Saturday, December 28, 2019

Mary White Rowlandson

Known for:  Indian captivity narrative published 1682 Dates: 1637? - January 1710/11 Also known as: Mary White, Mary Rowlandson About Mary White Rowlandson Mary White was probably born in England to parents who immigrated in 1639. Her father was, at his death, wealthier than any of his neighbors in Lancaster, Massachusetts. She married Joseph Rowlandson in 1656; he was ordained as a Puritan minister in 1660. They had four children, one of whom died as an infant. In 1676, near the end of King Philips War, a group of Nipmunk and Narragansett Indians attacked Lancaster, burned the town and captured many of the settlers. Rev. Joseph Rowlandson was on his way to Boston at the time, to raise troops to protect Lancaster. Mary Rowlandson and her three children were among them. Sarah, 6, died in captivity of her wounds. Rowlandson used her skill in sewing and knitting so she was useful while the Indians moved around in Massachusetts and New Hampshire to elude capture by the colonists. She met with the Wampanoag chief, Metacom, who had been named King Philip by the settlers. Three months after the capture, Mary Rowlandson was ransomed for  £20. She was returned at Princeton, Massachusetts, on May 2, 1676. Her two surviving children were released soon after. Their home had been destroyed in the attack, so the Rowlandson family reunited in Boston. Joseph Rowlandson was called to a congregation in Wethersfield, Connecticut, in 1677. In 1678, he preached a sermon about his wifes captivity, A Sermon of the Possibility of Gods Forsaking a People that have been near and dear to him. Three days later, Joseph died suddenly. The sermon was included with early editions of Mary Rowlandsons captivity narrative. Rowlandson married Captain Samuel Talcott in 1679, but no later details of her life are known except some court testimony in 1707, her husbands death in 1691, and her own death in 1710/11. The Book Her book was written to retell the details of Mary Rowlandsons captivity and rescue in the context of religious faith. The book was originally titled The Soveraignty Goodness of God, Together with the Faithfulness of His Promises Displayed; Being a Narrative of the Captivity and Restauration of Mrs. Mary Rowlandson, Commended by her to all that Desire to Know the Lords Doings to, and Dealings with Her. Especially to her Dear Children and Relations. The English edition (also 1682) was retitled A True History of the Captivity and Restoration of Mrs. Mary Rowlandson, A Ministers Wife in New-England: Wherein is set forth, The Cruel and Inhumane Usage she underwent amongst the Heathens for Eleven Weeks time: And her Deliverance from them. Written by her own Hand, for her Private Use: and now made public at the earnest Desire of some Friends, for the Benefit of the Afflicted. The English title emphasized the capture; the American title emphasized her religious faith. The book became an immediate best-seller and went through many editions. It is widely read today as a literary classic, the first of what became a trend of captivity narratives where white women, captured by Indians, survived overwhelming odds. Details (and assumptions and stereotypes) about the life of women among the Puritan settlers and in the Indian community are valuable to historians. Despite the overall emphasis (and title, in England) stressing cruel and inhumane usage... amongst the heathens, the book is also notable for conveying an understanding of the captors as individuals who suffered and faced tough decisions -- as human beings with some sympathy towards their captives (one gives her a captured Bible, for example). But beyond being a story of human lives, the book is also a Calvinist religious treatise, showing the Indians as instruments of God sent to be a scourge to the whole Land. Bibliography These books may be helpful for more information on Mary White Rowlandson and on Indian captivity narratives in general. Christopher Castiglia.  Bound and Determined: Captivity, Culture-Crossing and White Womanhood. University of Chicago, 1996.Kathryn and James Derounian and Arthur Levernier.  Indian Captivity Narrative, 1550-1900. Twayne, 1993.Kathryn Derounian-Stodola, editor.  Womens Indian Captivity Narratives.  Penguin, 1998.Frederick Drimmer (editor).  Captured by the Indians: 15 Firsthand Accounts, 1750-1870.  Dover, 1985.Gary L. Ebersole.  Captured By Texts: Puritan to Postmodern Images of Indian Captivity.  Virginia, 1995.Rebecca Blevins Faery.  Cartographies of Desire: Captivity, Race, and Sex in the Shaping University of Oklahoma, 1999.on an American Nation.June Namias.  White Captives: Gender and Ethnicity on the American Frontier.  University of North Carolina, 1993.Mary Ann Samyn.  Captivity Narrative.  Ohio State University, 1999.Gordon M. Sayre, Olaudah Equiano and Paul Lauter, editors.  American Captivity Narratives. D C Heath, 2000.Pauline Turner Strong.  Captive Selves, Captivating Others.  Westview Press, 2000.

Friday, December 20, 2019

Masculinity Theory - 1630 Words

Google defines masculinity as a possession of qualities traditionally associated with men, using, handsome, muscled, and driven, hes a prime example of masculinity as their example. Although this definition of masculinity is common, it is undeveloped and exclusive to other forms of masculinity. Sociologists such as Raewyn Connell, Eric Anderson and Michael Kimmel have formed their own theories and definitions of masculinity. In this course, we have read an excerpt from Eric Anderson’s, Inclusive Masculinities, Raewyn Connell’s, Masculinities and Gender; In World Perspectives, and Michael Kimmel’s book, Manhood in America; A Cultural History to answer questions about the social construction of masculinity, how it is performed, how it†¦show more content†¦In his book, Inclusive Masculinities; The Changing Nature of Masculinities, Anderson analyzes homophobia, the development of homohysteria (â€Å"homosexually-panicked culture in which suspicion [of ho mosexuality] permeates†) and the change in the dynamics of male relationships. Anderson also analyzes Connell’s HMT and suggest that while her theory may have been a useful way of understanding masculinities in the late 1900’s, masculinity is evolving. Anderson explains how the HMT suggests that masculinity ascribed, constant and one has little to no chances of climbing the gender hierarchy. After doing research on athletes and college students and realizing that HMT could not account for the relationship dynamics of these young men, Anderson developed an opposing theory—the inclusion theory. The inclusion theory suggests that male relationships are evolving and that social stigmas towards homosexuality are decreasing as well as misogynistic views/opinions over time. Anderson believes that, although some may continue to hold conservative beliefs about masculinity, there is a movement among younger generations that is more accepting and encouraging of fluid presentations of masculinity. Michael Kimmel’s, Manhood in America; A Cultural History, traces masculinity over time, starting in colonial times to present day. Kimmel conducted his research by examining American cultural history through media representationsShow MoreRelatedMasculinity And Social Cognitive Theory851 Words   |  4 PagesMASCULINITY IN CHEVROLET SOCIAL COGNITIVE THEORY AUDIENCE ANALYSIS Chevrolet has created a commercial based on the actions of women who prefer â€Å"masculine† male drivers versus â€Å"passive† drivers. The message is intended for men, however, it also has a major influence over women due to the severity of their opinion about men. Masculinity and insecurity coincide with each other creating the idea for men to prefer to have the object the leans toward them being the real men women desire. Men who areRead MoreMasculinity Theory From Novels Of Treasure Island, By Joseph Kestner1664 Words   |  7 Pagesmurder and remains haunted by the experience as a nightmare,† (Masculinities in British Adventure Fiction, 1880-1915). He specializes in masculinity theory from novels written in the late nineteenth century. Kestner can relate to Jim because he is forced to become a new person, kill a human to save his own life, and questions why situations happen. Unlike in Stevenson’s text, Wyeth’s illustration depicts Jimâ€⠄¢s stereotypical masculinity through poses and symbolism, thereby suggesting his gendered maturationRead MoreThe Theory Of The Glass Ceiling Metaphor Essay1628 Words   |  7 PagesTheoretical perspectives Several theories have been utilized to guide research exploring the glass ceiling metaphor. The social role theory explains the labor division between men and women and the difference in their leadership style (Sabharal, 2015). Men are regarded as more agentic- aggressive, dominant, and independent. Women behaviors are more communal- empathetic, nurturing and kind. This theory posits that individuals might question the capacity of women in leadership roles, because requirementsRead MoreHegemonic Masculinity Is The Most Significant Theoretical Device For Understanding The Masculinity Hierarchy976 Words   |  4 PagesR.W. Connell’s (1995) concept of hegemonic masculinity is the most significant theoretical device for understanding the masculinity hierarchy. Demetriou (2001) states how hegemonic masculinity expresses two different social practices, from a social constructivist view. The first is that men benefit from the patriarchal system of society. The second process is that there is an â€Å"intramasculine hierarchy† by which the social order of men is created and maintained. Connell (1995) argues that this isRead More`` Dude You re A Fag : Masculinity And Sexuality Essay1536 Words   |  7 PagesC.J. Pascoe’s book, Dude You’re A Fag: Masculinity and Sexuality in High School, examines masculinity and its connection with sexuality through an eighteen-month study at River High School. The goal of Pascoe’s study is to explain how teenagers, teachers, and schooling construct adolescent masculinity through idioms of sexuality. In addition, the book investigates the relationships between gender and sexuality as it relates to a major social institution. Throughout the book she asks how heteronormitiveRead MoreReligion, Religion And Religion Essay1690 Words   |  7 Pagesconsider conversion therapy, ask for forgiveness from the Lord, or confess to the Virgin Mary. If one fails to comply by asking for forgiveness, one has not only committed a sin, but will also face judgement day by going to hell. Considering this theory, I do believe in the Bible and I agree, but I also believe that one should be free to choose who he or she wants to marry or love. That is, no one should be forced to live by what are claimed to be traditional norms and gender roles due to Christianity’sRead MoreLearning How to Fear in Popular Media Essay652 Words   |  3 Pagesfemininity by massaging his muscles as a sign of attending to the mans desires. In the hook, 50 Cent states he does not fit the stereotypical image of a pimp with a Cadillac and perms, but nonetheless he is a pimp. By implementing the Code of the Street theory, one can assume that 50 Cents uniqueness should earn him more respect in the pimping community because he does not resort to the clichà © pimp image in order to be successful (Contreras 467). In the first verse, the scene is focused on 50 Cent withRead MoreMasculinity as Homophobia by Michael S. Kimmel1532 Words   |  7 Pagesin public. In Michael S. Kimmel’s work, Masculinity as Homophobia, he reveals the great secret of all men: We are afraid of other men. Kimmel urges the reader to realize that men are grouped into very distinct and limiting meanings of masculinity. He states that men, whether consciously or subconsciously, fear being ostracized as being too feminine by other males, and it is this fear which continues a cycle of homophobia and exclusion within masculinity. Men are all putting on a mask, in an attemptRead MoreHow Does Biological Sex Affect Society?899 Words   |  4 Pagesfollow. The first value of manhood, is to not be female. Since western culture is a patriarchy, we view womanhood as an immediate assault on that power structure. This means that when men bring feminine energy into a space that are threat to the masculinity on other men which is a problem. This reminds of me of times I seen young boys get scolded for having a â€Å"limp hand.† Even something as small as the way you are bending your wrist cannot be feminized. The second, third, fifth values are be successfulRead More`` Iron John Written By Robert Bly Essay915 Words   |  4 PagesIron John written by Robert Bly, describes the differences between a â€Å"wild† and â€Å"savage† man. This essay will analyze the significance of both words and Bly’s theoretical considerations about masculinity towards Dave Egger’s character named Thomas, from â€Å"Your Fathers, Where Are They? And the Prophets, Do They Live Forever?† Bly believes it is crucial to distinguish the â€Å"Wild Man† from the savage. He mentioned, â€Å"The savage mode does great damage to soul, earth, and humankind; we can say that though

Thursday, December 12, 2019

The Young Years Adoph Hitler Was Born On April 20, 1889 And Lived In Essay Example For Students

The Young Years: Adoph Hitler Was Born On April 20, 1889 And Lived In Essay south Austria. He left for high school at the age of twelve and did poorly and never did finish. In 1903, his father died when Hitler was only fourteen years old. In 1907, Hitler decided to leave for Vienna to attend the Academy School of Fine Arts. Due to his unsatisfactory drawings, Hitler failed to be accepted. Soon after that, he received a letter from his sister informing him of his mothers illness, cancer. Hitler headed back home to stay with his mother until the end. His mother died in the year of 1907, and Hitler tried again at the Academy School of Fine Arts. He was, again, rejected due to severe competition of acceptance. Hitler sold his paintings on the streets in order to survive. In August 1914, Hitler volunteered for the army. Later in his army career he received two of the most honorable awards, the first class iron cross. A man told Hitler of a rumor stating the Bavarian government is going to break away from Germany and join Austria. Outraged, Hitler gave many persuasive speeches on why the government shouldnt break away. Later Hitler took over a group and renaming it NSADAP, which is infamously known as the Nazi party. Hitler tried taking over the Bavarian government by force. This invasion caused his imprisonment of five years, but he happened to be released after aboutsix months. While in prison, he began writing his book Mein Kamph (My Struggle). When Hitler was released from prison, he quickly found out that the Nazi party membership has fallen drastically. The party was no longer allowed to have private and public meetings and Hitler could no longer speak in public. Hitler was determined to bring the Nazi party back together. The party began to grow slowly and in secret, and after the stock market crash hundreds and soon thousands joined each month due to the public rallies produced by Hitler. With his popularity growing at an outrageous speed, Hitler decided to take over the whole country. Before the elections, he launched a major propaganda campaign. He soon won a seat in the Reichstag, German congress. Hitler had a chance at becoming Chancellor, but was beat out by the previous Chancellor, Charles Bruning. Now the Nazi was official the second largest party in the country, next to the Communist. Hitler was disgusted with the Communist party, and had their meetings attacked. At this time Hitler was not a German citizen, and a day before he was officially appointed Chancellor he became a German citizen. Hitler continued having storm troopers attacking Communist meetings. A close friend claimed to have official documents saying that the Communistswere planning a revolution. The Reichstag was later set on fire, and Hitler believed it was the beginning of the Communist Revolution. The Nazi partywas growing extremely fast, beating out the Communist party. In the Third Reich, Hitler had total control. Hitler came to realize that he must combine the powers of the president and the Chancellor. Though after the death of the President, he held an election to combine the companies. He launched another propaganda company, and he won. Hitler had total control, and he had to answer to no one. The expansion of on Germany began in 1938, when Hitlers army marched into Austria, and later into Czechoslovakia. The invasion of Poland 1939 triggered World War II, a war that last almost five years and cost the lives of nearly fifty million people. Hitlers intense racism led to the infamous Holocaust, in which, the exterminating of million innocent people, especially Jewish.On April 29, 1945, Hitler heard of Mussolinis death, and decided that he too should die. Then, he and Eva Braun, his girlfriend, sat on a sofa. .u1a26d023d33ff15b2fec31b4787ef055 , .u1a26d023d33ff15b2fec31b4787ef055 .postImageUrl , .u1a26d023d33ff15b2fec31b4787ef055 .centered-text-area { min-height: 80px; position: relative; } .u1a26d023d33ff15b2fec31b4787ef055 , .u1a26d023d33ff15b2fec31b4787ef055:hover , .u1a26d023d33ff15b2fec31b4787ef055:visited , .u1a26d023d33ff15b2fec31b4787ef055:active { border:0!important; } .u1a26d023d33ff15b2fec31b4787ef055 .clearfix:after { content: ""; display: table; clear: both; } .u1a26d023d33ff15b2fec31b4787ef055 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u1a26d023d33ff15b2fec31b4787ef055:active , .u1a26d023d33ff15b2fec31b4787ef055:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u1a26d023d33ff15b2fec31b4787ef055 .centered-text-area { width: 100%; position: relative ; } .u1a26d023d33ff15b2fec31b4787ef055 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u1a26d023d33ff15b2fec31b4787ef055 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u1a26d023d33ff15b2fec31b4787ef055 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u1a26d023d33ff15b2fec31b4787ef055:hover .ctaButton { background-color: #34495E!important; } .u1a26d023d33ff15b2fec31b4787ef055 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u1a26d023d33ff15b2fec31b4787ef055 .u1a26d023d33ff15b2fec31b4787ef055-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u1a26d023d33ff15b2fec31b4787ef055:after { content: ""; display: block; clear: both; } READ: Winnie Yang Essay He shot himself in his right temple as she bit into a poison capsule.

Wednesday, December 4, 2019

Computer Science and Electronics Engineering †MyAssignmenthelp

Question: Discuss bout the Computer Science and Electronics Engineering. Answer: Introduction: User interface is a design that takes the help of information technology to enable the interaction between a user and computer. Any user can communicate and use any applications and websites because of the presence of the user interface. Recent studies have shown that users prefer the use of no interface. They prefer to interact in a natural way rather than through any device. Information technology has starting incorporating the use of no interface by introducing the voice user interface. This can be considered to be the first or initial step towards the no user graphical interface (Singh, Tripathi Jara, 2014). People are not much comfortable in using the graphical user interfaces. The use of no user interface will make the lives of the people easier. Two examples where this no user interface can be applied are given as follows: Automatic procedure of payment: Whenever a customer enters a store he/she has to take several steps before paying the bill amount. This hectic and chaotic procedure can be mitigated by automating the procedure for payment. By incorporating a RFID chip in the payment cards of the user. This will enable the customers to enter the store and leave the store without any exit queues. The procedure has been made simple by an app known as the Pay with Square app. This app has helped the customers to buy and leave the store without facing any problem. Automatic procedure of unlocking car: When a person wants to drive a car then he or she has to walk up to the car, take out the keys from the bag and then unlock the car. This approach is a time consuming method. The no user interface approach can be used in order to simplify the entire process. The drivers can just simply walk to the car and open the door. In the year 1991, this keyless strategy was applied by Mercedes-Benz. This helped the car users to save time and energy. There are several types of cables present that are used for the purpose of communicating over wide network. These cables are classified into twisted pair cables, optical fibers and coaxial cables. These three cables have different characteristics that can be compared. The table presented in this answer gives a clear overview of the different characteristics of the twisted pair, optical fibers and coaxial cables. Characteristics Twisted Pair Cable Coaxial Cable Optical Fiber Bandwidth In comparison to the other two cables, this cable has the least bandwidth. In comparison to the other two cables, this has a level of bandwidth that is medium. In comparison to the other two cables, this has the highest level of bandwidth. Cost In comparison to the other two cables, this has the lowest cost. In comparison to the other two cables, it has a moderate level of cost. In comparison to the other two cables, optical fibers have got the highest cost. It is very expensive. Security In comparison to the other two cables, the security factor is very low. In comparison to the other two cables, it provides medium security. In comparison to the other two cables, the security level provided by this cable is the highest. Noise interference This is very high over here. This is extremely low. Its immunity towards interference is high. Noise cannot create any interference in case of optical fibers and light waves. Distance The distance covered is 0 to 3.5 kHz. The distance covered is 0 to 500 MHz. The distance covered is 180 to 370 THz. Table 1: Comparison between Twisted Pair, Coaxial and Optical Fiber Cable (Source: Boyer Heffron, 2015) Three types of Optical Fibers are: Single Mode: This type of optical fibers can transmit in a single mode and consists of a single stand. The diameter of the single mode fiber is 10 microns (Winzer, 2014). Multi Mode: The optical fibers falling under this category is can transmit in more than a single mode. It has a very big diameter that is more than 50 and less than 100 microns. Plastic Optic Fiber: This category is made of polymers having a refractive index of 1.46 or less. Three types of Coaxial Cables are: RG-9/U: It has 51 ohms of impedance. Its type is PE. RG-11/U: It has 75 ohms of impedance. It is used for the purpose of long drops. RG-56/U: It has 48 ohms of impedance. It is dielectric. Three types of Twisted Pair Cables are: Individual Shield: The shielding is done with aluminum foil for individual shielding. Overall Shield: 100 ohms impedance twisted pair cable is used. This helps in preventing the EMI from entering the cable. Individual and overall shield: The inner foil is shielded individually and the outer foil has done braided shielding. Radio Frequency Identification, video tracking and sensors have different characteristics and applications that can be compared. The comparison is shown below. Characteristics RFID Sensors Video Tracking Advantage Human intervention is not required during tag detection. This reduces the cost of employment (Zhu, Mukhopadhyay Kurata, 2012). The price required for implementation is low (Bao Chen, 2012). There is no requirement for heavy wiring. The recorded data gives the exact information. Disadvantage Any defects can affect the working mechanism of the entire system. It requires standardization. This is less secure and it has slow speed (Tozlu et al., 2012). Noise interference can cause disturbance and it is costly (Wang et al., 2015). Key Requirement Unique identification and automatic identification. Safety requirements Proper monitoring is required. Application Shopping stores and logistics. Traffic monitoring and tracking objects. CCTV surveillance and health surveillance. Table 2: Comparison between RFID, Sensors and Video Tracking (Source: Takai et al., 2013) The information and communication technology has become an integral part of the lives of the people. It makes the use of internet on a regular and consistent basis. Internet is susceptible to various types of security threats. There can be deliberate and accidental security threats in the system. Deliberate threats have huge exposure of risk because the attackers have a motive behind it. Accidental threats are not much harmful as it can be rectified after identification. There are can be several reasons behind the deliberate attacks (Borgohain, Kumar Sanyal, 2015). There can be loss of sensitive data and also there can be loss of money. If a credit card gets hacked then the hacker can misuse the money of the user in a wrong way. Several types of threats are hacking, denial of services, spoofing, and sniffing and virus attacks. There can be modification of the information too. Loss of intellectual property can also take place because of the security threats (Suo et al., 2012). In cas e of denial of service attack the attacker keeps the server busy in different type of activities and utilizes the capacity of the server. This makes the server slow and they cannot do the required task later on. These vulnerabilities can be resolved by applying strong security policies in the system. The following information is given in the question: Application trigger time= 1s Propagation delay in round trip between application and sensor= 12ms Average time consumed for processing request=3 ms Time taken in receiving and sending messages= 2 ms Therefore, total time consumed= 1+12+3+2= 18 ms This application design would save 18 ms and it is much better than the existing system. Nielsens law plays a major role in the internet of things. This law is applicable for the purpose of finding out the speed. Nielsens law states that the connection speed increases by 50 per cent every year (Nielsen, 2014). This is applicable in the case of high end users only. In order to prove the law, a graph is presented in this answer. The graph clearly shows that the internet speed of connection is increasing. The graph shows the speed details from year 1984 to the year 2014. There is an exponential growth in the connection speed of the high end users that is shown by the straight line. The X axis of the graph shows the year and the Y axis shows the internet connectivity in bits per second. Straight line is the sign of exponential growth. Hence this law can be easily proved. Nielsens law and Moores law are similar in nature. Moores law deals with the power of the computer. It states that the computer power gets doubled after every 18 months (Chien Karamcheti, 2013). But when both the laws are compared then it can be seen that the growth in the bandwidth takes place in a slow manner and the growth in the computer power takes place in a fast manner. Studies has shown that the annualized rate of growth in internet bandwidth is 50 per cent for Nielsens law and computer power growth is 60 per cent for Moores law. It has been seen that the people have preference towards a bandwidth that is moderate in nature. They do not have high preference for a bandwidth that has high speed. People want to save the bandwidth. Only the high end users can access the internet at a high speed. While designing a web, a designer must integrate such features in the web so the there is optimal usage of bandwidth. There should be low focus on the high speeds of the internet. References Bao, X., Chen, L. (2012). Recent progress in distributed fiber optic sensors.Sensors,12(7), 8601-8639. Borgohain, T., Kumar, U., Sanyal, S. (2015). Survey of security and privacy issues of Internet of Things.arXiv preprint arXiv:1501.02211. Boyer, R. J., Heffron, J. F. (2015).U.S. Patent Application No. 14/775,870. Chien, A. A., Karamcheti, V. (2013). Moore's law: The first ending and a new beginning.Computer,46(12), 48-53. Nielsen, J. (2014). Nielsens Law of Internet Bandwidth, 1998. Singh, D., Tripathi, G., Jara, A. J. (2014, March). A survey of Internet-of-Things: Future vision, architecture, challenges and services. InInternet of things (WF-IoT), 2014 IEEE world forum on(pp. 287-292). IEEE. Suo, H., Wan, J., Zou, C., Liu, J. (2012, March). Security in the internet of things: a review. InComputer Science and Electronics Engineering (ICCSEE), 2012 international conference on(Vol. 3, pp. 648-651). IEEE. Takai, I., Ito, S., Yasutomi, K., Kagawa, K., Andoh, M., Kawahito, S. (2013). LED and CMOS image sensor based optical wireless communication system for automotive applications.IEEE Photonics Journal,5(5), 6801418-6801418. Tozlu, S., Senel, M., Mao, W., Keshavarzian, A. (2012). Wi-Fi enabled sensors for internet of things: A practical approach.IEEE Communications Magazine,50(6). Wang, L., Liu, T., Wang, G., Chan, K. L., Yang, Q. (2015). Video tracking using learned hierarchical features.IEEE Transactions on Image Processing,24(4), 1424-1435. Winzer, P. J. (2014). Spatial multiplexing in fiber optics: The 10x scaling of metro/core capacities.Bell Labs Technical Journal,19, 22-30. Zhu, X., Mukhopadhyay, S. K., Kurata, H. (2012). A review of RFID technology and its managerial applications in different industries.Journal of Engineering and Technology Management,29(1), 152-167.