Oedipus analysis

    In this paper I want you to try grappling with Oedipuss conflicted responses to questions of family.  Perhaps start by making a list of all the familial relations depicted in the play that seem healthy and conventional against those that seem corrupt, perverse, excessive, or destructive. What narratives about the kings place in the family seem to legitimate him based on his merits as a leader, and which ones undermine him by telling him he does not know himself or that he is intemperate, irrational, and dangerous?  How does he view himself and how does this view conflict with the views of others?  Who are those others and what do they have in common? 

    In the end, does Oedipus find an acceptable solution to his problems in your view?  How is self-blinding strangely both extreme and appropriate in the context of this play?  How does it satisfy both the rational and irrational characteristics of the protagonist?

    You are required to use at least one reputable scholarly source which you must cite and list in a Works Cited list along with your edition of the play. I suggest you make use of the MLA International Bibliography or JSTOR to find an appropriate source.  Your paper must be 3 pages in length and must be written in third person.  It is due on Monday, September 21st. 

Controversial Topics in Human Services

Controversial Topics in Human Services
Research published viewpoints, found in no fewer than two scholarly sources or other credible sources, regarding the pros and cons of legalization of marijuana from the perspective of the human services discipline and profession. Based on these sources, your required readings on controversial issues and marijuana legalization, and reflections on your values and ethics, write an initial post to the forum identifying and evaluating one or more implications of this issue for the provision of human services.

Then, apply these reflections to a fictional or real (if you happen to know of one) case study concerning a human services client who is a heavy marijuana user. Specify gender, age, and related environmental and personal issues and circumstances, such as: Is this a legalized state? Is the clients use related to a medical and/or psychological need? How is the client claiming to get the money for the marijuana?

In your initial post, address the following:

Describe how the issue of legalization and its controversial character affect your professional responsibilities broadly and your practice with regard to the client.
Provide one or more examples describing how you, as a human services provider, would act in response to specific scenarios that might come up in practice, assessing how social factors, legal factors, and/or the larger moral context might create tensions or conflict with respect to values.
Tie in this scenario (or scenarios) with conceptual discussions and arguments put forth in your sources, describing how your (fictional or actual) experience is informed and explained by the literature and this week’s readings.
In your responses to no fewer than two of your peers, compare and contrast your cases, commenting on how similar and/or divergent analyses apply in each case.

Review Section 1.3: Writing for an Audience, Section 3.3: Narrowing the Topic and Developing a Focus, and Section 5.3: Ensuring the Conclusions Match the Type of Data Collected, from Sole’s and Landrums (2015) Academic Research and Writing: A Guide for the Social Sciences.

WEP, WPA, WPA2 and WPA3 wireless security protocols

This is survey research project for exploring the technical side of all WPA technology. It is a thorough description of each type and their application, their drawbacks from a deep technical stance and proposing a solution that will address the problems of the older models of WPA with WPA3 being the solution to all the problems. The entire report should be written from a technical and expert point of view and not general references and term but dive deep into the explanations and descriptions.
You need to explain the features and the attacks against these protocols in your research paper

WEP
WPA
WPA2
WPA3

Project Survey
1. Abstract.

2. Introduction
    Discuss the background and motivation of your work. (What inspired the writing of this document, raising awareness with indepth knowledge)
    Summarize the research problem. (All WPAs of all types are prone to attacks, dont mention WPA3 which only be mentioned in section 6 as the solution to all problems)
    Summarize the proposed solution/approach to the problem. (Describe how WPA3 is fixing issues from other WPAs how this technology can be implemented on a corporate and global scale)

3. Problem statement
    what is the problem, why it is important to solve it -motivation-, what are the related security challenges/issues and how they are related to the studied topic?

4. Requirements
    Identify and present what the requirements should the solution fulfill
o    which functionalities it provides; i.e. characteristics of each WPA and their application of use for different scenarios 
o    What properties the system should have to differentiate each one from the other 

5. State-of-the-Art (should be different from background)
    Discuss research previously written by other writers related to problem described in section 3
    Classify, organize/categorize the different solutions
    Compare and show advantages and disadvantages of their findings
o    Analyze the solutions using the requirements: which requirements do they meet and which ones they dont from a security perspective on a personal, corporate and global level for each of the points mentions in section 5

6. Research challenges
If you want to design a system that solves the problem you described and meet all the requirements you identified, what will be the challenges that you have to solve? The optimum solution is WPA3
    Identify the challenges (open issues) related to the solution
    Categorize these challenges
    Give a detailed description of each challenge: explain what is the challenge, why it is difficult to solve, etc.

7. Roadmap and hints
    in which order may the challenges be addressed (search for known security flaws in the WPA3 and how are the negative effects e.g. 1)WPA is not backwards compatible from what I understand. WPA3 is it’s own new standard and any client device you have needs to be upgraded to also support WPA3, 2)The researchers found that even with WPA3, an attacker within range of a victim can still recover the password to the Wi-Fi network.
)
    give hints about how to solve each (most) of the identified issues

8. Conclusions
    Summarize the conclusions of your work. Future work is optional.

9. References
    List all the citations referenced in your paper minimum of 20-30. You will lose 1 points for each missing or dangling reference (i.e., the reference not cited in the main text).
    Use IEEE format, and present the references in order [1], then [2], etc.;
o    The first reference to be referenced in the paper is [1], the second to be referenced is [2], etc.
o    Total of exactly 12 references are required for this is report

o Format, respect of outline, quality of English
o The paper should have single spaced line with the font size 11 Times New Roman.

———————————————————————————————————————————

NOTE: paper structure, presentation, and writing style will be taken into consideration.
    You must use an IEEE format for your paper

Some References

Mobile applications security; i.e. securing the applications running on mobile phones
[1].        D. He, S. Chan and M. Guizani, “Mobile application security: malware threats and defenses,” in IEEE Wireless Communications, vol. 22, no. 1, pp. 138-144, February 2015

——————————————-

analyze similarities and differences

In no particular order, reexamine “Mr. Pirzada comes to Dine” and read Fatimah Asghar’s wonderful poem “Partition” here: https://poems.com/poem/partition/. Please print the poem out and mark it up.

Then, spend some time journaling on how the two works might be connected. What do they say about history, inheritance, and the immigrant experience? Differences? Similarities? Think as well about Asghar’s title “Partition”; what boundaries does Lahiri’s story explore, question? We’ll share these, so write something you can be proud of