Monday, December 30, 2019

What Is the Difference Between Venomous and Poisonous

The terms venomous and poisonous are often used interchangeably to refer to toxic substances produced by animals and their dangers to humans and other creatures, but they have different meanings in biology. Basically, venoms are delivered actively while poisons are delivered passively. Venomous Organisms A venom is a secretion that an animal produces in a gland for the purpose of injecting it into another animal. It is actively introduced into a victim by means of a specialized apparatus. Venomous organisms use a wide variety of tools to inject venom: barbs, beaks, fangs or modified teeth, harpoons, nematocysts (found in jellyfish tentacles), pincers, proboscises, spines, sprays, spurs, and stingers. Animal venoms are generally a mix of proteins and peptides, and their precise chemical makeup to a large extent depends on the purpose of the venom. Venoms are used for defense against other creatures or for hunting prey. Those used for defense are designed to create immediate, localized pain to make another animal go away. The chemistry of venoms designed for hunting prey, on the other hand, is highly variable, since these venoms are made specifically to kill, incapacitate, or break down the victims chemistry to make it easily edible. If cornered, many hunters will use their venom for defense. Glands and Hypodermic Needles The glands where venoms are stored have a ready supply of venom and a muscular arrangement to eject the toxic substance, which can affect the rapidity and degree of envenomation. The reaction in the victim is principally determined by the chemistry, potency, and volume of the venom. Most animal venoms are ineffectual if the venom is merely placed on the skin or even ingested. Venom requires a wound to deliver its molecules to its victims. One sophisticated apparatus for creating such a wound is the hypodermic syringe-style mechanism of ants, bees, and wasps: In fact, inventor Alexander Wood is said to have modeled his syringe on bee sting mechanisms. Venomous Arthropods Venomous insects can be divided into three groups: true bugs (order Hemiptera), butterflies and moths (order Lepidoptera), and ants, bees, and wasps (order Hymenoptera). Heres how the venom is delivered: Black widow spiders bite to inject digestive enzymes that liquefy their prey.Brown recluse spiders have short fangs that inject a cytotoxic (cell-killing) venom into their prey.Honey bees use a modified ovipositor (egg-layer) as defensive equipment.Bumblebees sting defensively.Hornets, yellow jackets, and paper wasps are defensive stingers.Velvet ants use a modified ovipositor defensively.Fire ants sting defensively. Poisonous Organisms Poisonous organisms dont deliver their toxins directly; rather, the toxins are induced passively. A poisonous organisms entire body, or large parts of it, might contain the poisonous substance, and the poison is often created by the animals specialized diet. Unlike venoms, poisons are contact toxins, which are harmful when eaten or touched. Humans and other creatures can suffer when they come in direct contact with or inhale airborne material from urticating (stinging nettle-like) hairs, wing scales, molted animal parts, feces, silk, and other secretions. Poisonous secretions are almost always defensive in nature. Those that arent defensive are simple allergens  that have nothing to do with defense. A creature can come in contact with these secretions even after a poisonous organism is dead. The defensive contact chemicals produced by poisonous insects can cause severe local pain, local swelling, swelling of the lymph nodes, headache, shock-like symptoms, and convulsions, as well as dermatitis, rashes, and upper respiratory tract complications. Poisonous Arthropods Poisonous insects include members of quite a few groups: butterflies and moths (order Lepidoptera), true bugs (order Hemiptera), beetles (order Coleoptera), grasshoppers (order Orthoptera), and others. Stinging caterpillars use barbed spines or hairs as defensive mechanisms, while blister beetles produce a caustic chemical when they are threatened. Heres how some insects produce their poison: Monarch butterflies develop a defensive flavor by eating milkweeds, and birds that eat them eat only one.Heliconius butterflies have similar defensive poisons in their systems.Cinnabar moths feed on poisonous ragworts and inherit the poison.Lygaeid bugs feed on milkweed and oleander. Which Is More Dangerous? Venomous black widow spider bites, snake bites, and jellyfish stings certainly sound more dangerous than contact poisons, but in terms of worldwide exposure, the more dangerous of the two is undoubtedly animal poison, since it doesnt require animals to take an active role in the toxin delivery system. Sources Beard, Raimon L. Insect Toxins and Venoms. Annual Review of Entomology. Casewell, Nicholas R., et al. Complex Cocktails: The Evolutionary Novelty of Venoms. Trends in Ecology Evolution.Fry, Bryan G., et al. The Toxicogenomic Multiverse: Convergent Recruitment of Proteins Into Animal Venoms. Annual Review of Genomics and Human Genetics.Harris, J B., and A Goonetilleke. Animal Poisons and the Nervous System: What the Neurologist Needs to Know. Journal of Neurology, Neurosurgery Psychiatry.Kellaway, C H. Animal Poisons. Annual Review of Biochemistry.Wirtz, R.A. Allergic and Toxic Reactions to Non-Stinging Arthropods. Annual Review of Entomology.

Sunday, December 22, 2019

Descriptive Essay About Titanic - 1707 Words

Famous Maritime Disasters For as long as people have been using wood to float on water, there have been maritime disasters. The most we can do is mourn for dead, be sensitive to the trauma of the survivors, and learn from these tragic experiences. Let’s look at five well-known or somewhat well-known maritime disasters. RMS Titanic It’s been the subject of more than one film, and not just the 1997 James Cameron blockbuster. It’s even the subject of a musical (The Unsinkable Molly Brown). But just what is it about the Titanic that captures the imagination? Part of it, surely, is the luxury of the ship and a lot of its high-class passengers. Another reason is the arrogance of referring to the ship as ‘unsinkable’. Plus the tragic loss of†¦show more content†¦This American Great Lakes freighter was used to haul taconite iron ore from mines near Duluth in Minnesota to the iron works in Toledo, Detroit, and other Great Lakes port cities. More than just a workhorse, the Edmund Fitzgerald was also known for its speed. The ship set seasonal hauling records six times during its working life, which spanned from 1958 to 1975. The captain, Peter Pulcer, was known as the ‘DJ Captain’, for his habit of playing music while the ship sailed between Lakes Erie and Huron through the St. Clair and Detroit Rivers. Music was played day and night. Furthermore, Captain Pulcer would also entertain spectators between Lakes Huron and Superior at the Soo Locks, with running commentary about the vessel. As a result, the ship was well known to boat watchers. On November 9, 1975, Captain Ernest McSorley commanded the ship on what should have been a somewhat routine run from Superior, Wisconsin (near Duluth) to a steel mill near Detroit. On that day, the Edmund Fitzgerald accompanied another freighter, the SS Arthur M. Anderson. However, the next day, both ships were caught in a sudden storm with waves up to 35 feet and winds that were near hurricane force. The Fitzgerald reported it was having some difficulties, but its last transmission to the Anderson said that they were holding their own. Just after 7:10 PM, the Fitzgerald suddenly sank about 17 miles from Whitefish Bay, on the Canadian side, near Sault Ste.Show MoreRelatedWhat Are the Advantages and Disadvantages of Telling a Story Using Moving Images2760 Words   |  12 PagesEach mode of story telling is capable of presenting the same story in different ways. Humans are capable of both understanding and interpreting the different content and style associated with different modes of story telling. For the purpose of this essay I contend that a moving image is one that is viewed upon a screen. This may include images such as photography, video or animation, which can be used to create films (long, short or continuous) or computer games. Methods of telling stories, which doRead More George W. Bush’s Language Comprising the War on Terror Essay5251 Words   |  22 Pagesand metaphors that constitute George W. Bush’s rhetoric on the current â€Å"war on terror.† Through an examination of the language that the president employs when speaking about the war on terror, I will elucidate several different categories of rhetoric he uses to describe different aspects of this conflict. Though largely descriptive, I will briefly compare Bush’s current conflict rhetoric with the conflict rhetoric of past presidents. Through this comparison, we will be able to identify any rhetoricalRead MoreEssay on Mintzberg 5 Ps of Strategy9155 Words   |  37 Pagesrealized strategy, as shown in Figure 1, then we can distinguish deliberate strategies, where patterns developed in the absence of intentions, or despite them (which went unrealized). STRATEGIES ABOUT WHAT? Labelling strategies as plans or patterns still begs one basic question: strategies about what? Many writers respond by discussing the deployment of resources (e.g., Chandler, in one of the best known definitionsI6),but the question remains: which resources and for what purposes? AnRead MoreANALIZ TEXT INTERPRETATION AND ANALYSIS28843 Words   |  116 Pagesall plots, unfortunately, do not lend themselves to such neat and exact formulations. Even when they do, it is not unusual for critics and readers to disagree among themselves about the precise nature of the conflict – whether, for example, the protagonist is more in conflict with society than he is with himself – or about where the major crisis, or turning point of the narrative actually occurs. Nor is there any special reason that the crisis should occur at or near the middle of the plot. It canRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 PagesPHILADELPHIA Temple University Press 1601 North Broad Street Philadelphia, Pennsylvania 19122 www.temple.edu/tempress Copyright  © 2010 by Temple University All rights reserved Published 2010 Library of Congress Cataloging-in-Publication Data Essays on twentieth century history / edited by Michael Peter Adas for the American Historical Association. p. cm.—(Critical perspectives on the past) Includes bibliographical references. ISBN 978-1-4399-0269-1 (cloth : alk. paper)—ISBN 978-1-4399-0270-7

Saturday, December 14, 2019

Myanmar Free Essays

This essay will investigate the role of images in the media’s presentation of current events using the example of Myanmar/Burma protests. It is a well-known scientific fact that humans absorb the greatest amount of information through the visual channel; therefore, contemporary media places a significant emphasis on the use of effective images in the presentation of news. Images coupled with specific vocabulary are the most powerful tool of framing public discourse concerning current events. We will write a custom essay sample on Myanmar or any similar topic only for you Order Now As for the background information about the crisis in Myanmar/Burma, there has been a series of protests against human rights abuses and crackdown on ethnic minorities going on in the country since late August. The protests have been started by monks and supported by ordinary citizens. In late September, the military government of Myanmar/Burma responded with the police violence and arrests. Such a response sparked a wave of international indignation, and both Myanmar/Burma activists and their supporters abroad call upon the international institutions to take a decisive action to solve the crisis that has not been fully settled yet. For the purposes of this essay, three most influential news media providers were selected, namely CNN, BBC, and Reuters. There is little variation in their representation of the events in Myanmar/Burma, yet each news provider uses its own set of images to communicate its message to its target audience. CNN launched a series of articles tracking down all the developments of the situation in Myanmar/Burma. The article ‘Satellite photos may prove abuses in Myanmar/Burma, researchers say’ (CNN, 2007) is accompanied by a photograph showing a crowd of monks on a demonstration who are surrounded by other citizens. Deep red apparel of the monks contrasts with predominantly white clothes of other citizens, yet this photograph communicates a powerful message that many Myanmar/Burma citizens are united around the noble cause of confronting their government because of human rights abuses. The photograph is probably taken from the plane or any spot high above the Earth surface. This very fact reminds the Western viewer that many media channels are banned from doing on-the-ground reporting from Myanmar/Burma. It further amplifies the perception of the Myanmar/Burma government as authoritarian and undemocratic one. The thing that is probably missing from the image is the presence of authorities. It is well-known that streets of major Myanmar/Burma cities are flooded with the police and sometimes special forces. While the image effectively captures the peaceful spirit of the protests and high level of self-organization, it fails to convey the atmosphere of confrontation between citizens and authorities. BBC frames the story with a noticeable human touch. British media is known to focus on the human factor before examining international political implications of a certain event. The story titled ‘Monks trying to escape Rangoon’ (BBC, 2007) goes together with a photograph of two young monks fleeing away at the top of a truck. In the background it is possible to spot several other trucks carrying other exiles away. This image communicates a dual message: first of all, it persuasively portrays Buddhist monks as innocent victims of the oppressive regime rather than violent protesters; secondly, it indicates that the number of exiles exceeds the number of transport facilities available to them. Furthermore, it makes viewers think about the future of the protesters who are forced to leave their home country because of their political beliefs. It also puts the story in the wider regional context, since the conflict in Myanmar/Burma will also affect all the neighboring countries if exile becomes mass. The inscription under the image reads ‘Many monks are desperate to leave Rangoon, witnesses say.’ The image advances the story by showing that the protesters are ready to trade the risk and insecurity of fleeing to another country from relative political freedom they can enjoy abroad. Another BBC story, ‘Burmese play tense waiting game’ (BBC, 2007), also features an effective use of visual images. One of the images that accompany the story features Gen Than Shwe who heads the ruling junta and controls the army. The facial expression of Gen Than Shwe is conspicuously aggressive and hostile. To the Western viewer, such an image reminds of other historical forms of military dictatorship, ranging from Soviet-era military buildup to juntas in Latin America. Perhaps the most effective use of visual images has been done by the Reuters (2007). Together with a series of stories, it offers a slideshow of 25 photographs representing the course of development of events in Myanmar/Burma. One of the photographs features a Buddhist monk standing by a placard that reads ‘Free Political Prisoners, Listen to the People.’ Young man is wearing glasses (the fact that resonates with the collective image of ‘intelligentsia’ from developing countries) and has a very determined expression on his face. While there is a grammatical mistake in the word ‘Political,’ the image still credits the protesters for their brave attempts to attract the attention of international community. In such a way, Western media frames the public discourse about the events in Myanmar/Burma is a sympathetic way and calls upon Western governments and international organizations to render necessary support to the peaceful protesters and population of the country. References CNN. ‘Satellite photos may prove abuses in Myanmar, researchers say.’ September 28, 2007. October 3, 2007. http://edition.cnn.com/2007/WORLD/asiapcf/09/28/myanmar.satellites.ap/index.html BBC. ‘Monks ‘trying to escape Rangoon’.’ October 3, 2007. October 3, 2007. http://news.bbc.co.uk/2/hi/asia-pacific/7025357.stm BBC. October 3, 2007. ‘Burmese play tense waiting game. October 3, 2007. October 3, 2007. http://news.bbc.co.uk/2/hi/asia-pacific/7025357.stm The Reuters. ‘Myanmar junta arrests more.’ October 3, 2007. October 3, 2007. http://www.reuters.com/article/topNews/idUSGOR22843620071003    How to cite Myanmar, Essay examples Myanmar Free Essays Myanmar is one of the most underdeveloped countries in the world. Despite its lush natural resources, the country formerly known as Burma has remained among Asia’s struggling economies, notwithstanding the fact that its neighbor, Thailand, has periodically rebounded from the boom-bust cycle of the international economy, including 1990s Asian Financial Crisis. Even if there be economic pitfalls like these, Myanmar has always been known for its two social pillars – the Buddhist monks and the Burmese military. We will write a custom essay sample on Myanmar or any similar topic only for you Order Now For years, the these two socio-political institutions have always been embroiled in a love-hate relationship especially in amassing the support of the Burmese people, as evidenced in the current political crisis engulfing all of Myanmar today. On the other hand, it is important to note that Myanmar was a former direct British colony, from 1824-1886 and subsequently became a province of India until it gained full independence in 1948. Burmese history post-independence though may be best described as a waltz between the exercise of democracy and the iron grip of the Burmese military institution, as the Burmese military junta has always wielded political and economic power in Burma since the time of Gen. Ne Win until today, under the leadership of Gen. Than Shwe. Presently, several indicators may serve to show the level of development Burma has reached – the Per Capita Gross Domestic Product (PCGDP), Literacy Rate, and the Life Expectancy. These three are very important indices in determining whether or not the Burmese government and its people are successful in substantially improving the lives of members of their society. The Burmese PCGDP is pegged at $1,800 (2006 est.), a far cry from the $9,200 (2006 est.) PCGDP of its neighbor Thailand and even its similarly situated neighbor Laos whose PCGDP is at $ 2,200. (cia.gov) On the other hand, Burma has been successful in ensuring that majority of its population can read and write, as its 89.9% literacy rate is only a few percentages lower than Thailand’s 92.6%. Life expectancy in Burma is also very low at 62.52 years old, while Thailand’s life expectancy is at 72.55 years old. Actually, the life expectancy in more underdeveloped neighbor Bangladesh is slightly higher than the Burmese average, at 62.84 years old. (cia.gov) Over and above the usual economic explanations as to the depressing levels of poverty in Burma, a major basis for the continuing economic underdevelopment in Burma shall always be the authoritarian rule of the Burmese government and the patent lack of democracy and freedom in the country. A main factor for the stunting of the Burmese economy is the strict government controls on all sectors of the economy by the ruling junta. Even as the world has already started embracing the principle of eliminating barriers to international trade, the Burmese economy continues to institute questionable economic policies such as a distorted interest rate regime and multiple official exchange rates. (cia.gov) Moreover, the discredited image of the Burmese military junta to the world has also resulted in a lukewarm investment climate, diminishing foreign assistance by developed countries, and economic sanctions, especially due to its protracted and continued crackdown on pro-democracy dissidents including Nobel Peace Prize winner Aung San Suu Kyi. Such an unfortunate economic and political situation would definitely lead to dire results insofar as human development is concerned, the result of which would be the low life expectancy of the Burmese people. To a certain extent, it is very safe to surmise that the low life expectancy can be logically attributed to the failures of years of military junta rule in delivering basic social services to the people. Had the Burmese government been very effective in delivering primary healthcare to its impoverished countryside notwithstanding ensuring sustained food security, the necessary consequence of such a situation would perhaps lead to a higher life expectancy rate than what Burma currently faces. Apparently, if one looks at the CIA world ranking on life expectancy, Burma at 168th place would find itself in the company of countries and states which had histories of problematic governments and states which do not necessarily hold the interest of their peoples at heart due to pervasive corruption, civil strife, among others. (cia.gov) On the other hand, it would seem surprising that an impoverished country like Burma would have such a high literacy rate of 89.9%, especially as similarly situated underdeveloped countries such as Haiti and Cambodia have very low literacy rates, at 52.9% and 50.2%, respectively. The explanation for this would perhaps lie on the fundamental interest of the Burmese junta to educate and consolidate the people towards assimilating themselves to the legitimacy of the authoritarian regime, as an uneducated people would definitely plant the seeds of civil unrest and challenge the regime. This conjecture is offered in the light of similarly high literacy rates in other authoritarian yet impoverished regimes the world over, such as Cuba and North Korea, both of which have literacy rate of 99%. (cia.gov) The primordial prerequisite for the economic development of Burma today needs more than a simple implementation of liberalization measures in its economy, as the basic problem lies in the very structure of its institutions, particularly the manner by which the Burmese government wields power. If there is no room for discussion of different economic theories and policies which have worked for countless other impoverished nations, no shift towards economic liberalization and deregulation policies can ever be hoped in Burma as an authoritarian government shall always tend to believe only the policies and theories which it would want to pursue and implement. While a vast majority of the Burmese people is literate enough, it cannot be said fully at this point whether their literacy actually amounts to the development of countless professionals, scientists, engineers and skilled workers, as their poorly planned economy remains in shambles. In the ultimate analysis, prior to any economic cure which may be instituted to jumpstart its economic for the development of its resources and its people, a political solution must decisively be done if Burma is to move progressively and proactively forwards as a nation. Works Cited: Burma. CIA World Factbook. Retrieved from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  November 20, 2007. November 15, 2007. Thailand. CIA World Factbook. Retrieved from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   https://www.cia.gov/library/publications/the-world-factbook/geos/th.html,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   November 20, 2007. November 15, 2007. Rank Order – GDP – per capita (PPP). CIA World Factbook.       November 20, 2007. November 15, 2007. Rank Order – Life expectancy at birth. CIA World Factbook.             November 20, 2007. November 15, 2007. How to cite Myanmar, Essay examples

Thursday, December 5, 2019

OTP and Facial Recognition Features †Free Samples to Students

Question: Discuss about the OTP and Facial Recognition Features. Answer: Introduction: Confidentiality, integrity and availability is also known as CIA Triad is nothing but a model which is designed for guiding policies for information security within an organization. In the case of ATM machine pin number confidentiality is generally compared to privacy (Hajare et al., 2018). PIN numbers are designed in such a way that it can prevent from reaching to unauthorized people. Integrity is much more focused in maintaining, accuracy and trustworthiness of data over the whole life cycle. Availability is generally ensured by maintaining of data of all kinds of hardware and repair of data when needed (Onyesolu Okpala, 2017). Safeguarding of data or any kinds of interruptions in various kinds of connection must be included in various kinds of parameters like natural disaster and fire. For prevention of data a backup must be there so that important data can be easily stored. PIN in ATM mainly makes use of data so that it cannot be easily accessed or authorized by unauthorized peo ple. Many times it is seen that safeguarding of data may require special kind of training for looking into the documents. This kind of training would generally require various kinds of security risk which is used for threating of information. Data encryption is known to be common kind of method which is used for ensuring confidentiality. While availability focus on maintaining of hardware which generally performs maintaining of hardware for functioning of operating system. The whole keypad of an ATM machine consists of ten keys that is (0-9). Now in this situation the thief has broken five keys so more five keys are available to him. The pin number of an ATM machine generally consist of four numbers. So with the five keys available the maximum number of possible outcome for a four-digit pin is as follows 5P4 = 5! / (5-4)! = 5! /1! = 5*4*3*2*1/ 1 =120/1 =120. So the maximum number of possible outcome in this situation is 120. But according to the ATM security a user can enter pin for maximum three times. After three wrong inputs the card gets blocked. So keeping the security of the ATM in mind the maximum time the thief can enter the pin is three times. After three wrong trials by thief the card will be blocked. The reasons behind the reluctant to the use of biometrics are: One of the biggest challenges is the kind of process which is involved in capturing or mapping it a particular kind of identity (Karovaliya et al., 2015). Lack of accuracy in the kind of capturing may easily led to failure of a particular system. Privacy is considered to be one of the biggest concern in the kind of biometric solutions (Pathak et al., 2015). If somehow the server storing the biometric information is hacked in anyway then it may have led to serious kind of impact on a particular kind of individual. Any kind of error in biometric devices may led to false rejection and false kind of acceptance. This is mainly due to biometric technology which is unable to have an idea regarding the characteristic of a particular person for various kinds of reasons. There are certain number of steps which can be used for overcoming issues in biometric kind of authentication (Singh Kaur, 2016). Spoofing attack is considered to be well known kind of attack in which biometric of other persons are created. Another way for the implementation is the multifactor authentication which mainly requires multiple kind of identifiers on depending on certain number or level of risk. A false negative is a thing in biometric system when a particular kind of system fails to recognize the authenticity of an individual which might lead to something which is not happening in general (Khan, Hasan Xu, 2015). Depending on the thing there can be serious kinds of consequences like personal who is considered to have safety on the parameter of accessing inspite of guarding the whole kind of thing. On organizational level it can easily shut down the whole infrastructure and various kinds of things needed will be the data centers needed for restoring of various kinds of services. Transposition cipher is nothing but a simple scheme in which some of the plaintext are shifted in some kinds of regular pattern for forming cipher text. In some of the manual system transposition is generally carried out by making use of mnemonic. Simple frequency count can easily reveal to cryptanalyst. It generally has the same frequency in the cipher like some of the average in plaintext. And so simple rearrangement of various kinds of letters are possible in this. Simple distribution cipher is a kind of cypher which is being used for many years. It basically consists of plaintext character which are considered to be different from cipher text character. It is considered to be different from Caesar cipher in the context that cipher alphabet is not alphabet shifted instead of that is jumbled completely. Encrypted Text N T J W K H X K Corresponding numeric value 14 20 10 23 11 8 24 11 Key 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 12 17 6 21 8 4 22 8 Caeser cipher shift 3 3 3 3 3 3 3 3 Decoded from the caeser cipher 9 14 3 18 5 1 19 5 Decoded Text I N C R E A S E Encrypted Text A M K Corresponding numeric value 1 13 11 Key 4 2 3 Decoded from the substitution cipher 23 11 8 Caeser cipher shift 3 3 3 Decoded from the caeser cipher 20 8 5 Decoded Text T H E Encrypted Text W W U J J Y Z T X Corresponding numeric value 23 23 21 10 10 25 26 20 24 Key 4 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 19 21 18 6 8 22 22 18 21 Caeser cipher shift 3 3 3 3 3 3 3 3 3 Decoded from the caeser cipher 16 18 15 3 5 19 19 15 18 Decoded Text P R O C E S S O R Encrypted Text M W K X Z K U H E Corresponding numeric value 13 23 11 24 26 11 21 8 5 Key 4 2 3 4 2 3 4 2 3 Decoded from the substitution cipher 9 21 8 20 24 8 17 6 2 Caeser cipher shift 3 3 3 3 3 3 3 3 3 Decoded from the caeser cipher 6 18 5 17 21 5 14 3 25 Decoded Text F R E Q U E N C Y Therefore, the decoded text for the cypher text for employees will increases the processor speed. References Hajare, U., Mahajan, R., Jadhav, S., Pingale, N., Salunke, S. (2018). Efficient Cash Withdrawal from ATM machine using Mobile Banking. Karovaliya, M., Karedia, S., Oza, S., Kalbande, D. R. (2015). Enhanced security for ATM machine with OTP and Facial recognition features.Procedia Computer Science,45, 390-396. Khan, R., Hasan, R., Xu, J. (2015, March). SEPIA: Secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices. InMobile Cloud Computing, Services, and Engineering (MobileCloud), 2015 3rd IEEE International Conference on(pp. 41-50). IEEE. Koteswari, S., Paul, P. J. (2017). A Survey: Fusion of Fingerprint and Iris for ATM services. Onyesolu, M. O., Okpala, A. C. (2017). Improving Security Using a Three-Tier Authentication for Automated Teller Machine (ATM).International Journal of Computer Network and Information Security,9(10), 50. Pathak, S. K., Pathak, S. K., Mishra, M. K., Kesharwani, L., Gupta, A. K. (2015). Automated Teller Machine (ATM) Frauds and Security.EDITORIAL BOARD, 192. Singh, S., Kaur, S. (2016). Enhancing ATM Security Using Fusion of Biometric Techniques.IITM Journal of Management and IT,7(1), 79-82.