Sunday, December 29, 2019

Women and Property in Great Expectations Essay - 1888 Words

Women and Property in Great Expectations Women and property is one of the central themes in Charles Dickens Great Expectations. Dickens wrote this novel during the mid-nineteenth century, a period when womens property rights were being intensely debated in England. His depiction of propertied women in the novel reflects Victorian Englands beliefs about womens inability to responsibly own and manage their own property. Miss Havisham is presented as the embodiment of womens failure to properly manage wealth and property. Mr. Havishams settlement of the bulk of his estate on his daughter, despite the existence of a male heir, is unconventional, as the property system operated on a patrilineal basis. Estellas†¦show more content†¦Havisham was very displeased with his son and considered disinheriting him, but relented on his deathbed and left him well off, though not nearly so well off as Miss Havisham (176; ch. 22). Mr. Havisham believed he was making a sensible decision in bypassing the patrilineal system a nd settling most of his wealth and brewery on his daughter. Thus, Miss Havisham is now situated as the character through whom Dickens presents and explores the social and economic consequences of propertied women. Susan Walsh argues that Miss Havisham is an important index to the local economies beneath the more ahistorical fairy tale motifs that structure Great Expectations; she is one of the means by which Dickens demarcates the commercial parameters within which Victorian men operated (74). As an unmarried woman in Victorian England, Miss Havisham enjoys the legal status of feme sole, which gives her complete control over her wealth and property. Miss Havisham, now a wealthy young heiress, becomes the target of an opportunistic swindler. She falls in love with Compeyson and accepts his marriage proposal. Miss Havishams love for Compeyson makes her vulnerable to the systematic way, that he got great sums of money from her (177; ch. 22). Against the advice of Mr. Pocket, Miss Havisham is induced by Compeyson to buy her brother out of a share inShow MoreRelatedEssay about The Volatile Role of the Women in Great Expectations1081 Words   |  5 PagesThe women in the novel, Great Expectations, are not given the ample opportunities that they would have liked in order to live out their lifelong dreams and hopes. Instead, they have some type of devastating impact that has been brought upon them through a situation that they themselves cannot help. This is evident in th e lives of Mrs. Joe, a mere teenager who is forced to raise her brother in a time that is hard to support herself, and Miss Havisham, an elderly woman who’s dreams were torn awayRead MoreAnalysis Of Chopin s Desiree s Baby 1125 Words   |  5 Pagesher points of inequalities and expectations. White males, in this confused time, are the most privileged. Slaves are the most under privileged beings, then women not being far away from slaves in the Inequality totem pole. Being fair, white men have just as many expectations as women. White men though cannot keep up though to the inequalities women possess. This essay will emphasize the different contrasts Chopin uses to demonstrate the inequalities and expectations of different genders, races, andRead MoreWomen During The Elizabethan Era1456 Words   |  6 Pageswas a woman on the throne, the expectations of women did not change and stayed very much similar to when men were King. Women were absolutely not permitted to enter professions such as medicine, law or politics, however they did have some freedom with jobs such as domestic jobs such as maids and cooks, but primarily focused on the functionality of the family (Campbell 150). They were not allowed to engage in the arts such as theatre or performances of that nature. Women were also unable to vote, asRead MoreGender Expectations and Women ´s Role During the Elizabethan Era953 Words   |  4 PagesIntroduction Gender expectations limited personal choice to a great extent during the Elizabethan Era. The Elizabethan Era was the period in which Elizabeth I ruled England from 1558-1603. There was a strong view on women should be the property of men and must obey them. William Shakespeare influenced this time period massively and incorporated the different gender roles and expectations into his plays. Personal is defined as something concerning ones private life, relationships, and emotions ratherRead MoreTo Be Woman in Post-Revolution America1468 Words   |  6 PagesRevolution mean for the women of America? Some scholars say the Revolution did little to change life for her at all, while others argue that the Revolution was the catalyst of change that paved the way for a more independent American woman. The argument of a woman’s property rights became a hot topic in the court systems of post-Revolution America. Women we key in raising productive members of society and the idea of Repub lican motherhood was born. In order to raise educated children, women had to be educatedRead MoreCompare How Male Female Relationships in Two of the Following Emma, Wuthering Heights and Great Expectations-- Reflect the Mores and Values of Victorian Society1467 Words   |  6 PagesWuthering Heights and Great Expectations-- reflect the mores and values of Victorian society â€Å"The Victorian period formally begins in 1837 (the year Victoria became Queen) and ends in 1901 (the year of her death)† (Kirschen).  British novels such as Wuthering Heights and Emma reflect and uphold mores and values of the Victorian society. This is portrayed through the characters in the novels where high priority is given to the male female relationships and the expectations of society. The timeRead MoreEssay about The Joy Luck Club1355 Words   |  6 Pages 2. Much like to their parents and elders, Chinese girls were supposed to be quiet and obedient to their husbands and mothers-in-law. Girls were supposed to respect, and not openly question the decisions that were made in the household. These women were taught to always ask what the husband wants and to ignore their own wants and needs. Chinese wives were there mainly to provide the mother-in-law with grandsons. 3. Chinese victims of rape were treated with complete disrespect and disbeliefRead MoreEdna Pontellier and Elizabeth Bennet: Challenge of 19th Century Conventional Methods1344 Words   |  6 PagesKate Chopin and Jane Austen could readily be referred to as literary heroines of the nineteenth century. Both women often challenged conventional societal methods within their works, which inherently caused these literary geniuses to write in complete secrecy. Chopin and Austen gave birth to characters such as Edna Pontellier in The Awakening, and Elizabeth Bennett, the renowned protagonist of Austen’s novella Pride and Prejudice. While noble in their respective ways one can easily mistake Edna andRead MoreThe Complex Biology Of The Female Body866 Words   |  4 Pagessex is solely what makes a woman. This would be reducing humans to the animal level, and would be inaccurate because humans above all are social beings. In society today, gender roles and stereotypes put pressure on a woman to conform to cultural expectations. Is there a disconnect between who a woman feels she is on the inside and whom the outside world expects a woman to be because of her body? It seems to be that a combination of the biology and the way a woman identifies with herself would be theRead MoreAn Abstract of Bernards the Good-Provider Role: Its Rise and Fall of the Good Provider1481 Words   |  6 Pages The Good-Provider Role: Its Rise and Fall, surprisingly begins with a reference to Psalm 23 and then pivots into the Israelites journey from Egypt to Canaan, thus depicting God as the original good provider. Subsequently the role of the second â€Å"great provider† was fulfilled by the mother, who according to Bernard was the known â€Å"gather, planter, and general factotum† (Bernard 1981:43). As depicted by the following chart, it is overwhelmingly evident that the woman’s role as the â€Å"good provider† superseded

Saturday, December 21, 2019

The Shawshank Redemption By Stephen King And Frank...

In the following paper, I will talk about the movie The Shawshank Redemption. I will include the plot, characters, contrasting and comparing pieces of information from the book to the movie, and the lesson I gained from this assignment. The Shawshank Redemption was written and directed by Authors Stephen King and Frank Darabont in 1994. The scene takes place at Shawshank Prison located in Maine. The film tells the story of Andy Dufresne, a quiet banker who is sentenced to life in the penitentiary for the murder of his wife and her secret lover. During his time at the prison, Andy becomes friends with a fellow inmate, Ellis Boyd â€Å"Red† Redding and he finds himself protected by the guards after Warden Norton begins using him in his money-laundering operation. In 1947 Portland, Maine, banker Andy Dufresne is convicted of murdering his wife and her secret lover, and is sentenced to two consecutive life sentences at the Shawshank State Penitentiary. Red procures a rock hammer and later a large poster of Rita Hayworth for Andy. Working in the prison laundry, Andy is regularly assaulted by the Sisters and their leader, Bogs. During an outdoor work detail, Andy overhears the captain of the guards, Byron Hadley, complaining about being taxed on an inheritance, and offers to help him legally shelter the money from the IRS. After an assault by the Sisters nearly kills Andy, Hadley beats Bogs severely enough that he never walks nor eats solid foods again, and is transferred to aShow MoreRelatedThe Brilliant Film, Shawshank Redemption Essay1576 Words   |  7 PagesCompanion To the Movies Title and Year: â€Å"Shawshank Redemption† (1994) Director: Frank Darabont (based on the Stephen King novel) Actors: Tim Robbins, Morgan Freeman, Bob Gunton, and William Sadler. The Shot Long/medium/close-up: Roger Deakins, the film’s cinematographer, and director Frank Darabont worked together to create this wonderful and classical film heavily utilizing long shots, close ups, and slow zooms. Throughout the film â€Å"Shawshank Redemption†, a series of shots take place where theRead MoreSpellbinding Metamorphosis. The Evolution Of The Shawshank1321 Words   |  6 PagesSpellbinding Metamorphosis The evolution of the Shawshank Redemption, from the literary prose of Stephen King to the cinematography of director and screenplay writer Frank Darabont, is nothing short of a spellbinding metamorphosis. Stephen King, diverging from his prolific tales of horror, presented his audience, Different Seasons, a collection of novellas in which, â€Å"Rita Hayworth and the Shawshank Redemption†, is included. It is a story of the hope, courage and friendships that, main characterRead MoreRita Hayworth And The Shawshank Redemption Analysis1362 Words   |  6 PagesClose Comparative Analysis Of Stephen King’s Rita Hayworth and the Shawshank Redemption and Frank Darabont’s The Shawshank Redemption When comparing the ending of Stephen King’s novella, Rita Hayworth and the Shawshank Redemption with the ending of the 1994 film adaptation by Frank Darabont, The Shawshank Redemption, there are key differences. These include additions, removals and slight changes in the narrative which arguably make the storyline better suited to the completely different mediumRead More Stephen Kings Shawshank Redemption Essays777 Words   |  4 PagesStephen Kings Rita Haywort and the Shawshank Redemption Rita Haywort and the Shawshank Redemption was first presented in 1982, by Stephen King and hooked the hearts of the worlds readers. Literature reviews were immediately written about the book and quickly recognized as one of the years best. Rek Rehn, a book reviewer for Mouth Shut.com Wrote: This book is the jewel of the crown, a tender tale of hope, friendship and retribution. Years later in 1994, Shawshank Redemption was again recognizedRead MoreShawshank Redemption Themes800 Words   |  4 PagesFrank Darabont directed The Shawshank Redemption and wrote the screenplay based on the novel Rita Hayworth and Shawshank Redemption by author Stephen King. The movie was made in 1994 and produced by Niki Marvin. The movie stars Morgan Freeman and Tim Robbins as two convicts serving time in a New England prison named Shawshank. Tim Robbins plays a man named Andy Dufresne, a banker, who gets convicted of murdering his wife and her lover and is sent to prison in Shawshank. Andy eventually bec omes goodRead MoreShaw Shank Redemption1162 Words   |  5 PagesA Critique of the Shaw shank Redemption Evil spreads around the world. It makes people do bad things to each other so it creates dangerous environment. Therefore people makes place which is called prison to punish these bad people. The persons who live in prison are called inmates. Most of inmates who are dangerous and guilty spend many years in prison because of crimes they did in the past. In the USA, there are many prisons because it has hugs population. In this paper, it will be mentioned ShwshankRead MoreThe Shawshank Redemption1051 Words   |  5 PagesReview A story of hope is just about the last thing youd expect to find in a prison movie. But in  The Shawshank Redemption, thats exactly what you get. Shawshank  is the story of Andy Dufresne (Tim Robbins), a man convicted of murdering his wife and her lover and shipped to a maximum-security prison in Shawshank, Maine, for two consecutive life sentences. Over the next years (two hours, movie time), he finds his way to inner peace and self-reliance in the midst of the terror and inequity ofRead MoreThe Shawshank Redemption Is A Legend Of The 1990s1232 Words   |  5 PagesIntroduction The 1994 prison escape thriller The Shawshank Redemption is a legend of the 1990s. It has been acclaimed as the best prison movie to this date according to IMDb (Stenberg). Many movies following The Shawshank Redemption have tried and failed in their attempts to recreate this behemoth of a movie. Being the critically acclaimed movie that it is, The Shawshank Redemption is bound to have countless reviews critiquing and praising every aspect of the plot, director, setting, and countlessRead More The Shawshank Redemption Essay1401 Words   |  6 Pages The Shawshank Redemption is a prison movie that is based on a book by Stephen King and directed by Frank Darabont. The movie is not the average bloody horror movie; instead, it takes you to a place where your worst nightmares come alive. The tremendous performance by Morgan Freeman and other actors has truly brought this film to life. The emotions characters portrayed were so real that every one could feel compassion toward them. The Sh awshank Redemption, a contribution to the working man, illustratesRead More The Shawshank Redemption: A Comparison of the Short Story and the Film809 Words   |  4 Pages The Shawshank Redemption by Stephen King is both a wonderful film and a brilliantly written short story. There are many themes represented in each form of The Shawshank Redemption. The one major theme that interests me in both the film and the story is freedom. Freedom serves a large purpose for both the storys writer and the filmmaker. Both use similar examples to signify freedom, not only in the jail, but also in a larger context about life. There are many events and examples in both the

Friday, December 13, 2019

America’s First Black President Free Essays

America’s First Black President Years of terror and war brought Americans of all ethnicities to believed that a time for change had come; change came in the form of two minorities who had the ability and desire to revitalize a country that had been burdened with doubt and financial frailty. Times have changed, race is still controversy topic, but due to programs like Affirmative Action and the Equal Employment Opportunity Act, minorities are stepping up to take places of power in our country. African Americans are no longer the disadvantaged citizens they once were considered to be, the media, internet and entertainment industries have evolved the thinking of Americans leading to the social acceptance of African Americans and other minority groups. We will write a custom essay sample on America’s First Black President or any similar topic only for you Order Now Americans’ have elected their first minority President and he won’t be the last. After 43 Presidential elections Americans made history by elected their 44th President, in 2008 Barack Obama, an African American man, was nominated and elected President of the United States. Obama was not the first African American to run for the honored position as United States President, the honor of the first African American who ran for this position belongs to a woman. In 1968, as a Democratic Party nomination for Presidency, Shirley Chisholm of New York made history by running not only being the first African American woman to run for President. She was followed by Jesse Jackson who ran for President in 1984 and 1988 and Lenora Fulani who also ran in 1988. In 2004, Carol Mosely Braun and Minister Al Sharpton also ran as Democratic Party candidates for United States President. The only African American Republican to run for President has been Alan Keys, he ran in 1996 and 2000. Obama faces criticism for not being ‘black enough’ even though anyone with even a small percentage of African American blood is considered, mixed blood has never before kept a man from being considered ‘black’ until the chance of a ‘black man’ being elected President became probable. For example, historical evidence has shown that Warren G. Harding the 29th President of the United States, serving from 1921 1923 was an ‘octoroon’ passing as white, with one African-American great-grandparent. Evidence of his mixed ancestry and the efforts to cover it up by his family because in the 1920’s even a hint of African American ancestry would have ruined his political career. Obviously even an individual with a smaller percentage of African American blood than President Barack Obama have been deemed ‘black enough’ for it to ruin their careers so claims that President Obama isn’t black enough are unfounded and just another attempt to belittle and criticize a black man for attempting to be great. African American have desired to lead their country for half a century, their country however, wasn’t ready for a minority leader until the state affairs became a mockery that was questioned by both it’s citizens and foreign allies. Some say that President Obama was the least qualified of all major candidates in both parties and the farthest to the left; with absolutely no military experience and no foreign policy experience. If this is true, then the question that begs to be answered is what prompted Americans to elect him as their President. Is the war on terror the only contributing factor that resulted in the election of an African American man as President of a country who historically only elected married Christian white middle aged males as their President or did the power of the media and youth lead to this victory? No, the war on terror is not what determined the 44th President of the United States. President Obama’s landmark victory was due, in part, to a groundswell of support among young Americans; he won nearly 70% of the vote among young Americans under 25. Unlike the African American who ran in the past President Obama had the media in his corner; the internet with social networking sites like Facebook and Youtube had significant impact on each candidate’s ability to garner voters support. With 2 million American supporters on Facebook and over 1500 video’s on YouTube about Barack Obama, it’s no wonder that his name and face was recognizable by so many. When Barack Obama first announced his candidacy, many said that America was not ready to elect a black president and that he could not garner the votes necessary to defeat first the Democratic favorite, Hillary Clinton, and later John McCain in a nationwide election. Understanding the power of the media and influence American youth who are taking more active roles in politics is how President Barack Obama and his team managed to accomplish the difficult task of getting an African American elected as President. Debaters still argue whether that American’s first African American President is qualified for his role or not; the fact remains that whether he is ready or not his is President and has a duty to do his best just as the Presidents before him have done. Race, ethnicity, gender and sexual orientation should not have any bearings on the qualification of a presidential candidate; the fact that these characteristic do have influence the perception of a person’s ability proves that America hasn’t come as far as many minorities would hope for. Shunryu Suzuki says â€Å"Without accepting the fact that everything changes, we cannot find perfect composure. But unfortunately, although it is true, it is difficult for us to accept it. Because we cannot accept the truth of transience, we suffer. † A change has been made, it’s up to American citizens to accept that minorities are no longer minorities; men and women of every race, religion and sexual orientation know that in electing an African American as President we are one step closer to genuine equality in all Americans. How to cite America’s First Black President, Essay examples

Thursday, December 5, 2019

Data Encryption Standards For Wimax Samples †MyAssignmenthelp.com

Question: Discuss about the Data Encryption Standards For Wimax. Answer: Comparison of data encryption standards for WiMAX WiMAX or Worldwide Interoperability for Microwave Access is a coalition of the wireless industry for the advancement of IEEE 802.16 standards for broadband wireless access (BWA) networks. WiMAX (Pareit et al., 2012) is commonly known as 4G network and is a wireless wide area network (WAN) that can cover the area same as DSL lines but without wires. 3DES (Data Encryption Standard) (Singh, 2013) and AES (Advanced encryption standard) (Ahmad Ismail, 2016) is used by WiMAX to encrypt the data transferred on the network. The 3DES uses three different keys to encrypt the data. Each data is of the length of 56-bits each. In some softwares the performance becomes slow due to the use of this three keys. The 3DES is becoming obsolete due to its slow performance and the limit of length of the keys. Advanced Encryption Standard (Rewagad Pawar, 2013) is the main tool used for encryption in WiMAX technology. Encryption key of 128-bit, 192-bit and 256-bit is supported by the advanced encryption s tandard. AES is a popular algorithm which was built from CCMP. 3DES is much slower than AES. Advanced Encryption standard is much more easy to implement and a very little memory is used. However, AES does not require dedicated processors on board the BS, and m their might be a risk of not being used by all end-user terminals. Initially this helps in considering the fact that 3DES still remains a vital encryption tool on the WiMAX (Dadhich, Narang Yadav 2012) network in spite of the presence of advanced encryption standard. Security challenges faced by WAPN technology: The most common WAPN technology are the Bluetooth and the ZigBee network. Both this technology faces the same difficulty as that of the security issues faced by the wireless technology. Security challenges faced by Bluetooth technology are listed below: Eavesdropping This is a process by which an attacker can sniff into the air of Bluetooth transmission and exploit the right vulnerabilities, read or listen to the data (Saliou et al.). That means someone is conversing using a Bluetooth headset then someone can potentially listen to it. Bluesnarfing This is a process in which an attacker can pair to a device and once devices are paired, access and steal information from the Bluetooth device becomes very easy. The pairing is usually done without the knowledge of the user, which possiblyresults in stolen contact information, photos, videos, calendar events, and more (Ketari Khanum, 2012). Blue bugging- An attacker caneasily remote control the various aspects of the users device. Sending of outgoing calls and texts, forwarding of incoming calls and texts, change of settings, and watching of screens and keypresses and many other things (Rawat Bhattacharya, 2016). Denial of servicein this process an attacker can put unwanted stuffs in the users device, block the communications, drain the battery of the device, or even crashes the device. Security challenges faced by ZigBee technology: Sniffing: there are many networks which do not use proper encryption as a result the attackers take advantage to sniff all the communications with the proper use equipments. in this attack all the information from a network is collected, which is possible in a network which implements the standard generic security level protocols for communication (Olawumi et al., 2014). Replay attack: Recording of the approved traffic on a network by the attacker is done in this type of attack and paly it later which causes a malicious effect. This attacks are straight forward for ZigBees which do not implement a do not implement any encryption for the communication (Vidgren et al., 2013). Physical Attacks: This attacks are most common which involves the interfering of ZigBee devices by locating it. Hard coded encryption keys which are loaded in the RAM are often employed by radios operating in the ZigBee network once the device is powered.as the devices in the network are disturbed and flashed so there remains a possibility of replacing the keys becomes less and having known the issues the attackers can set up special serial interfaces in order to intercept the encryption key in the ZigBee device when the power rises from flash to RAM (Ramsey, Mullins White, 2012). Denial of Service-This is an another method along with the one mentioned above which makes the ZigBee network unsafe. Signal jamming, reflexive jamming, maximization of frame counter are some other problems faced by the network (Bahl, Sharma Verma, 2012). Paper Review: Energy Harvesting Faisal Karim, and Sherali Zeadally. "Energy harvesting in wireless sensor networks: A comprehensive review." Renewable and Sustainable Energy Reviews 55 (2016): 1041-1054. This article discusses about the energy harvesting techniques used in daily lives. Harvesting of energy is one of the emerging technology related to applications on indoor and outdoor environment. The demands for energy harvesting as increasing with the advancement of microelectronics and MEMS. This rep article also discusses about the problems and applications of energy harvesting. This has gained the attention of various stallholders which involves designs and implementation of this technology to face the energy demands of future wireless sensor networks. Moreover, this article focuses on the techniques required to meet the future energy demands of the WSNs. Specifically, this focuses on the classifications of the schemes used on energy harvesting techniques in WSNs. The article has thoroughly reviewed the classes and sub classes of energy harvesting techniques and the harvester mechanism along with the efficiency of the harvester. For each category the harvester hardware system ha s different design and has different harvesting capabilities. The different designs of the harvester determine the efficiency of the harvester. A survey has been conducted on various models aimed to predict the future energy cycles. The survey has proved that only few predictions technique has been used still far to in the area of modeling which states that the state-of-the-art is still immature. Addressing of several open research challenges still need to be done in the future which includes the need to focus on the miniaturized generic harvesters. This can later be used in different environments with energy sources that are dynamic. Major reason for deploying energy harvesting technique is due to the major problem faced by WSN regarding energy. In cases if the energy the sensor nodes depletes then the role is no longer played, unless and until a new source of energy is used or no other harvesting technique hasnt been introduced to fulfill the energy gap. Ulukus, Sennur, et al. "Energy harvesting wireless communications: A review of recent advances." IEEE Journal on Selected Areas in Communications 33.3 (2015): 360-381. 4. This article summarizes the application of energy harvesting in a broad area of wireless communication network. This article has covered a variety of topics which includes the information-theoretical and physical layer of performance limit to the scheduling policies and medium access control protocol. This article also discusses about the emerging model of energy transfer and cooperation that occurs with the information transfer of the wireless network. The article has also presented a model of total energy consumption. The threats faced by energy harvesting from physical and practical concerns has made this technique face new challenges. Taking practical conditions mathematical formulas are designed which increases the set of possibilities. The discussion of the energy and information transfer provides exciting possibilities that can be adapted in the future to adapt the network operations with improved performance. References: Ahmad, R., Ismail, W. (2016). Performance Comparison of Advanced Encryption Standard-128 Algorithms for WIMAX Application with Improved Power-Throughput.Journal of Engineering Science and Technology,11(12), 1-17. Bahl, N., Sharma, A. K., Verma, H. K. (2012). On Denial of Service Attacks for Wireless Sensor Networks.SYSTEM,17, 18. Dadhich, R., Narang, G., Yadav, D. M. (2012). Analysis and Literature Review of IEEE 802.16 e (Mobile WiMAX) Security.International Journal of Engineering and Advanced Technology,1, 167-173. Ketari, L., Khanum, M. A. (2012). A review of malicious code detection techniques for mobile devices.International Journal of Computer Theory and Engineering,4(2), 212. Olawumi, O., Haataja, K., Asikainen, M., Vidgren, N., Toivanen, P. (2014, December). Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned. InHybrid Intelligent Systems (HIS), 2014 14th International Conference on(pp. 199-206). IEEE. Pareit, D., Lannoo, B., Moerman, I., Demeester, P. (2012). The History of WiMAX: A Complete Survey of the Evolution in Certification and Standardization for IEEE 802.16 and WiMAX.IEEE Communications Surveys and Tutorials,14(4), 1183-1211. Ramsey, B. W., Mullins, B. E., White, E. D. (2012, October). Improved tools for indoor ZigBee warwalking. InLocal Computer Networks Workshops (LCN Workshops), 2012 IEEE 37th Conference on(pp. 921-924). IEEE. Rawat, D. B., Bhattacharya, S. (2016). Wireless Body Area Network for Healthcare Applications. InAdvanced Methods for Complex Network Analysis(pp. 343-358). IGI Global. Rewagad, P., Pawar, Y. (2013, April). Use of digital signature with diffie hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. InCommunication Systems and Network Technologies (CSNT), 2013 International Conference on(pp. 437-439). IEEE. Saliou, D. A., Al-Khateeb, W. F. M., Olanrewaju, R. F., Fatai, S. Dual Authentication For Bluetooth Connection. Shaikh, F. K., Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A comprehensive review.Renewable and Sustainable Energy Reviews,55, 1041-1054. Singh, G. (2013). A study of encryption algorithms (RSA, DES, 3DES and AES) for information security.International Journal of Computer Applications,67(19). Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., Huang, K. (2015). Energy harvesting wireless communications: A review of recent advances.IEEE Journal on Selected Areas in Communications,33(3), 360-381. Vidgren, N., Haataja, K., Patino-Andres, J. L., Ramirez-Sanchis, J. J., Toivanen, P. (2013, January). Security threats in ZigBee-enabled systems: vulnerability evaluation, practical experiments, countermeasures, and lessons learned. InSystem Sciences (HICSS), 2013 46th Hawaii International Conference on(pp. 5132-5138). IEEE.