbeyq Text d = Decrypt(13, c); d = HelloWorld As we can see clearly that we used an addition (concat) property to encrypt the text but after this we got the same result as we got without using concat. This property demonstrates that ROT13 is partially homomorphic scheme with respect of addition. The problem start with this technique when machine came in to being and it was easy to break secret code and even drawback of this scheme was numbers because user only were to able to encrypt alphabetic. Then gradually, ROT47 new scheme introduced and this scheme was derived from ROT13 as-well. Inside this scheme there was a big border for its users so now they were able to play with numbers and special characters. ROT47 exercise a larger alphabet, resulting from a regularcharacter programmingwell-known asAmerican Standard Code for Information Interchange (ASCII). The ASCII is a 7-bit code to correspond to English alphabet structure and these codes are in practice to symbolize data which includes numbers used in central processing unit, interactions technology and additional associated mechanism. The first publication of this standard code was in 1967 then afterward restructured and produced as â€Å"ANSI X3.4-1968†, at that time as â€Å"ANSI X3.4-1977† and at last as â€Å"ANSI X3.4-1986†. It is given that, it is a seven-bit code and it preserves the largest part symbolizing 128 characters. It presently characterize 95 printable characters together with 26 upper-case letters (A to Z), 26 lower-case letters (a to z), 10 numbers (0 to 9) and 33 special characters as well as arithmetic signs, punctuation marks and space character. . (Maini A K, 2007) However ROT13 introduced with new values of its alphabets separately both capital and smaller. Unlike ROT13, ROT47 was also not able to protect your text at all. This scheme is also having homomorphic property like addition. If closely observe the both scheme then we will be able to see that there is only little difference in both schemes. Both working pattern is same, both dealing with alphabets but ROT47 got advantage because this scheme deal with numbers and individual characters. In this method ASCII cipher connect to trade letters or numbers during encryption/decryption. Knowledge of ASCII codes to one lead to revel the facts. So here this scheme becomes the same like ROT13, so failure of this scheme once again involvement of the secret key. Is Symmetric Key Encryption Secure? ROT13 encryption scheme is not secured at all because the code of this scheme you can decode very easy. This was the disadvantage of this scheme. The reason we encrypt our transcript is to make it protected from illegitimate access however this scheme only consist of 26 characters which is very simple to decipher even from side to side a common person who have an access to the written text. For example: Anyone wishes to encrypt â€Å"atotaa†, after that the cipher we will achieve â€Å"ngbgnn† which is very effortless to work out through repetition of â€Å"a g†. ROT47 was novel encryption scheme derived from ROT13and also another example of symmetric key encryption but bit difficult. In ROT47 moving the basic letter swiftly like ROT13 with given substitute of ASCII. In this scheme one can take care of numbers and many other special characters as a substitute of the basic 26 letters however awareness of ASCII codes can show the way to one to search out the facts. Consequently, at this point this scheme turn into insecure category like ROT13, so failure of this scheme was once again its own typical contribution of the ASCII codes. Public Key or Asymmetric Key Encryption An important contribution in the peak field that time named â€Å"public-key cryptography† fulfilled by Whitfield Diffie, Martin Hellman and Ralph Merkle in 1976 when they introduce an elegant cryptosystem for a public-key. The major difference as compare to prior scheme was one extra key named as public key. The public key assume to be used for encryption and then private key will use to decryption. Cryptography has been a derivative security entirety once a secure channel exists along which keys can be transmitted, the security can be extended to other channels of higher bandwidth or smaller delay by encrypting the messages sent on them. The effect has been to limit the use of cryptography to communications among people who have made prior preparation for cryptographic security. (W Diffie and M Hellman, 1976) ABOVE NOT COMPLETE YET RSA respected the idea of Diffie et al and in 1978 they introduced first public key algorithm in public at MIT byRon Rivest,Adi Shamir, andLeonard Adleman. They illustrate what is predetermined by a trapdoor cipher, but how do you construct one? One usually used of the secret message of this type is called RSA encryption, wherever RSA are the initials of three initiators which are Rivest, Shamir, and Adleman. It is based on the idea below; it is simply multiply numbers together, particularly with the help of computers reason, factorization of this numbers could be difficult. To get them, one needs to factor N, which seems to be an extremely complex problem. But exactly how is N used to encode a message, and how are p and q used to decode it? Below is presented a complete example, although there will be used minute prime numbers so it is easy to follow the arithmetic. Actually in RSA encryption scheme they used very big prime numbers. As per them it makes scheme more secure because in their algorithm they need to factorize the number to get the result. If someone using small number then its easy to factorize the number but it is not the same with big number. Therefore, they in their algorithm they used key size 768-bit for ordinary use and they suggest 1024-bit key size for commercial use but for highly important information key size should be double (2048-bit) as compare to business key size just for mind satisfaction regarding security threat. RSA advised to one and all concerning their scheme that how scheme work to get own encryption and decryption key if any want using their method. First step decide two separate prime numbers like p, q. Later than multiply integers pq and make n = pq public. Exposing n in public will help one to hide original integers like q q and now it will be very difficult for illegitimate person to find original integers p q because factorization will be very hard for big prime numbers. This achievement will help to hide the value of multiplicative inverse d and the way derived from co-prime e. Choosing big integer d but d must comparatively prime with φ((p-1).(q-1)) and must fulfill the condition of greater common devisor gcd (d, (p-1)(q-1)). Finally one can compute the integer e â€Å"1 Mathematically Implementation of RSA algorithm RSA algorithm steps below Two prime integers p=61 and q=53 Multiply both prime integers n = pq = 61.53=3233. The value of n afterward used as modulus for public and private key. Calculate φ(n) = (p-1).(q-1) = 3120. Where φ is Eulers totient function. For the value of e = 17 select any integer from 1 One can conclude d = e-1 mod φ(n). The value of d = 2753 will be using in private key exponent so supervision of this key is essential. Extended Euclidean algorithm helps to determine the d. Thepublic keywill be (n= 3233,e= 17) and for text m the encryption function is m17 mod φ(n). Theprivate keyis (n= 3233,d= 2753) and for the encrypted text c decryption function will be cd mod φ(n). For example: Encryptm= 65, we compute c= 6517(mod 3233) = 2790. For decryptc= 2790, we calculate m= 27902753(mod 3233) = 65. Using the above boring however easy for a computer to calculate, One can decode others message and obtain the original message m = 65. Java Code for RSA Algorithm: public class RSACode { static long x,y,n,fx,l,m; static int p,q,e,tn; public static void main(String[] args) { Scanner sc=new Scanner(System.in); System.out.println(Please enter ist prime no P); p =sc.nextInt(); System.out.println(Please enter 2nd prime no q); q =sc.nextInt(); n=p*q; System.out.println(p*q = n +n); //Totient of n tn=(p-1)*(q-1); System.out.println(Totation of tn(pq) = +tn); int k=tn; for (int i=1; i { int fi= (int)(Math.pow(2, i)+1); l=fi; while (tn % fi !=0) { int r = (tn % fi); tn = fi; fi = r; } if (fi==1) System.out.println(GCD Of+[+k+,+l+] is+fi+Recommended for you); } System.out.println(So please use +l+ as e); System.out.println(Enter number to exponent e); e=sc.nextInt(); for (int d=1;d if ((e*d)%k==1) System.out.println(The value of e^-1 mod n= d ==+d); System.out.println(Enter the above valu of d); int d1=sc.nextInt(); System.out.println(Enter number to encrypt); m=sc.nextInt(); //encryption function is c = (m ^ e)/n; double encryption = (Math.pow(m, e)% n); System.out.println(encryption Key =+ encryption); System.out.println(The value of d= e^-1 mod n ==+d1); double decrypt = (Math.pow(encryption, d1) % n); System.out.println(encryption +to decryption is = + decrypt); OUT PUT Please enter ist prime no P 5 Please enter 2nd prime no q 7 p*q = n 35 Totation of tn(pq) = 24 GCD Of[24,5] is1Recommended for you GCD Of[24,9] is1Recommended for you So please use 9 as e Enter number to exponent e 5 The value of e-1 mod n= d ==5 Enter the above value of d 5 Enter number to encrypt 9 encryption Key =4.0 The value of d= e-1 mod n ==5 4.0to decryption is =9.0 The above java code works fine on small prime integers with small exponential power and small value of d (multiplicative inverse). OUT PUT Please enter ist prime no P 61 Please enter 2nd prime no q 53 p*q = n 3233 Totation of tn(pq) = 3120 GCD Of[3120,17] is1Recommended for you So please use 17 as e Enter number to exponent e 17 The value of e-1 mod n= d ==2753 Enter the above value of d 2753 Enter number to encrypt 65 encryption Key =887.0 The value of d= e-1 mod n ==2753 887.0to decryption is =NaN The same java code work perfect on big numbers but there you need different data types to adjust the output value the error NaN means data type mismatch. Practically Implementation An RSA operation whether encrypting, decrypting, signing, or verifying is fundamentally a modular exponentiation. This computation is executed with a sequence of modular multiplications. In practical uses, it is general to select a small public exponent for the public key. In reality, entire group of users preserve to use the matching public exponent, every one through a different modulus. However there are few boundaries on the prime factors of the modulus when the public exponent is set. For the reason of this it creates encryption more rapidly than decryption and verification quicker than signing. Through the typical modular power algorithms used to put into practice the RSA algorithm, public-key operations takeO(k2) steps, private-key operations take O(k3) steps, and key generation takesO(k4) steps, wherekis the number of bits in the modulus. (RSA 2010) Is RSA Work Secure? This scheme is not fully secure on the basses of following attacks Elementary attack Low private exponent attack Low private exponent attack Implementation attack Boneh et al Homomorphic Encryption (Boneh D, 1999) examined the RSA cryptosystem, was original exposed in the 1977-1978 topic of â€Å"Scientific American†. The cryptosystem is mainly generally in practice for offering confidentiality and certification validity of digital data. In those days RSA was positioned in many big business organizations. It is used by web servers and browsers to safe web transfer, it is used to make sure confidentiality and legitimacy of correspondence, it is used to safe remote login phase, and it is at the heart of electronic credit-card payment method. However, RSA is commonly take part in meanings anywhere safety of digital data is on risk. In view of the fact of first publication, the RSA scheme evaluates meant for weakness through a lot of examiners. However since 1977 to 1999, examiner have direct to a many interesting attacks but not any of them is critical. They typically demonstrate the risk of offensive use of RSA. Definitely, protected execution of RSA is a nontrivial job. Twenty years of research into inverting the RSA service created various perceptive attacks, other than no shocking attack has ever been discovered. The attacks exposed so far mostly demonstrate the drawbacks which one can avoid once applying RSA. Currently comes into view that correct applications can offer assurance to afford protection in the electronic globe. Openattacks on RSA scheme: Chosen chipper attack is very famous in cryptography in it attacker gathered information in pieces and then process it. This attack claimed against RSA in 1998 by Y. Desmedt and A. M. Odlyzko. According to RSA choose two prime numbers to calculate n then use φ(n) for modulus in encryption and decryption but if any enemy used brute force attack on their public key (N, e) to find the factorization and as well as their φ(n). On the other hand if we assume that only big prime number only allowed in RSA then it will affect the speed of the scheme because performance depend on n-bit key. While encrypting with not big encryption supporter e= 3 and small values of them like m Another attack was if sender send a plain clear message to e or more beneficiary after encrypted and the recipients distribute the similar exponente, except differentintegers p,q, andn, in that case it is simple to decode the plaintext using theChinese remainder theorem.Hà ¥stadJ become aware of that, this attack is achievable still if the plaintexts are not identical, however the attacker recognize a linear relation among them.Afterward Don Coppersmith enhanced this attack which was low exponent. RSA has the property that the multiplication of two encrypted text is the same to the encryption of the product of the individual plaintexts. That isâ€Å"† since of this multiplicative property achosen ciphertext attackis possible. For example an attacker, who needs to identify the decryption of a ciphertextc=me(modn)possibly will request the owner of the private key to decrypt an innocent appearing ciphertextc =re c (modn)for random rselected by the attacker. For the reason that of the multipli

Wednesday, November 13, 2019

Loose Technology :: science

Loose Technology What is a hacker one may ask? He doesn't wear a stocking mask over his face, nor does he break a window to get into your house. He doesn't hold a gun to your head, nor does he go through your personal possessions. Considering the situation, he recognized just the way a thief is recognized. But one strange thing about this thief is that you’ll never be able to see him, although you may not even realize right away that he's the one that robbed you. This thief is a computer hacker and he "enters" your home via your computer, which allows him to access your personal information. Amazing huh It's very difficult to imagine that any person in today's technological oriented world could function without computers. Personal computers (Pc’s) are linked to business computers and financial networks, and they are all are linked together via the Internet or other networks. As computer becomes more and more popular and important to our society, we can use computers everywhere and they are very useful and helpful to our daily lives. The extreme speeds and accuracy of computer has made people felt confident and reliable. Considering the population in the United States and throughout the world, there are more then a hundred millionth electronic messages that travel through cyberspace (internet) every day, and every piece of information is stored on a computer that is very vulnerable to attack. On any personal computers there are many important information or data are saved in the computer. Things such as: your diary, the financial statements of a company, or maybe something that is very secret which only the intelligence of the military or FBI department can read. A lot of important information can be found in the memory of computer. So, knowing the consequences people may begin to wonder and ask questions. As older and newer companies are emerging, companies are becoming more aware and scared by the fact that their computers are prone to attack. Virus scanners (such as McAfee or Norton) are becoming requirements on every machine. When it comes to installing such programs and monitoring these virus scanners, it usually takes tremendous amount of time and tons of money for site licenses. Many server programs are coming equipped with a program called â€Å"netlog.† Which makes it a big advantage because this program not only monitors the computer use of the employees in a company on the network but it also monitors memory and file usage.

Monday, November 11, 2019

Human Energy Use

Human uses of energy over 10,000 years are explained in Changing Environments (Morris et al, 2003a). Until 10,000 years ago humans lived as hunter gatherers in small groups, this changed in the current interglacial stage or Holocene with the introduction of agriculture. Figure 2. 19 page 82 of (Morris et al, 2003b) indicates that during the early agriculturalist period humans had begun to domesticate animals that could be used for carrying and pulling. Energy use increased from 0. 24 W (calculations – Morris et al, 2003c, p 81-82) per day per capita in the previous period to 0. 8 W per day as it was realised that extra somatic energy obtained from food could be assisted by the use of tools made from metals such as bronze and iron. Energy use advanced by using tools, and as we moved to the advanced agriculturalists period energy consumption more than doubled to 1 W. The industrial society brought major changes in the use of energy with agriculture, transport and mining. There w ere increases in the use of fossil fuels as workplaces and homes were heated and the steam engine was introduced. (Morris et al, 2003d p 83). We can see in Figure 2. 9 page 82 of (Morris et al, 2003b), that during the period energy consumption rose to 4 W. The greatest increase of energy is 11 W in the technological society this was 10 W more than the early agriculturalists. This period sees energy increases in home, commerce, industry, agriculture and transportation. It is also during this time that we begin to see the use of fossil fuels to create electricity, gas and oil and also the introduction of nuclear fuel. There is a large increase in oil use during this period due to the increased use of transportation. (Morris et al, 2003d p 83).

Saturday, November 9, 2019

Applied Problems from Chapters 8 and 9 Essays

Applied Problems from Chapters 8 and 9 Essays Applied Problems from Chapters 8 and 9 Essay Applied Problems from Chapters 8 and 9 Essay Applied Problems from Chapter 8 and 9 Marquita B. Mouton BUS 640 Managerial Economics Charles Fanning December 6, 2010 Applied Problems from Chapters 8 and 9 The application of material is the true test of knowledge. With the help of the concepts and theories learned from Chapter 8 and 9, this paper will answer the second applied problem from Chapter 8 and the second and fourth applied problems from Chapter 9. Chapter 8 At a management luncheon, two managers were overheard arguing about the following statement: â€Å"A manager should never hire another worker if the new person causes diminishing returns. † Is this statement correct? The scenario presented describes a question managers must face every day. It is not wise hire another workers solely due to them causing diminishing returns. According to the Law of Diminishing Marginal Product, as long as the marginal product does not become negative, it would be wise that a manager hire beyond the initial diminishing number (Thomas and Maurice, 2011). For example, if 1200 units need to be produced and the 11th person hired causes the returns to diminish, then it would be advantageous to the manager to hire enough employees to satisfy the output without causing the marginal product to drop below zero. Chapter 9 2. The Largo Publishing House uses 400 printers and 200 printing presses to produce books. A printer’s wage rate is $20, and the price of the printing press is $5,000. The last printer added 20 books to total output, while the last press added 1,000 books to total output. Is the publishing house making the optimal input choice? Why or why not? At the current input, Largo Publishing House is not making the optimal choice on input amounts. With the current inputs, they are underestimating the printers employed. Fifty printers could do the job of 1 printing press machine with a savings of $4,000. 2a. If not, how should the manager of Largo Publishing House adjust input usage? To maximize output on a fixed budget, Largo Publishing House should transfer some of the money spent on printing presses to the printers. At 1650 printers and 195 printing presses, combined they could produce 228,000 books for their limited budget. On the other hand, at 1900 printers and 190 printing presses, Largo Publishing could not only produce the same amount but also save $20,000 in the process. 4. The MorTex Company assembles garments entirely by hand even though a textile machine exists that can assemble garments faster than a human can. Workers cost $50 per day, and each additional laborer can produce 200 more units per day (i. e. , Marginal product is constant and equal to 200). Installation of the first textile machine on the assembly line will increase output by 1,800 units daily. Currently the firm assembles 5,400 units per day. 4a. The financial analysis department of MorTex estimates that the price of a textile machine is $600 per day. Can management reduce the cost of assembling 5,400 units per day purchasing a textile machine and using less labor? No it would not be possible to reduce the cost of assembling 5,400 units per day by purchasing a textile machine at the current worker wage of $50 per day. The cost of the total production would be $5,400 at any point where the amount if textile machines increased and the amount of workers decreased. For example, if three textile machines were bought and the amount of workers was decreased to 72, although totally they would produce 9000 units, it would still cost $5400. 4b. The Textile Workers of America is planning to strike for higher wages. Management predicts that if the strike is successful, the cost of labor will increase to $100 per day. If the strike is successful, how would this affect the decision in part a to purchase a textile machine? In part a, if more the amount of workers decreased and textile machines were purchased, MorTex would have been spending the same amount of money toward their production total. If the strike is successful and the workers’ wages increased from $50 to 100, it would be in the best interest of MorTex to purchase 9 textile machines and layoff all of their workers. If they pursued this option, they could produce 16,200 units with the same $5,400 they were already spending. References Thomas, C. and Maurice, S. , Managerial Economics: Foundations of Business Analysis and Strategy, Tenth Edition, Published by McGraw-Hill/Irwin, 2010.

Wednesday, November 6, 2019

An Introduction to Loving Kindness Essays - Meditation, Self

An Introduction to Loving Kindness Essays - Meditation, Self An Introduction to Loving Kindness from Guided Meditation, Explorations and Healings Blueprint for a meditation - one that promotes the compassion of the heart. AN EXPLORATION OF THE HEART The practice of exploring the mind and that which lies beyond, begins and ends with the heart. The first step in our liberation is the cultivation of the heart's natural compassion. Meditation begins with the practice of non-injury, a deep willingness to end the suffering in the world and in ourselves. In truth it may be impossible to be alive in a body without causing pain to other beings and species, but our intention can be to create as little pain as possible and to use this life for the benefit of others. Non-injury is an intention, a guideline for the mind from the nature of the heart. We eat. We love in confused manners. We trip and fall over states of mind. And we learn the art of balance. [To support the changes, the heart suggests "without becoming aggressive toward the mind."] We are learning to live in a sacred manner. What is called for is neither force nor acquiescence, but an active participation in the moment. It is an opening to let in healing. When Mahatma Gandhi was asked about the "passive resistance" he was teaching all over India, he replied, "There is nothing passive in my resistance. It is just non-violent." Gandhi's "non-violence" is a skillful means toward a peaceful mind and world. Violence originates from the mind. Healing from the heart. So the heart and its "still small voice within" is taken as teacher on the path of liberation. And non-injury is its most obvious quality. Non-injury ranges from self-forgiveness to the end of world hunger. When we begin to practice non-injury, the judging mind, which gets so exasperated with our "trying," is not allowed its abusiveness without a deep response from a merciful awareness. Non-injury means to treat othersand ourselvesas the subject of our heart instead of an object in our mind. This is not the judgment-inducing dictum of the Ten Commandments. This is a commitment to healing and purification a will toward clear action. As with Buddhist precepts such as non-killing, non-stealing, non-lying, non-sexual misconductnon-injury and compassion are not divine rules carved in stone, but simply reflections in the mind of the nature of the heart used to reinforce stability and balance on the path. They are gentle reminders, teaching guides, along the shining path between what seem at times glaring opposites. This is not the self-hating morality which turns the pain to my pain. It is rather "a sense of the appropriate" which rises naturally from levels of awareness deeper than our masks and posturings, deeper than the personality, or even the acquired self. Entering directly our essential being the heart of the matter our "natural goodness" is manifest unceasingly. Clear action clears the way for clearer actions. Kindness calms the mind. An Introduction to Loving Kindness ...By cultivating loving kindness in that aspect of mind that usually lives life as an afterthought, we change the context of our existence. We begin to live directly. We awaken. The meditation that follows uses the conceptual, word-oriented mindscape in perhaps its most skillful manner. It turns a hindrance into an ally. The difference between receiving thought in a merciful awareness and being lost in thinking is the difference between liberation and bondage. Loving kindness deepens the responsive while softening the reactive. Loving kindness is not unique in its ability to be cultivated. We can cultivate any mental quality. Most of us have intensified our fear and anger by holding so often to the contents of the mind as being all we are. Practice indeed perfects, and we have perfected our fear to a frightening degree. Practicing envy or anger cultivates the re-arising of indignation and resentment. Practicing loving kindness encourages the recurrence of mercy and awareness and the letting go of the hindrances to the heart the self-interest, the fear, the separatism, the judgment, which limit our direct participation in the mystery. In the acquired mind there floats a thought-bubble called "me" and a thought-bubble called "you," but in reality there is

Monday, November 4, 2019

Role of the UNWTO within the Global Tourism Industry Assignment

Role of the UNWTO within the Global Tourism Industry - Assignment Example Tourism developed through time through the better development of the modes of transport, an increase of wealth, better improvement and exciting ideas of services and facilities as well as the discovery of new destinations which were strategic locations as per the desired intention of the travel.it is one of the fastest growing economic activities globally. The development to tourism has led to employment opportunities and the increase of the economic well- being in various countries. United Nations World Tourism Organization (UNWTO) is an agency of the international organization United Nations; it is the leading international organization in the global travel and tourism industry. It is involved in the better development of travel and tourism industry globally. This is by the promotion of responsible, sustainable and universally accessible tourism to all individuals willing to travel to their destination sites. UNWTO comprises of 155 member states, 7 associate members, 2 permanent observers and over 400 affiliate members. The headquarters are based in Madrid, Spain. UNWTO secretariat led by the secretary general is composed of projects dealing with issues such as education, tourism and travel trends and marketing, sustainable development, statistics and the tourism satellite account, destination management, ethics and risks and crisis management. These issues are keenly taken into consideration, and the appropriate measures are taken so as to solve them correctly . United Nations World Tourism Organization (UNWTO) works hand-in-hand with various United Nations bodies, private and government organizations in order to fully attain the objective of growth and development of the tourism industry and also attain the Millennium Development Goals (MDGs). UNWTO member states are joined by a global cooperation of tourism organizations where there is the benefit of networking, interactions, business interaction, financial market incline, education and the promotion of universally accessible travel and tourism. UNWTO believes that international tourism is the key to development, prosperity and well- being of the world as this will help in the achievement of the United Nations Millennium Development Goals (MDGs) which works towards the eradication of poverty and the better development of countries supported by the United Nations.

Saturday, November 2, 2019

History and Culture of Medieval Italy Essay Example | Topics and Well Written Essays - 1750 words

History and Culture of Medieval Italy - Essay Example For more than four centuries Italians were struggling to preserve their identity. Italy cannot be referred to it as merely the geographic unity, it is the national identity shaped and modified by culture of Medieval Italy which evolved into the nation known as "Italians" to the world today. From the early medieval ages, Italians were different from their neighbours. They preferred to live on the tops of the hills, while the Romans lived in the valleys (Hodges 47). Based on the interpretation of the medieval monastic sources, hilltop villages evolved along with the Italian life out of the introduction of the monetary economy in the 9th century. This transformation has led to the process of incastellamento - the foundation of castelli on the top of the hills. Notably, Italian cities had the tendency not to grow, but to reduce as well. Unlike many other Italian urban centres, Florence's growth has declined in the 7th and 8th centuries, while Rome and Milan became the centres occupied only by aristocracy. Rural estates and houses of aristocracy were built in the distinct towns. Hodges continues that "the collapse of the Roman Empire in the 6th century led to the rural communities of the peasants reshaping the landscape and defining their own rules" (48). The economy activity in rural regions was insignificant and there is the evidence that town and country were truly separated in economic, social and political life. Even though Italy was the distinct community with common heritage, culture was embraced by only a handful of intellectuals – Dante, Petrarch, historian Guicciardini, and few others. ... Their works were the bonds of material and emotional importance which linked together the peninsular inhabitants and counterbalanced its fragmented structure. "While the Latin language had been replaced by a cluster of regional dialects, it remained the standard mode of discourse of university education and of the professions of law, medicine, and theology" (Brucker 1). In addition to common language, Italians shared the same administration of justice - it was based on the principles of Roman law and applied in every Italian court. The power of Roman papacy in Italy was due to its wealth, administrative structure, and regulation of religious practices and beliefs. Despite of the great influence of Roman Empire over the Italy, Italian cities and towns managed to retain the physical features of those ancient sites. A native of Naples could travel to any other city and feel at home: the buildings, the streets, the social structure and culture were all the same (Brucker 1). Traders were the most cosmopolitan segment of the medieval Italy and travelled along with the pilgrims, soldiers seeking employment and workers. Such unity with the citizens without permanent place of living and similarity of all towns, helped to create the feeling of belonging to the community larger than their native village. The Roman papacy was the only Italian institution that provided the focus on the Italian history in the early medieval ages. The papacy had the direct influence on the every region and medieval popes were so preoccupied with the concerns for their security as well as with the expanding authority over the whole society, that they unwillingly shaped the Italian national identity.