In Hiding

In: English and Literature

Submitted By mett9464
Words 457
Pages 2
Joyce Carol Oates’ short story “In hiding” is about a woman who is working as a poet, translator and part-time college teacher. Furthermore, she is a single Mother of a fifteen-year-old son. Suddenly she finds herself in an unusual relationship whit an inmate at Kansas State Penitentiary for Men in Fulham, Kansas who is sentenced to life. They have never met in real life and suddenly she just receives a letter from a man who goes from being number AT339I4 to Woody. He sends her poems and diary excerpts because he wants to be a writer himself.
Their odd relationship starts to grow. It is not romantic or sexual, but it is described as they are dating in a strange way. He tells her a lot about himself and she is holding back. “…he would know a good deal about her. More than se was comfortable whit him knowing, in fact.”
When he doesn’t write to her as much as he did before she starts wondering: “Had he found another correspondent?” Even though, she is holding back, she still kind of describes that their relationship is special to her and not just an exchange of poetry. “She thought I should break this off with him. This isn’t a wise thing.”

The individualization is seen many times in the story. First of all we never get her name which really shows that she don’t have any identity. Woody makes her question a lot of things especially the question about whether she is a racist or not. “She wondered if she was, unknowingly, a racist?” This question shows that that there are things about herself that she doesn’t know, maybe because of the individualization – she is somehow in a lake of an identity and therefore she doesn’t know about her attitude to different questions in life. She loves her son who is kind of the only one she has and therefore she often makes her choices after what she thinks he would prefer. Also, her son seems to be everything that she is not.…...

Similar Documents

Aliens

...Aliens I strongly believe that aliens exist in the United States if America. We have those restricted areas because we’re hiding aliens. People see so many UFO’s, either they’re lying about them or we are really hiding aliens. Area 51 has got to be restricted for something. In that military base, according to  bibliotecapleyades.net, there are over 30 levels that are above top secret. For many years now, we’ve had our government lie to us about a lot of things, of course they would lie to us about aliens. Area 51 is so restricted that not even the president is at a high enough rank to enter without someone keeping an eye on him. If you even step in that area without being invited you will be quickly eliminated. UFO’s are widely seen around the world seen around the world. Even more widely around the U.S. more closely around areas near Area 51. Yes, may people make up UFO sightings and tamper with videos, but there are people who have seen them, or at lease think that they really seen them. You can never tell who is really telling the truth. If someone actually has proof the government decides to delete all known history about what that person has to say. The government lets people talk to an extent, bit it is about them and someone decides to put the governments business out to be known to the world, the government is quick to shut them up. For example, in 1977 on the Art Bell Radio Show, Bell recieved a frantic phone call from a man who claimed to have been inside Area......

Words: 391 - Pages: 2

A New Dct-Based Perturbation Scheme for High Capacity Data Hiding in H.264/Avc Intra Frame

...Fast Training-Based Redundant Predictor Elimination Scheme for Intra Coding in H.264/AVC Tseng-Jung Lin, Kuo-Liang Chung, Po-Chun Chang, and Wei-Jen Yang National Taiwan University of Science and Technology, Taipei, Taiwan 10672, R. O. C. E-mail: {D9715002, k.l.chung, D9915014, wjyang}@mail.ntust.edu.tw Abstract—Currently, Laroche et al. presented an efficient method to eliminate redundant predictors for intra coding in H.264/AVC. Their proposed method has a bitrate advantage reduction under a low bitrate environment. In this paper, we present a fast training-based redundant predictor elimination scheme to enhance the execution-time performance while preserving similar bitrates. We first develop a new statistic training approach to construct a set of most similar predictor-pairs and determine the priority of each predictor. Based on the constructed predictor-pair set and the determined predictor priorities, we thus can efficiently eliminate the redundant predictors and preserve more frequently used ones, leading to the advantages of bitrate reduction and computation-saving. The results of experiments on the sixteen standard Video Coding Experts Group (VCEG) test sequences turn out that under similar bitrates, the average execution-time improvement ratio of the proposed scheme over Laroche et al.’s method can be more than 16.77%. I. I NTRODUCTION H.264/advanced video coding (AVC) [1], [6], [8], [10], established by the Joint Video Team (JVT) of ISO/IEC Moving Picture...

Words: 4068 - Pages: 17

Area51

...Outline for a speech Area 51of your speech Area 51 Week 8, of October Introduction Have you ever sat down and actually thought about on how our Government actually works? Well I have and that’s why I’m going to introduce you to the world’s most secretes Military base AREA 51. I will list three main points in this paper. First point is location. Second is how did Area 51 got its name and why its named. Last point is what is Area 51 actually hiding and why is it such a secret? B. Thesis statement: Area 51 is an popular military base in Nevada C. To explain my paper on Area 51 my focus will be on my three main points. Location of area 51 How did area 51 get its name and why What is area 51 hiding and why is it such a secret? * First Main Point: Where is the location of Area 51 Area 51 is the most popular military base. It’s located in Southern Nevada, about 83 miles northwest of Las Vegas. The most top-secret installation is so called located in the center of the U.S air forces. Listed on www.area51facts.com .Area 51 is a test and training Range Located on the Shore of Groom Lake. The official United States governmental states that the base actually doesn’t exists. Then how is it known as Area 51? Second Main Point: How did area 51 gets it’s name ? There are tons of ways Area 51 got its name but I’m going to use the most popular way and it’s the (NTS) that stands for Nevada test site. There is also the (AEC) that stands for Atomic Energy...

Words: 570 - Pages: 3

Paper

...Steganography Implementation & Detection Robert Krenn rkrenn@xidc.nl January 21, 2004 Overview ● ● ● ● ● ● What is steganography? Implementations Detection Defeating steganography Conclusion Questions What is steganography? Stegacovered, from the Greek “stegos” or roof -nography writing, from the Greek “graphia” What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective  Secret inside What is steganography? What is it used for? ● ● ● Hiding the fact that you are sending messages Hiding several messages inside data Digital watermarking Kerckhoffs' principle ● ● Secure with knowlegde of the system Message can only be read with secret key What is steganography? Hiding several messages ● ● ● ● Deniable cryptography Knowledge of encrypted data No proof of how much information is stored Rubberhose (http://www.rubberhose.org) What is steganography? Digital watermarking ● ● ● ● Not really hiding information Important: not modificable Uses the hiding-property of steganography Recent: MPAA hides watermarks in movies Implementation Hiding information ● ● ● ● Text...

Words: 681 - Pages: 3

Analysis on "The Hiding Place"

...Analysis on "The Hiding Place" Trying to forgive your enemy is like trying to see in the dark, it is nearly impossible. In Corrie Ten Boom's book, The Hiding Place, forgiving her enemies was hard, but her faith in God made it possible. At the very beginning of the book, Corrie Ten Boom introduces the theme of faith by telling about her family and their strong Christian beliefs. She tells about her father, Casper. She explains that he would read the Bible and pray with Corrie and her family twice a day. Corrie's father also loved and respected the Jewish. Along with her father, the author mentions Betsie, her sister. Betsie took care of their home in Haarlem, Holland. In 1940, the Nazis invaded Holland, and World War II began. Due to the Ten Boom's strong Christian beliefs, they felt obligated to help their Jewish friends in every way possible. Their home soon became the center for a major anti-Nazi operation. In order to help her friends, Corrie had to do some sinful things like lie and bribe. Corrie sacrificed her own safety.nd part of her bedroom that became a secret room that was a hiding place for the Jews to have constant safety. The author later tells us that her entire family gets arrested by the Nazis, but the hidden Jews remained safe. Corrie and Betsie were sent to various concentration camps where the conditions were cruel. In every camp, the sisters used a hidden Bible to spread the word of God. Corrie was amazed by Betsie's faith through the...

Words: 439 - Pages: 2

Hiding a Disability

...Hiding a Disability Craig Kendzie ETH/316 January 14, 2014 Tammy Matthews Hiding a Disability Many people did not know that our former President Franklin D Roosevelt was paralyzed from the waist down. They believed if the public was aware of this that they would not have voted for him due to this shortcoming. He would wear very long pants and his braces were painted black to help disguise his disability. He would also address the public while seated in his automobile. President Roosevelt physical impairment in no way affected his performance in representing this county. It is a shame that society is judgmental and narrow when it deals with the disabled. Watching this short film opens your eyes on how we may or may not be The issues of this film are important because they address things that are still around today. They may have improved but, deep down people still have these beliefs and thoughts. There are laws and policies put into place to protect the disabled from being discriminated against. First of all that politics are deceitful. It may have worked to the advantage of the handicapped president, but it was not fair to himself or the public. This has no bearing on how he performed his duties however, it goes to show that trickery has been around for a long time. Another issue this film has shown that having a physical disability can cause prejudice and you may not be afforded the same opportunities as others. The role in external societal pressures have in...

Words: 717 - Pages: 3

Mortgage Rice Price Policy in Thailand and Its Hiding Aim

...Mortgage rice price policy in Thailand and its hiding aim 08 Fall 08 Fall Abstract Thailand has had a great influence on the global rice market for decades due to its huge stock and export. Hence, the Thai government has intervened in the paddy rice market by introducing the mortgage rice price policy. The policy was first implemented in 1980 in order to resolve the low-price problem in the paddy rice market. However, in the 21st century the government attempted to re-issue the policy, even though the paddy rice market price was already high at that time, resulted in a marketing failure to both domestic and international markets. Furthermore, the cost of the policy was excessively high raising concerns that the main reasons for presenting the policy could not be purely economical. Therefore, I argue that there were political reasons behind the aim of amending the policy in 2001. This essay will examine this argument by providing the process of the policy, the effects and problems of the policy, the cost of the policy and the hidden aim of the policy. CONTENT * Introduction * The process of the mortgage rice price policy * The rice distribution system * The effects of the policy * The problems and errors of the policy * The cost of the policy * The hidden aim of the policy * Conclusion * References What was the main reason for presenting the mortgage rice price policy...

Words: 2702 - Pages: 11

Data-Hiding Techniques

...Undelete 360 is the free version of a commercial product, and so leaves out some useful features (file filtering, previews and so on). These still appear in the interface, though, and suggest you upgrade if you ever click on them, which can be annoying. There are no restrictions on the amount or size of the files you can recover, though, and otherwise the program is very simple to use: point it at a drive, it'll scan for deleted files, then you can view particular file types (JPGs, PDFs, videos and more) by choosing them from a tree. Scanning speed isn't great, but Undelete 360 can recover files that other programs miss, and so it's definitely worth considering [ (Williams, 2013) ]. Standard undelete programs are perfect for recovering a few files, but if you've lost an entire partition then you'll probably benefit from a specialist application like MiniTool Partition Recovery. The free (for personal use) program has a wizard-based interface which makes it very straightforward to use. Point MiniTool Partition Recovery at the problem drive, specify the area to be searched, and it'll scan for the missing partition. A report will let you know what the program has found, and you can recover the partition in a few seconds. You don't get a bootable recovery disc here, so if your system partition is damaged then MiniTool Partition Recovery won't help you very much. Otherwise, it provides a quick and easy way to locate and restore lost partitions [ (Williams, 2013) ]. A tool...

Words: 1131 - Pages: 5

In Hiding

...Joyce Carol Oates’ short story “In hiding” is about a woman who is working as a poet, translator and part-time college teacher. Furthermore, she is a single Mother of a fifteen-year-old son. Suddenly she finds herself in an unusual relationship whit an inmate at Kansas State Penitentiary for Men in Fulham, Kansas who is sentenced to life. They have never met in real life and suddenly she just receives a letter from a man who goes from being number AT339I4 to Woody. He sends her poems and diary excerpts because he wants to be a writer himself. Their odd relationship starts to grow. It is not romantic or sexual, but it is described as they are dating in a strange way. He tells her a lot about himself and she is holding back. “…he would know a good deal about her. More than se was comfortable whit him knowing, in fact.” When he doesn’t write to her as much as he did before she starts wondering: “Had he found another correspondent?” Even though, she is holding back, she still kind of describes that their relationship is special to her and not just an exchange of poetry. “She thought I should break this off with him. This isn’t a wise thing.” The individualization is seen many times in the story. First of all we never get her name which really shows that she don’t have any identity. Woody makes her question a lot of things especially the question about whether she is a racist or not. “She wondered if she was, unknowingly, a racist?” This question shows that that there...

Words: 457 - Pages: 2

Cis 417 Week 8 Assignment 4 Data Hiding Techniques

...CIS 417 WEEK 8 ASSIGNMENT 4 DATA HIDING TECHNIQUES To purchase this visit here: http://www.activitymode.com/product/cis-417-week-8-assignment-4-data-hiding-techniques/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 8 ASSIGNMENT 4 DATA HIDING TECHNIQUES Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be doing and comes to you for some explanation on these techniques. Write a two to three (2-3) page paper in which you: 1. Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS. 2. Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. 3. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given situation. More Details hidden Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 8 Assignment 4 Data Hiding Techniques in order to ace their studies. CIS 417 WEEK 8 ASSIGNMENT 4 DATA HIDING TECHNIQUES To purchase this visit here: http://www.activitymode.com/product/cis-417-week-8-assignment-4-data-hiding-techniques/ Contact us at: SUPPORT...

Words: 655 - Pages: 3

Information Hiding - Steganography

...Information Hiding – Steganography Steganography Types and Techniques Abstract— Information hiding has been one of the most crucial element of information technology in recent years. Unlike Cryptography, Steganography does not only keep the content of information secret, its also keeps the existence of the information secret. This is achieved by hiding information behind another information. This paper gives an overview of Steganography and its techniques, types, and also its advantages and disadvantages. Keywords-component; steganography; information hiding; security; confidentiality; techniques. INTRODUCTION Steganography help hides the fact that communication is taking place by hiding some information behind another information thereby making the communication invisible. The origin of the word “steganography” is from the Greek words “steganos” and “graphia” which is interpreted as “covered” and “writing” respectively thereby defining steganography as “covered writing”. Steganography and cryptography are both part of information hiding but neither alone is without flaws. The goal of steganography is defeated once the hidden message is found or noticed even while still in the original message (carrier). For safely transmission of hidden messages or information in steganography, multimedia files like audio, video and images are mostly used has the carrier or cover source. METHODOLOGY The Methodology used for this paper is based on...

Words: 1519 - Pages: 7

Cis 417 Assignment 4 Data-Hiding Techniques

...CIS 417 Assignment 4 Data-Hiding Techniques Buy Now From Below: http://www.homeworkarena.com/cis-417-assignment-4-data-hiding-techniques Assignment 4 Data-Hiding Techniques.. Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be doing and comes to you for some explanation on these techniques. Write a two to three (2-3) page paper in which you: 1. Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS. 2. Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. 3. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given situation. 4. Select two (2) tools that could be used for steganography and explain how these tools can help someone hide data from others. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA......

Words: 297 - Pages: 2

Cis 417 Assignment 4: Data-Hiding Techniques

...CIS 417 Assignment 4: Data-Hiding Techniques https://homeworklance.com/downloads/cis-417-assignment-4-data-hiding-techniques/ Assignment 4: Data-Hiding Techniques Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be doing and comes to you for some explanation on these techniques. Write a two to three (2-3) page paper in which you: 1. Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS. 2. Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. 3. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given situation. 4. Select two (2) tools that could be used for steganography and explain how these tools can help someone hide data from others. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school...

Words: 367 - Pages: 2

Homework #2 Implicit Association Test

...Florida International University MAR 4503 Consumer Behavior Fall 2015, Section U01 Dr. Jayati Sinha Homework #2 Implicit Association Test October 12, 2015 (1) Describe your experience doing the demo test. What did you expect would happen? Did the results surprise you? Do you think the results are a valid measure of your implicit attitudes? Why or why not? In your answer, be sure to consider the issues raised in the FAQ page. I believe that in the domain of intergroup discrimination like race, age, and sexual orientation the Implicit Association Test does better than self-report at predicting behavior. I also understand that I may not say what's on my mind either because I am unwilling or because I am unable to do so. The unwilling-unable distinction is like the difference between purposely hiding something from others and unconsciously hiding something from myself. The Implicit Association Test makes it possible for me to penetrate both of these types of hiding. The Implicit Association Test measures implicit attitudes and beliefs that we are either unwilling or unable to report. (2) How could you use this technique to test consumer attitudes towards any brands? Would you expect the results to differ from explicit measures of attitudes? Why or why not? -Tapping consumer insights in such a way more appropriately captures the richness of consumers' perceptions, feelings, and attitudes toward a brand. -Allows for indirect measurement of......

Words: 264 - Pages: 2

The Reusability of a Code

...The Reusability of a Code Randy Lane March 27, 2012 The Reusability of a Code In computer science and software engineering reusability is a segment or part of a code that can be used again to add new functions with a little change or hardly any modification. Reusing if codes can reduce not only time, but also can increase that prior testing stage and use of it can reduce bugs and some code modifications when a change in code is required. The reusability of a code, many programmers know that is not easy designing and coding a module or object. When implementing a code, it can be complex and can take a long time to be done or accomplish. When it comes down to it, it makes a lot of sense to use the code as often as you can. Code reusability has actually become a very valuable part of adding efficiency and actually made it easier for programmers and computer programming itself. When making a program either you can start from scratch every time or you can use the code previously made and just add on to it. In programming information, hiding is the principal of separating the designs and or making certain decisions in a computer program can actually change. Information hiding protects other parts of the program from actually changing a lot. If the design is changed in any way then the Information hiding actually provides a stable code, which can protect the remainder of the program from the implementation. The details are most likely to...

Words: 579 - Pages: 3