Wednesday, October 30, 2019
E gov Case Study Example | Topics and Well Written Essays - 2000 words
E gov - Case Study Example he effect of the established water projects in peopleââ¬â¢s lives, demonstrate institutional failures and corruption of Thar government and how they have led to distrust in the public and my opinion to reduce such occurrences. Decrease of monsoon rainfall is caused by Arabian Sea that branch north of Cambay gulf resulting in extreme drought conditions in Thar Desert, unexpected change of air currents, and the dry air of Sind. Karakilcik and Kalyar (2014) argue that deflection of air currents to the east in Arabian Sea is increasing causing the air to move east and southeast. As a result, the rain bearing wind reaches south-west of Arabia and marks the end of monsoon rainfall. This has caused increasingly drought conditions in Thar Desert. Thar Desert in south East Pakistan has been suffering from extreme drought conditions for a period of three years. Jillian (2015) notes that Tharparkar region is the most neglected areas in Pakistan. Lack of proper rain for the last three years has affected people and livestock greatly. An interview with one of the residents of Thar parkar region in Pakistan indicates that drought has left nothing edible for people and livestock. Halepoto (2012) indicates that 90% of the agricultural land has perished due to inadequate water. Human beings are suffering. Reports from the local doctors and hospitals indicate that children are the most affected due to malnutrition and premature births. Despite the increased efforts by the government to get the people of Pakistan from crisis, the continuous increase in drought is dragging their efforts (Halepoto, 2012). Water borne diseases from saline water and malnutrition have caused increased number of infant deaths. In search of greener pastures, thousands of people migrate to the nearby farming districts close to River Indus (Poonia and Rao, 2013). Trained Health care workers are migrating to big cities, such as Karachi to look for employment (Halepoto, 2012). There is also no continuity in
Sunday, October 27, 2019
Francisella Tularensis Gene Sequencing
Francisella Tularensis Gene Sequencing Francisella tularensis, a pathogenic gram-negative bacteria and the only bacteria recognized under the genus Francisellaceae of the gammaproteobacteria family, was isolated by George Walter McCoy from ground squirrels in 1912. There are four subspecies of F. tularensis: biovar tularensis (type A), biovar holartica (type B), subspecies novicida, and biovar mediasiatica. Type A, most commonly found within North America, is the most virulent subspecies and includes the fully sequenced laboratory strain, SCH4U. Type B is most commonly found within Europe and Asia but is rarely linked to fatal disease while subspecies novicida and biovar mediasiatica, found within North America and central Asia respectively, are non-virulent strains in human hosts, however, little is known about the latter. F. tularensis is non-motile , aerobic and rod shaped with an approximate size of 0.2 à µm. Despite F. tularensis having been categorized as a Class A Select Agent by the U.S. government as a prospective instrument of bioterrorism, human-to-human transmission of the bacteria has not been observed. F. tularensis is most commonly spread through vectors such as ticks or deer flies, with aquatic rodents, deer and lagomorphs being common reservoir hosts. F. tularensis has the ability to infect a host via skin contact and inhalation, leading to ulceroglandular forms of tularemia and pneumonic tularemia. Without treatment, pneumonic tularemia has been shown to be fatal (mortality rate of 30-60% if left untreated), causing symptoms such as fever, anorexia, and septicemia within approximately three to four days after infection. Although human-to-human transmission has not been identified, F. tularensisââ¬â¢ ability to infect human hosts is not hindered. F. tularensis requires a low infectious dose (approximately 10-50 bacteria), contributing to its high virulence. Being an intrac ellular bacterium requiring cysteine for growth can be limiting, however F. tularensis is capable of surviving outside of a host for weeks at a time. This characteristic leads to its easy spread when one comes in contact with water and grasslands, particularly during activities like brushcutting or lawn mowing in which the carcasses of dead reservoir animals may be present within the environment, leading to what is commonly known as ââ¬Å"lawnmower diseaseâ⬠or ââ¬Å"rabbit diseaseâ⬠. Tularemia is endemic in North America, Europe and Asia with 5-10% of cases being waterborne infection opposed to the most common method, via contact with reservoir animals. At risk groups include those who are immunosuppressed. The life cycle of this intracellular pathogen is important in determining which aspects are of main focus when dealing with potential virulence factors. There are approximately five steps of this pathogens life cycle: entry (associated with type IV pili), phagosomal escape, cytoplasmic multiplication (associated with biofilms and ppGpp), lysis and release (associated with MglA). The entry of this pathogen is dependent on complement factor C3, mannose receptors and cell surface-expressed nucleolin (encoded by the ncl gene). Within the cell, the bacterium colocalizes within arrested, late endosomal phagosomes. Within 15-30 minutes, the phagosomes are destroyed and the bacteria escape into the cytoplasm of the host cell. After multiplication, two distinct mechanisms for host cell lysis occur: Type 1-induced apoptosis and caspase 1-mediated pyropoptosis (in which immune cells that recognize signals of infection within themselves, go through programmed cell death via production of cytokin es). The pathogens response to innate immunity within the host cell also plays a role in itââ¬â¢s virulence as evading innate responses (such as production of cytokines) is crucial when infecting host cells, macrophages in particular. Being able to detect environmental changes through use of two-component systems help the pathogen survive in different conditions within or outside of host cells, which can have a huge impact on its virulence as well. Biofilms also play a significant role in the virulence of F. tularensis. Biofilms are a community of microbes attached to a surface, encased in a matrix. Biofilms help provide protection from antimicrobial agents as well as protection from the immune system of the host. Biofilms play a role in chronic infections as they protect the bacteria which are most resistant to antibiotics or antimicrobials that may be administered to the host. In the case of F. tularensis, biofilm formation is increased when the relA gene is inactivated. Production of hyperphosphorylated guanosine diphosphate and triphosphate analogs or (p)ppGpp, is used to combat limited nutrient conditions. Uncharged tRNA molecules bind the ribosome resulting in stalling of translation and activation of ribosome associated RelA. This causes the production of (p)ppGpp which is then converted to ppGpp. ppGpp molecules bind RNA polymerase to alter gene expression under certain conditions. Inactivation of the relA gene causes d efective production of (p)ppGpp which leads to increased biofilm formation and increased resistance to stress. These biofilms make it hard to treat infections resulting from this pathogen as eliminating the pathogen from the body becomes more difficult with increased production of biofilms and increased resistance. The ability for this pathogen to survive without a host is due, in part, to its ability to adapt to different environments by activation and repression of genes, some of which are found within what are known as pathogenicity islands. In the case of F. tularensis, the pathogenicity island FP1, contains 17 highly controlled genes that are crucial to its survival. In the laboratory strain of Type A alone, the expression of approximately 658 genes are up regulated and/or down regulated during infection within macrophages. The change in expression of these genes has helped researchers understand F. tularensisââ¬â¢ reactions to specific environmental stimuli such as temperature, limited iron source and oxidative stress. In terms of temperature as an environmental stimuli, F. tularensis is able is to alter its outer surface when growing in temperatures of 25à °C as opposed to 37à °C in a human host, by modifying the lipid A of lipopolysaccharide (LPS). This pathogen is capable of tempe rature changes through involvement of alternative sigma factors as well as heat-shock proteins. In F. tularensis, the only alternative sigma factor that is encoded is RpoH. In terms of iron acquisition, intracellular pathogens require the ability to acquire iron because of the limited availability within mammalian host cells, as intracellular replication is iron-dependent. F. tularensis contains siderophores. These small molecules grow under iron-limiting conditions and bind iron from inorganic and host sources. Studies show that iron-starved F. tularensis expresses an additional 80 genes, including some within FP1, and that F. novidica growth in broth and macrophages is inhibited as well as it virulence in regards to causing pneumonic tularemia in mouse models. In addition to temperature and iron acquisition, the detection of oxidative stress is important as oxidative stress is hugely involved in innate antimicrobial responses by macrophages in the host. Reactive oxygen species (RO S) and reactive nitrogen species (RNS) have the ability to produce superoxide and hydrogen peroxide molecules which cause damage to biological molecules within bacterial cells, such as DNA, as well as important enzymes which lead to metabolic defects. F. tularensis has the ability to inactivate these reactive species by inactivation of the phagocyte NADPH oxidase which is found within the phagolysosome and is required to reduce oxygen to superoxide anions. Environmental stimulus is important when studying the virulence of this pathogen as it is directly related to regulation of virulence gene expression. In fact, the gene MglA (or macrophage growth locus) has been linked with responses to oxidative stress. MglA in particular, is required for replication within macrophages. MglA is highly up-regulated during infection and mutant strains are unable to escape macrophage phagosomes. MglA binds with SspA (a transcription factor that responds to nutrient limitation) as well as RNA polymerase in a heterodimer which is required for FP1 gene activation. In order for the pathogen to detect these environmental stimuli, however, two component regulatory systems composed of membrane-bound sensor kinases and cytoplasmic response regulators are essential. The F. tularensis genome codes for two of these systems, one of which is of major importance and contains a response regulator that resembles PmrA of E. coli bacteria, involved in LPS modification. Inactivation of this gene increases susceptibility to killing through antimicrobial actions, decreased growth and inability to escape macrophages. PmrA is described as a DNA binding protein that allows for binding of the MglA and SspA complex bound to RNA polymerase to initiate FP1 gene transcription. Aside from gene expression relating to virulence, genes within F. tularensisââ¬â¢ genome have also been shown to produce structures that aid with its life cycle and its virulence. One structure in particular is type IV pili. Multifunctional and flexible, these appendages are capable of adhesion, motility, biofilm formation and conjugation, all of which are important aspects of colonization of pathogens. In human strains of the virus, type IV pili have been shown to be essential for virulence, specifically in type A. In type B strains (which have relatively low virulence), however, pseudogenes of genes encoding type IV pili have been found which further support the idea that virulence is somehow connected to type IV pili. In the case of F. tularensis, type IV pili are essential for the binding of the bacterial cell to host cells to allow phagocytosis to occur. Mutant strains lacking the genes responsible for the production of pili (mainly pilA, pilB, pilC, pilD, pilT, and pilQ) are considerably attenuated in pathogenicity. Another structural virulence determinant is the ability of Francisella tularensis to suppress and avoid early innate immune responses (which slows progression of infection and allows for adaptive immunity to develop) by modifying its LPS, as mentioned previously in regards to PmrA and temperature as an environmental stimulus. Through removal of Kdo (3-deoxy-D-manno-octulosonic acid) saccharide, F. tularensis is able to kill the host before adaptive immunity matures. Mutant strains with the inability to modify its LPS are shown to be attenuated in mice models, inducing an early innate immune response. The O-antigen present within the LPS of F. tularensis is also important for multiplication. O-antigen is a repetitive glycan polymer, composing the outermost domain of the LPS. Mutant strains lacking O-antigen show susceptibility to killing by serum. F. tularensis also produces AcpA (burst-inhibiting acid phosphatase) which inhibits respiratory bursts (release of neutrophils by macrophag es when they encounter bacteria) in order to help evade host immune system responses. Though the genome of F. tularensis has been sequenced, not many genes have been shown to be identical or even similar to those currently within bioinformatics databases. This makes it challenging to determine what genes are responsible for what functions. As described above, the major factors that determine F. tularensisââ¬â¢ virulence are mainly two-component systems which detect environmental stimuli, helping the bacteria adapt to environmental change (including temperature, iron limitation and oxidative stress), which leads to expression of important regulatory genes such as MgIA, PmrA, and relA, all of which are associated with specific stages of its life cycle. MglA is of major importance because of its role in initiating transcription of another virulence factor, the FP1 pathogenicity island. Biofilms, LPS modification and type IV pili also influence virulence through their ability to aid in multiplication, resistance, and evasion of innate immunity as well as entry into hos t cells. Even though the functions of many genes within the genome of F. tularensis are unknown, this pathogen is still very important to the world of biotechnology because of its ability to be used as a biological weapon. This is due to several characteristics of F. tularensis including being: easy to aerosolize, highly infective (requiring only a small dose of 10-50 bacteria for infection) highly incapacitating to infected hosts (with a relatively high mortality rate if its associated disease is left untreated). WHO estimated, in 1969, that 50kg of aerosolized virulent F. tularensis could result in 250,000 illnesses and 19,000 deaths if dispersed over a population of approximately 5 million people. This has led to production of a live vaccine as well as an attenuated; however the live vaccine has not yet been approved within the United States and the attenuated vaccine is only available in special cases. Disease associated with this pathogen is currently treated with antibiotics, the drug choice being streptomycin or tetracycline-class drugs. The best way to prevent an infection by F. tularensis is through proper protection when skinning wild animals, particularly lagomorphs (rabbits), avoiding ingestion of uncooked reservoir animals and untreated water sources in which these animals inhabit as well as wearing repellent to prevent tick bites.
Friday, October 25, 2019
Identifying Drugs of Abuse Using Gas Chromatography :: Forensic Science
Scenario On the 23rd of September 2015 at 22:58, Mr. Rob Slone was arrested on Sanctuary Road, West Bridgford on possession with intent to supply. A large amount of cash was found on the suspect and a bag containing unknown tablets and powders was recovered from the riverbank, in close proximity to the location of the arrest. A balance with off- white powder, an off- white powder in self sealed bag and a tablet in paper wraps were seized from Mr. Slone's property. At the riverside, a à £5 note, a tablet in paper wraps and 2 off- white powders in self sealed bags, were seized. Physical examination Aim The evidence is physically examined to determine the integrity of the seized substances before any destructive techniques are used. Introduction In forensic science physical examination of the evidence is essential as if the packaging is not correct evidence can be lost or accessed. A chain of custody is important Photography is essential, any photographs should be taken before the evidence is moved. Methods Exhibit MF/2 Before any destructive techniques were used on the exhibit, the integrity of the packaging was determined. The tamper evident bag containing the exhibit was examined to check if was correctly labelled and sealed. Upon receipt of the exhibit the continuity label was signed to ensure the integrity of the exhibit. The tamper evident bag was cut and opened. The yellow paper wrap containing the white tablet measured 1.8x 4cm. The yellow paper wrap was opened to remove the tablet. The exhibit MF/2 was photographed with scale. Visual examination indicates that the exhibit is a white tablet with a manufacturerââ¬â¢s logo CO/COD. The imprint suggested that the tablet could be co-codamol. Co-codamol The tablet was weighed in a plastic weighing boat to prevent any contamination. The tablet weighed 0.6001 grams. All the information was noted on a General Examination Record. Exhibit DR/3 Upon receipt of exhibit DR/3 the continuity label was signed. The tamper evident bag was cut and opened. In the bag there was an off white powder in a sealed bag. The bag containing off white powder was weighed. It weighed 0.80823 grams. Results and discussion Physical examination is essential for the integrity of exhibits. The exhibits must be physically examined before any techniques that would destroy are used. The exhibits The aim of the experiment as a forensic analyst is to examine the seized items visually before the presumptive tests. Exhibits Bag Number Samantha Naas DR/3 D10025448 MF/2 D10025224 Catherine Tuckey DR/2 D10025606 MF/3 D10025590 Lee Berry DR/1 D10025639 MF/4 D10025438 Presumptive tests Aim The presumptive tests are carried out to get a preliminary identification of the controlled sample and are used for qualitative analysis of the unknown substance.
Thursday, October 24, 2019
North American Free Trade Agreement
The NAFTA agreement was signed in 1992, ratified in 1993 and implemented in 1994. It was designed to completely rescind trade barriers between these three nations. It had been surmised that this agreement would enhance employment due to increase in trade (North American Free Trade Agreement (NAFTA) , 1995).This agreement, which is second only to the European Economic Area in trade volumes, constitutes a single free trading zone for approximately three hundred and sixty ââ¬â five million consumers of these three countries. It set aside import duties on a large number of goods that were exported from the US to Mexico and over a period of fourteen years, hoped to eliminate all tariffs. Subsequently, sections on affording protection to workers and the environment were included (Vogel, 2007).An agreement was reached between Canada, Mexico and the United States of America, whereby a free trade zone was to be created between these countries. This was termed as the North American Free Tr ade Agreement or the NAFTA. It has been instrumental in providing a platform for resolving trade related disputes amongst these nations. Furthermore, the NAFTA has actively taken up the safeguarding of intellectual property rights and compliance with the laws relating to the protection of such rights (North American Free Trade Agreement (NAFTA) , 2003).The NAFTA has engendered bitter and persistent opposition. A number of collective bargaining organizations have highlighted the fact that the prevalence of abundant and comparatively cheaper labor in Mexico has prompted several manufacturers to shift their operations to that country. The result of this relocation has been a drastic reduction of jobs in the US. However, opponents to this contention have argued that the free trade brought about by the NAFTA has generated more jobs than it has destroyed in the US (North American Free Trade Agreement (NAFTA) , 2002).There has been a marked increase in unemployment in the US. Moreover, the number of immigrants, both legal and illegal, into the US has depicted an unprecedented increase. The mass immigration of Mexicans is so grave that on many an occasion, they have risked their lives to enter the US. A meaningful decision regarding the various disputes besetting NAFTA has not been taken and it seems to have failed miserably (Tonelson, 2004).The consensus of most of the authentic reports has been that NAFTA has benefited only the transnational corporations. Workers, farmers and small businesses in Canada, Mexico and the US have uniformly been put to a huge loss. In addition, the environment has also sustained considerable damage due to this agreement. The health, safety and rights of labor in all three countries were badly compromised. However, there was a significant boost to the economy of the US and Mexico (Brown). Therefore, it can be stated, unequivocally, that the NAFTA, has by and large been a fiasco and the only beneficiaries have been the transnational corpor ations. ââ¬Å"North American Free Trade Agreement (NAFTA).â⬠The New Dictionary of Cultural Literacy, Houghton Mifflin. 2002. CredoReference. 18 December 2007 . The New Dictionary of Cultural Literacy, Houghton Mifflin, 2002, s.v. ââ¬Å"North American Free Trade Agreement (NAFTA),â⬠DISPLAYURL (accessed December 18, 2007). http://www.credoreference.com/entry/2444726ReferencesBrown, G. (n.d.). Speak Out: Portrait of a Failure, NAFTA and Workplace Health and Safety. Retrieved December 18, 2007, from MHSSN: http://mhssn.igc.org/brown_synergist.htmNorth American Free Trade Agreement (NAFTA) . (2002). Retrieved December 18 , 2007, from The New Dictionary of Cultural Literacy, Houghton Mifflin: http://www.credoreference.com/entry/2444726North American Free Trade Agreement (NAFTA) . (1995). Retrieved December 18 , 2007, from In Dictionary of Economics, Wiley: http://www.credoreference.com/entry/2765482North American Free Trade Agreement (NAFTA)North American Free Trade Agreemen t (NAFTA) . (2003). Retrieved December 18, 2007, from Webster's New World Finance and Investment Dictionary: http://www.credoreference.com/entry/Tonelson, A. (2004, January 20). NAFTA at 10 ââ¬â A Miserable Failure. Retrieved December 18, 2007, from American Economic Alert: http://www.americaneconomicalert.org/view_art.asp?Prod_ID=936Vogel, D. (2007). North American Free Trade Agreement . Microsoftà ® Student 2008 [DVD] . Redmond, WA: Microsoft Corporation à ® 2008. à © 1993-2007 Microsoft Corporation. North American Free Trade Agreement NAFTA agreement was signed in 1992, ratified in 1993 and implemented in 1994. It was designed to completely rescind trade barriers between these three nations. It had been surmised that this agreement would enhance employment due to increase in trade (North American Free Trade Agreement (NAFTA) , 1995).This agreement, which is second only to the European Economic Area in trade volumes, constitutes a single free trading zone for approximately three hundred and sixty ââ¬â five million consumers of these three countries. It set aside import duties on a large number of goods that were exported from the US to Mexico and over a period of fourteen years, hoped to eliminate all tariffs. Subsequently, sections on affording protection to workers and the environment were included (Vogel, 2007).An agreement was reached between Canada, Mexico and the United States of America, whereby a free trade zone was to be created between these countries. This was termed as the North American Free Trade Agreement or the NAFTA. It has been instrumental in providing a platform for resolving trade related disputes amongst these nations. Furthermore, the NAFTA has actively taken up the safeguarding of intellectual property rights and compliance with the laws relating to the protection of such rights (North American Free Trade Agreement (NAFTA) , 2003).The NAFTA has engendered bitter and persistent opposition. A number of collective bargaining organizations have highlighted the fact that the prevalence of abundant and comparatively cheaper labor in Mexico has prompted several manufacturers to shift their operations to that country. The result of this relocation has been a drastic reduction of jobs in the US. However, opponents to this contention have argued that the free trade brought about by the NAFTA has generated more jobs than it has destroyed in the US (North American Free Trade Agreement (NAFTA) , 2002).There has been a marked increase in unemployment in the US. Moreover, the num ber of immigrants, both legal and illegal, into the US has depicted an unprecedented increase. The mass immigration of Mexicans is so grave that on many an occasion, they have risked their lives to enter the US. A meaningful decision regarding the various disputes besetting NAFTA has not been taken and it seems to have failed miserably (Tonelson, 2004).The consensus of most of the authentic reports has been that NAFTA has benefited only the transnational corporations. Workers, farmers and small businesses in Canada, Mexico and the US have uniformly been put to a huge loss. In addition, the environment has also sustained considerable damage due to this agreement. The health, safety and rights of labor in all three countries were badly compromised. However, there was a significant boost to the economy of the US and Mexico (Brown). Therefore, it can be stated, unequivocally, that the NAFTA, has by and large been a fiasco and the only beneficiaries have been the transnational corporatio ns. ââ¬Å"North American Free Trade Agreement (NAFTA).â⬠The New Dictionary of Cultural Literacy, Houghton Mifflin. 2002. CredoReference. 18 December 2007 . The New Dictionary of Cultural Literacy, Houghton Mifflin, 2002, s.v. ââ¬Å"North American Free Trade Agreement (NAFTA),â⬠DISPLAYURL (accessed December 18, 2007). http://www.credoreference.com/entry/2444726ReferencesBrown, G. (n.d.). Speak Out: Portrait of a Failure, NAFTA and Workplace Health and Safety. Retrieved December 18, 2007, from MHSSN: http://mhssn.igc.org/brown_synergist.htmNorth American Free Trade Agreement (NAFTA) . (2002). Retrieved December 18 , 2007, from The New Dictionary of Cultural Literacy, Houghton Mifflin: http://www.credoreference.com/entry/2444726North American Free Trade Agreement (NAFTA) . (1995). Retrieved December 18 , 2007, from In Dictionary of Economics, Wiley: http://www.credoreference.com/entry/2765482North American Free Trade Agreement (NAFTA)North American Free Trade Agreement (N AFTA) . (2003). Retrieved December 18, 2007, from Webster's New World Finance and Investment Dictionary: http://www.credoreference.com/entry/Tonelson, A. (2004, January 20). NAFTA at 10 ââ¬â A Miserable Failure. Retrieved December 18, 2007, from American Economic Alert: http://www.americaneconomicalert.org/view_art.asp?Prod_ID=936Vogel, D. (2007). North American Free Trade Agreement . Microsoftà ® Student 2008 [DVD] . Redmond, WA: Microsoft Corporation à ® 2008. à © 1993-2007 Microsoft Corporation.
Wednesday, October 23, 2019
How Is Romeo Presented in the First Two Acts of Romeo and Juliet
In the first two acts of Romeo and Juliet, Romeo is presented as a young, love struck man. He is a dreamer and a fantasist. The audience feels sympathetic towards him because love is taking him nowhere. In Act 1, we first meet Romeo as he is sobbing about his love for a young lady, who we later find out to be Rosaline. The first line he speaks, ââ¬Å"Is the day so young?â⬠, suggests that he is bored and waiting for something to happen as he is so shocked about how early it is in the day. To emphasise this, he goes on to say, ââ¬Å"Ay me, sad hours seem so longâ⬠. Benvolio asks Romeo why he is sad and he explains that he is sad because he has no love and his line, ââ¬Å"Out of here favour where I am in lovesâ⬠shows that the person he loves does not love him. This is how the audience first learns of Romeoââ¬â¢s love struck ness. To show even more how love struck and sad Romeo is, he admits it to himself when he says, ââ¬Å"This is not Romeo, he is some other where.â⬠Benvolio asks him to ââ¬Å"examine other beautiesâ⬠to cure his love sickness. But Romeo says that if his eyes see anything more beautiful than Rosaline, then ââ¬Å"turn tears to firesâ⬠. This shows that Romeo is very single-minded on Rosaline and believes that no one could be more beautiful than her. On the way to the Capuletââ¬â¢s party, Romeo is presented as upset and a spoil sport. He explains that he has a ââ¬Å"soul of leadâ⬠which ââ¬Å"stakes [him] to the ground [he] cannot moveâ⬠. This shows that he is very serious about his love for Rosaline and feels his sadness as a heavy weight on him, not allowing him to have fun, but to grieve. Reluctantly, Romeo agrees to go to the party in the hope that he will find Rosaline. At the Capuletââ¬â¢s party, Romeo finds another girl, Juliet, and is entranced by her beauty. He asks himself, ââ¬Å"Did my heart love till now?â⬠. This line suggests that he completely falls in love with Juliet and asks himself whether he did love Rosaline or whether he had just got it into his head. This shows that Romeo was very single-minded and a sudden link is made between him and Juliet. However, as Romeo is so absorbed by Juliet he looses his disguise. When Tybalt, a keen Capulet, finds out about this and becomes very angry, describing Romeo as a ââ¬Å"villain Montagueâ⬠because he has gate crashed the Capuletââ¬â¢s party. This shows that Tybalt is an enthusiastic Capulet and believes Romeo is of the opposite being. But Capulet himself is in a very jolly mood and he describes Romeo as a ââ¬Å"portly gentlemenâ⬠and a ââ¬Å"well-governed youthâ⬠, showing that Capuletââ¬â¢s beliefs of Romeo is that he is a dignified and well behaved young man. Romeo is also described as a handsome and gentle young man. This is shown in Act 2, as the Nurse described Romeo as ââ¬Å"his face be better than any manââ¬â¢sâ⬠and ââ¬Å"gentle as a lambâ⬠. This shows that there are different views of Romeo from different characters but, in general, Romeo is presented as a young, handsome and brave young man who is a distant part of his feud-orientated family. As soon as Romeo falls in love with Juliet a sudden link is made between them. The way they speak is very poetic and in verse, as if they know exactly what to say next. Also, Romeo is presented as religious when he compares his lips to ââ¬Å"two blushing pilgrimsâ⬠. Romeo is presented as a quite sensible young man and, unlike Benvolio and Mercutio, he doesnââ¬â¢t joke about and mess around. He also doesnââ¬â¢t seem to be part of the dispute between the Capuletââ¬â¢s and Montagueââ¬â¢s, showing how keen his is on love. On the other hand, as soon as Romeo and Juliet fall in love they become trapped in their own world and donââ¬â¢t mention much about their families being enemies. Romeo sometimes risks his life and many consequences in order to see Juliet, showing how much he truly loves her. Romeo is also presented as a risky and completely taken in man. At the end of Act 2, Romeo agrees to marry Juliet, but neither the Capuletââ¬â¢s nor Montagueââ¬â¢s no about it. This is very risky for Romeo and Juliet and Romeo seems to dismiss the consequences because he is so taken in by Juliet. To make things even more secretive, Romeo arranges for a rope ladder to be sent to the excited Nurse, so that Romeo can climb into Julietââ¬â¢s room to get married. In conclusion, Acts 1 and 2 of Romeo and Juliet presents Romeo as, at first, a fantasists and love struck man. By the end of Act 2, he is seen as a very entranced and risky man, showing his devotion of love towards Juliet.
Tuesday, October 22, 2019
Annotated Bibliography on Technology
Annotated Bibliography on Technology Annotated Bibliography on Database Forensics: Data base forensic has various aspects including its process, weaknesses and disadvantages. This research paper aims at explaining the process of data base forensic, its related weaknesses and disadvantages. This is to certify whether the use of database forensics tools will keep the confidentially of the data or not. In the first instance, data base forensic has a unique process in which it is carried out. This shows that data base process has to be enacted so that facts are investigated and established. Rogers, M. (2003). The role of criminal profiling in the computer forensics process. New York. The author of this source document tries to disclose to people that there is a significant role in criminal profiling in computer forensic process. This role is most useful in computer forensic process where information of criminals is stored. He clearly and precisely impacts that knowledge into every reader of his work to make the role understood by many individuals. From the source document, we get to know that criminal profiling involves getting all the required data from criminals for proper investigations and establishment of factual information in criminal and civil courts. Criminal profiling serves a critical purpose since it keeps all information of criminals making it easy to track them even if they escape. Criminal profiling also serves to indicate that certain individuals are criminals. It includes the crime and felony committed by the criminal at hand. This source is useful in to those individuals entrusted with criminology duties. It makes them aware that criminal profiling is necessary for proper management of criminals. It also serves to show that full data and information of criminals should be taken for effective investigation and establishment of factual information concerning criminals. Werrett, J, D. (2000). The National DNA Database. Birmingham: UK. Database forensic puts into action many ways to get criminals. The data base forensic process used may involve many ways of getting the criminals. One of the methods enacted is the DNA testing operation. For the last two years, the Forensic Science Service has established and put into operation a National DNA Database. This operation is meant get criminals who escape after committing their felonies. The data base forensic process involved testing DNA samples of suspected individuals of various crimes. Also, samples were analyzed from stains from gotten from scenes of crime. This shows that the stains were to be analyzed to get the criminal who committed the offense. DNA samples of suspected individuals were tested to prove whether or not they committed the crime they are being suspected of committing. This source will be useful to those individuals who may be suspecting criminals for committing certain crimes. This is because their DNA samples can be analyzed to prove guilty or innocent of the suspected felonies. Gill, P, Curran, J, Elliot, K. (2005). A graphical simulation model of the entire DNA process associated with the analysis of short tandem repeat loci. USA. Database forensic process that deals with DNA analysis provides complete information to DNA and its related tests to arrest criminals. The author of this journal article shows us that there is a prevalent increase in the use of expert system in interpretation of short tandem DNA profiles. It has been proved that this way of getting data from criminal is cumbersome and time-consuming hence invention of the graphical model. This is reference to the Low Copy Number (LCN) applications. The graphical model is used to simulate stochastic variations related to DNA process. From the model, DNA process starts with extraction of sample followed by the preparation of a PCR reaction mixture. This shows that database forensic is becoming complex but faster in DNA process to get information regarding to criminals. This source will, therefore, be useful to those intellectual individuals dealing with criminal investigations. This source document clearly provides a complex but faster way of DNA process to get information from criminals. Willuweit, S. (2007). Y chromosome haplotype reference database (YHRD): Update. Berlin: Germany. This source document shows that Y chromosome haplotype reference database (YHRD): Update is an application of database forensic process. The update is designed for forensic analysts in their work since it is meant to store the Y chromosome haplotypes from global population. This update is mainly useful to those individuals who are interested in family and historic genetics. Since genetics is the scientific study of passage of genetic materials form parents to their offsprings, forensic analysts get to know genetic characteristics of various families. This knowledge can be used to trap criminals since their family genetic characteristics are known. Forensic analysts understand families with law breakers hence they fall suspects of crimes which happen within their reach. This source document will be useful since it gives people a clear knowledge about the Y chromosome haplotype reference database (YHRD) update. It also makes people know that family genetics can be useful in tracking criminals. Rowlingson, R. A Ten Step Process for Forensic Readiness. University of Aston: Birmingham. This research paper gives a ten step process which an individual should undergo to be for database forensic process. The ten processes outlined in the source document are as follows; define business scenario that require digital evidence, identify available resources and different types of evidence, determine the evidence collection requirement, and establish a capability for securely gathering legally admissible evidence to meet the requirement and establish a policy for secure storage and handling of potential evidence. Other steps include ensuring that monitoring and auditing is targeted to detect and deter major incidents, specifying circumstances when escalation to a full formal investigation is required, training staff, presenting an evidence-based case describing the incident and its impact, and ensuring legal review to facilitate action in response to the incident. The source document is useful since it gives researchers the ten step process for data base forensic readiness. This serves to prepare and make it known to individuals joining CID that they have to be prepared to be ready for data base forensic process. Bandelt, H, J, Lahermo, P, Richards, M V. Macaulay, V. (2001). Detecting errors in mtDNA data by phylogenetic analysis. UK. The author of this source document claims that some errors may occur on a forensic mtDNA data base. This error may result in wrong establishment of facts concerning criminals. This error may also lead to passing out wrong judgment to suspected criminals. This implies that innocent suspected criminals may be declared guilty while guilty suspected criminals may be declared innocent. This shows that the error has great effect on the judgment passed on criminals. This source document comes up with a way in which the error on a forensic mtDNA data base can be detected to avoid confusion. This source document will be useful since it gives a way in which the mtDNA error can be detected to avoid confusion and wrong judgment in criminal and civil courts. Researchers and readers can clearly understand the error and the way of detecting it. There are some weaknesses related to database forensic and its related tools. These weaknesses serve to draw back the efforts put in place, by the use of data base forensic, to investigate or establish facts in courts. The weaknesses bring about limitations to the use of forensic data base in investigating and establishing facts in courts. Lee, S, Kim, H, Lee, Lim, J. (2005). Digital evidence collection process in integrity and memory information gathering. Korea University Seoul. South Korea. The author of this source document brings out a weakness that is linked to data base forensic. The weakness is related to the EnCase that was used globally. Its weakness is that modifications can be made on MDC value of digital evidence. This shows that the MDC value is not standard hence can be adjusted resulting to resulting to errors. This led to the proposal of another counter measure. The counter measure proposed was the MDC public system, public authentication system with PKI and MAC system. This source document is useful since it brings out the weakness of the MDC value and its counter measure proposal. Leigland, R W. Krings, W. (2004). A Formalization of Digital Forensics. France. This source document brings out one of the weakness in data base forensic. The weakness limits investigation and some other ways of finding evidence against criminals. The weakness stated in this source document is the unclear use and bounds of digital evidence in legal proceedings. This means that the current techniques, of digital cameras, may not rigorous enough to be used in the courtroom. This limits evidence that is presented against criminals if recorded by digital devices such as digital cameras. This source is helpful since it makes clear the weaknesses of data base forensic. Digital evidence may not be allowed during legal proceedings in courtrooms. Harris, R. (2006). Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem. Purdue University: USA. According to this source document, there are some anti-forensics problems that act as draw backs to data base forensic. Such problems are some of the weaknesses of data base forensic in investigating and establishing facts concerning criminals. This source is helpful since it shows that anti-forensic problems act as weaknesses of data base forensic. Newsham, T, Palmer, C, Stamos, A Burns, J. (2007). Breaking Forensics Software: Weaknesses in Critical Evidence Collection. San Francisco: USA. According to this source, forensic software break down is a common problem. Such breakdown brings about problems in collection of information to be used as evidence. This results in weakness in critical evidence collection. Casey, E. (2003). Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Knowledge Solutions LLC: USA. The author of this source document mainly focuses on weakness brought about in data base forensic by tools of data base forensic. Since the tools used are not100% effective, they are prone to errors. These errors make data base forensic a defective way of investigating and establishing facts about criminals in criminal and civil courts. This source is, therefore, useful as it informs researchers of the weakness brought in data base forensic b y defective tools used. Thompson, E. (2005). MD5 collisions and the impact on computer forensics. West Lindon: United States of America. Thompson concentrates his writing on the weakness of data base forensic caused by MD5 collisions. These MD5 collisions have an impact on data base forensic since it brings about weaknesses in the MD5 hash algorithm. This leads to the general weakness of data base forensic as a process of investigating and establishing facts on criminals in courts. This source document is useful as it grants researchers and readers the chance to discover that MD5 collisions results in weakness of the data base forensic. Inclusively, there are some disadvantages that come about due to the use of database forensic tools. Nagesh, A. (2006). Distributed Network Forensics using JADE Mobile Agent Framework. Arizona State University: USA. Nagesh says that some disadvantages of data base forensic are brought about by architectures in data base forensic. This is because the architectures create network congestion near the forensics. This leads to unavailability of network in such places. Data base forensic tools and devices which use network cannot operate properly in such places due to lack of network. This interferes with collection of data and information to be used as evidence. This source is helpful since it makes researchers and readers be aware of the disadvantage caused by data base forensic architectures. Haggerty, J, Jones, D, L Taylor, M. (2008). Forweb: file fingerprinting for automated network forensics investigations. Liverpool John Moores University: UK. This source admits that there are many disadvantages connected to data base forensic. This is because some ways of data base forensic make use of approaches that use computationally exhaustive statistical measures. Some of these measures are complex in nature posing a problem in proper establishment and investigation of information to be used as evidence. The source is useful since it clearly shows that file printing for automated network forensic investigations may be intensive hence a predicament in data and information collection. Navarro, P, J, Nickless, B Winkle, L. (1995). Combining Cisco Net Flow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics. The author of this source document suggests that some of the disadvantages of data base forensic are caused by the tools used. This means that any defective tool used in data base forensic process results in one or more problems. According to her, data can be lost if the back-end SQL data base is unavailable. This implies that the lack of the back-end SQL data base results to data loss. This source is useful since it equips it readers that data will be lost if the back-end SQL data base is unavailable. Singhal, A Jajodia, S. (2006). Data warehousing and data mining techniques for intrusion detection systems. Gaithersburg: USA. The disadvantage of data base forensic explained in this source document bases on data mining and data warehousing techniques. These techniques improve performance of Usability of Intrusion Detection System (IDS). The problem comes with the current IDS since they do not provide support for historical data summarization and analysis. This means that data collected is not supported hence does not have assurance of being true or false. This source document is useful in its full content of the problem caused by the current Usability of Intrusion Detection Systems. Garfinkel, S, L. (2010). Digital forensics research: The next 10 years. Monterey: USA. The golden age of computer forensic is quickly coming to an end. This calls for careful handling of data base forensic tools. SQL, for example, requires a standardized careful planning for its handling. This means that some of data base tools are delicate and vulnerable hence requires careful handling. Careless handling of such tools may result in their damage hence loss. This source document is useful since it precisely explains the idea careful planning for data base forensic tools such as the SQL data base.
Monday, October 21, 2019
History and Geography of Puerto Rico
History and Geography of Puerto Rico Puerto Rico is the easternmost island of the Greater Antilles in the Caribbean Sea, approximately a thousand miles southeast of Florida and just east of the Dominican Republic and west of the U.S. Virgin Islands. The island is approximately 90 miles wide in an east-west direction and 30 miles wide between the north and south coasts. Larger Than Delaware and Rhode Island Puerto Rico is a territory of the United States but if it became a state, Puerto Ricos land area of 3,435 square miles (8,897 km2) would make it the 49th largest state (larger than Delaware and Rhode Island). The coasts of tropical Puerto Rico are flat but most of the interior is mountainous. The tallest mountain is in the center of the island, Cerro de Punta, which is 4,389 feet high (1338 meters). About eight percent of the land is arable for agriculture. Droughts and hurricanes are the major natural hazards. Four Million Puerto Ricans There are almost four million Puerto Ricans, which would make the island the 23rd most populous state (between Alabama and Kentucky). San Juan, Puerto Ricos capital, is located on the north side of the island. The islands population is quite dense, with about 1100 people per square mile (427 people per square kilometer). The Primary Language Is Spanish Spanish is the primary language on the island and for a short time earlier this decade, it was the commonwealths official language. While most Puerto Ricans speak some English, only about a quarter of the population is fully bilingual. The population is a mixture of Spanish, African, and indigenous heritage. About seven-eighths of Puerto Ricans are Roman Catholic and literacy is about 90%. The Arawakan people settled the island around the ninth century CE. In 1493, Christopher Columbus discovered the island and claimed it for Spain. Puerto Rico, which means rich port in Spanish, wasnt settled until 1508 when Ponce de Leon founded a town near present-day San Juan. Puerto Rico remained a Spanish colony for more than four centuries until the United States defeated Spain in the Spanish-American war in 1898 and occupied the island. The Economy Until the middle of the twentieth century, the island was one of the poorest in the Caribbean. In 1948 the U.S. government began Operation Bootstrap which infused millions of dollars into the Puerto Rican economy and made it one of the wealthiest. United States firms that are located in Puerto Rico receive tax incentives to encourage investments. Major exports include pharmaceuticals, electronics, apparel, sugarcane, and coffee. The U.S. is the major trading partner, 86% of exports are sent to the U.S. and 69% of imports come from the fifty states. United States Citizens Since 1917 Puerto Ricans have been citizens of the United States since a law was passed in 1917. Even though they are citizens, Puerto Ricans pay no federal income tax and they can not vote for president. Unrestricted U.S. migration of Puerto Ricans has made New York City the one place with the most Puerto Ricans anywhere in the world (over one million). Pursuing Statehood Through the U.S. Congress In 1967, 1993, and 1998 the citizens of the island voted to maintain the status quo. In November 2012, Puerto Ricans voted not to maintain the status quo and to pursue statehood through the U.S. Congress. 10-Year Transitional Process If Puerto Rico were to become the fifty-first state, the U.S. federal government and the state-to-be will establish a ten-year transitional process towards statehood. The federal government is expected to spend about three billion dollars annually in the state toward benefits not currently received by the Commonwealth. Puerto Ricans would also begin paying federal income tax and business would lose the special tax exemptions that are a major part of the economy. The new state would probably obtain six new voting members of the House of Representatives and of course, two Senators. The stars on the United States flag would change for the first time in more than fifty years. If independence were chosen by the citizens of Puerto Rico in the future, then the United States will assist the new country through a decade-long transition period. International recognition would come quickly for the new nation, which would have to develop its own defense and a new government. However, for now, Puerto Rico remains a territory of the United States, with all that such a relationship entails.
Subscribe to:
Posts (Atom)