Monday, September 30, 2019

Immobilization of Amylase on Magnetic Nanoparticles Essay

Abstract ÃŽ ±-amylase was immobilized covalently on iron oxide magnetic nanoparticles. The synthesis of magnetic nanoparticles was done by the coprecipitation conventional method. The chemical composition and particle size of the synthesized particles was confirmed via X-ray diffraction. Tyrosine, Lucien and chitosan and glutaraldehyde were investigated to make a covalent binding between the iron oxide magnetic core and the immobilized enzyme. Immobilization using chitosan and glutaraldehyde show the best result. Finally the immobilization efficiency was tested by determination of protein concentration in a solution before and after mixing with the magnetic nanoparticles. Introduction In the last two decades, new terms with the prefix `nano’ have rushed into the scientific vocabulary; nanoparticle, nanostructure, nanotechnology, nanomaterial, nanocluster, nanochemistry, nanocolloids, nanoreactor and so on. Nanoparticles, are defined as particulate dispersions with a size in the range of 10-100nm (Gubin et al, 2005). Magnetic nanoparticles have gained a remarkable interest in the last years both for basic research and applied studies. The use of magnetic nanostructures has been proven in biochemistry, biomedicine, and waste treatment among other fields. This broad range of applications is based on the fact that magnetic particles have very large magnetic moments, which allow them to be transported and driven by external magnetic fields. The magnetic nanostructures have also a great potential in biotechnological processes taking into account that they can be utilized as a carrier for enzymes during different biocatalytic transformations (Dussà ¡n et al, 2007 ). Different types of biomolecules such as proteins, enzymes, antibodies, and anticancer agents can be immobilized on these nanoparticles. Magnetic supports for immobilization purpose are either prepared by incorporating magnetic particles during the synthesis of the supporting polymer or magnetic particles itself be coated with common support materials such as dextran or agarose. Recently, a new method for the direct binding of proteins on magnetic nanoparticles via carbodiimide activation was proposed (Ren et al, 2011). Immobilization is one of the efficient methods to improve enzyme stability. There are various methods for immobilization of enzymes on many different types of supports. It can be a chemical method in which ionic or covalent bond formations occur between the enzyme and the carrier, or it can be a physical method, such as adsorption or entrapment of the enzyme in or on a solid support material. Magnetic nanoparticles as immobilization materials have advantage based on its property and size that make it desirable for using it in various applications (Mateo et al, 2007). Iron oxide nanoparticles, Fe3O4, are one of the widely used types of magnetic nanoparticles and have great potential for applications in biology and medicine due to their strong magnetic properties and low toxicity (Jalal et al, 2011) Review of literature I) Magnetic nanoparticles: The historical development of nanoparticles starting with Paul Ehrlich and then first attempts by Ursula Scheffel and colleagues and the extensive work by the group of Professor Peter Speiser at the ETH Zà ¼rich in the late 1960s and early 1970s (Jà ¶rg Kreuter 2007). They are solid particles with a size from 10 to 100nm which can be manipulated using magnetic field. Such particles commonly consist of magnetic elements such as iron, nickel and cobalt. They have been used in catalysis, biomedicine, magnetic resonance imaging, magnetic particle imaging, data storage , environmental remediation and optical filters (Gubin et al, 2005). Magnetic nanoparticles as immobilization materials have the following advantages: simple and inexpensive production, can be released in controlled manner, stable magnetic properties of complexed nanoparticles and easy isolation steps in short time. Among these materials, Fe3O4 magnetic nanoparticles are the most commonly studied. Fe3O4 magnetic nanoparticles have good biocompatibility, strong superparamagnetism, low toxicity, and an easy preparation process, and their use in biosensors has already shown attractive prospects (Sheng-Fu Wang and Yu-Mei Tan, 2007). II) Magnetic core material: There are many magnetic materials available with a wide range of magnetic properties. such as cobalt, chromium and iron oxide-based materials such as magnetite and maghemite. The suitable magnetic materials depend on applications the MNP will apply in (Dobson et al, 2007). Magnetite Fe3O4: Magnetite is a common mineral which exhibits ferro (ferri) magnetic properties. The structure of magnetite belongs to the spinel group, which has a formula of AB2O4. Its ferromagnetic structures arise from alternating lattices of Fe(II) and Fe(III). This gives it a very strong magnetization compared to naturally occurring antiferromagnetic compounds such as the ferrihydrite core of the ferritin protein (McBain et al, 2008). III) Synthesis of iron Magnetic nanoparticles: There were many synthesis methods for magnetic nanoparticles one of these is Co-precipitation. This method may be the most promising one because of its simplicity and productivity (zhao et al., 2008). It is widely used for biomedical applications because of ease of implementation and need for less hazardous materials and procedures. Co-precipitation is specifically the precipitation of an unbound â€Å"antigen along with an antigen-antibody complex† in terms of medicine (Indira and Lakshmi, 2010).The reaction principle is simply as: Fe2+ + 2Fe3+ + 8OH– ⇔ Fe (OH)2 + 2Fe(OH)3 → Fe3O4 + 4H2O (Guo et al., 2009). Other method used for synthesis like: Thermolysis of metal-containing compounds, synthesis of magnetic nanoparticles at a gas-liquid interface, synthesis in reverse micelles and sol-gel method (Gubin et al, 2005). IV) Characterization of MNP: There is no unique method for determination of the nanoparticle composition and dimensions; as a rule, a set of methods including X-ray diffraction, Transmission electron microscope and Extended X-ray Absorption Fine Structure (EXAFS) Spectroscopy are used (Gubin et al, 2005). X-Ray diffraction analysis of nanomaterial seldom produces diffraction patterns with a set of narrow reflections adequate for identification of the composition of the particles they contain. Some X-ray diffraction patterns exhibit only two or three broadened peaks of the whole set of reflections typical of the given phase (Moroz 2011). In the case of larger particles (provided that high-quality X-ray diffraction patterns can be obtained), it is often possible not only to determine the phase composition but also to estimate, based on the reflection width, the size of coherent X-ray scattering areas, corresponding to the average crystallite (nanoparticle) size. This is usually done by the Scherer formula (Gubin et al, 2005). The nanoparticle dimensions are determined most often using Transmission electron microscope, which directly shows the presence of nanoparticles in the material under examination and their arrangement relative to one another. The phase composition of nanoparticles can be derived from electron diffraction patterns recorded for the same sample during the investigation. Note that in some cases, TEM investigations of dynamic processes are also possible. For example, the development of dislocations and disclinations in the nanocrystalline during the mechanochemical treatment has been observed (Woehrle et al, 2000). More comprehensive information is provided by high resolution transmission electron microscopy, which allows one to study the structure of both the core and the shell of a nanoparticle with atomic resolution, and in some cases, even to determine their stoichiometric composition (Woehrle et al, 2000). The structures of non-crystalline samples are often studied by EXAFS spectroscopy. An important advantage of these methods is its selectivity, because it provides the radial distribution (RDA) curve for the atoms of the local environment of the chosen chemical element in the sample. The interatomic distances (R) and coordination numbers (N) obtained by EXAFS are then compared with the known values for the particular phase (Gubin et al, 2005). Other methods are used more rarely to study the nanoparticle structures. Integrated research makes it possible to determine rather reliably the structures of simple nanoparticles; however, determination of the structures of nanoparticles composed of a core and a shell of different compositions are often faced with difficulties (Gubin et al, 2005). V) Stabilization of Magnetic Nanoparticles: Although there have been many significant developments in the synthesis of magnetic nanoparticles, maintaining the stability of these particles for a long time without agglomeration or precipitation is an important issue. Stability is a crucial requirement for almost any application of magnetic nanoparticles. Especially pure metals, such as Fe, Co, and Ni and their metal alloys, are very sensitive to air. Thus, the main difficulty for the use of pure metals or alloys arises from their instability towards oxidation in air, and the susceptibility towards oxidation becomes higher the smaller the particles are (Lu et al, 2007). Therefore, it is necessary to develop efficient strategies to improve the chemical stability of magnetic nanoparticles: Surface Passivation by Mild Oxidation: A very simple approach to protect the magnetic particles is to induce a controlled oxidation of a pure metal core, a technique long known for the passivation of air-sensitive supported catalysts. This oxidation can be achieved by various methods (Peng et al, 1999). For example, Peng et al. developed a method for oxidizing gas-phase nanoparticles by using a plasma-gas-condensation-type cluster deposition apparatus. Demonstrated that very good control over the chemical state of the cobalt nanoparticles was achieved by their exposure to an oxygen plasma. The control of the oxide layer has a tremendous impact on exchange-biased systems, where a well-defined thickness of the ferromagnetic core and the anti-ferromagnetic shell are desirable. Moreover, a direct correlation of the structure and magnetism in the small particles can be determined. developed a mild oxidation method, using synthetic air to smoothly oxidize the as-synthesized cobalt nanoparticles to form a stable outer layer which can stabilize the nanoparticles against further oxidation (Peng et al, 1999). Other methods: Matrix-Dispersed Magnetic Nanoparticles, Carbon Coating, Silica Coating , Precious-Metal Coating and Surfactant and Polymer Coating Typical strategies for immobilizing catalysis enzyme onto MNPs rely on surface grafting via low molecular weight linkers or polymers containing amino or epoxy functional groups to which enzyme are reacted via covalent conjugation methods (Ren et al, 2011). Due to their high specific surface area and easy separation from the reaction medium by the use of a magnetic field, they have been employed in enzymatic catalysis applications ex amylase EC 3.2.1 (Ren et al, 2011). The maximum reported loading capacity of amylase is approximately 81.97 mg/g (AktaÅŸ et al, 2011). One drawback of existing immobilization technologies is that the activity of enzyme decreases significantly upon immobilization due possibly to changes in enzyme secondary structure, or limited access of substrate to the active site of the surface bound enzyme (Lei et al, 2009). Thus, despite numerous reported approaches for immobilization of catalysis enzyme on magnetic nanoparticles, there is still the need for simple, cost-effective and high loading capacity methods. Aim of work Is to Synthesis of iron magnetic nanoparticle (MNP) then immobilize amylase on MNP and test the efficiency of immobilization method then study the activity of immobilized amylase.

Sunday, September 29, 2019

U.S. Securities and Exchange Commission and Walt Disney Company

In organizations where there seems to be an increasing focus on unethical behavior within public companies from senior managers, it is vital that organizations establish policies and processes to ensure that it is complying with the rules and regulations put in place by the Securities and Exchange Commission. Walt Disney Company is able to meet its reporting requirements for the Security and Exchange Commission by using the following resources. The availability of technology, internal disclosure controls, internal controls over financial reporting, and independent accounting auditors who verify that these controls are in place and working as intended. The SEC requires that Disney posts all Interactive Data Files. These files are required to be submitted and posted pursuant to Rule 405 of Regulation S-T during the preceding 12 months. Viewing the Investor Relations tab of The Walt Disney Company corporate website shows that historical SEC filings are listed by category for a variety of required reports, including forms 10-K, 10-Q, 8-K, 11-K, S-8, 425, S-4, and proxy statements. Disney uses internal disclosure controls by their policy that all SEC filings be signed by a senior member of the management. These people are President, CFO, Managing VP and Internal Counsel helps ensure that the filings are correct, comply with reporting requirements, and are communicated to the other stakeholders in the management of Disney. These are Board of Directors and other Senior Members of the management team. In an era where CEOs and CFOs are continually being called before US Congress to testify on the financial situation within their firms, this policy adds a layer of accountability to senior management. Internal Controls over Financial Reporting. Company management explicitly acknowledges their accountability for being able to create accurate, reliable, sufficiently detailed, and timely external financial reports Independent Accounting Auditors. Disney makes use of PricewaterhouseCoopers as an independent auditing firm to provide a third party analysis of their internal controls over financial reporting. In addition, PricewaterhouseCoopers’ own report to the Board of Directors and Shareholders of The Walt Disney Company is included in the Annual Report and discusses the process by which Disney’s internal controls over financial reporting are tested and audited to provide a reasonable level of assurance that the controls are working and that external financial reports are being reported based on generally accepted accounting principles as required by U. S. Law. By following all of the procedures that Disney has put into place they can be positive that they are following the SEC rules and regulations.

Saturday, September 28, 2019

Internet Security Coursework Example | Topics and Well Written Essays - 1250 words

Internet Security - Coursework Example Availability- Ensuring that the resources of the server and the data are up and running whenever needed. It is very crucial to ensure that any system downtime is not attributed to security compromise. For instance, the employees in different cities are able to access the information in the server located at the data canter. Non-repudiation: ensuring that all the computer users are liable for their actions in the organization’s computer or system. For instance, when someone’s user credential is used to login to a computer, that person is answerable for that action. Authentication – strives to verify that the person trying to perform an action is the right one. For example, one has to enter the email and the password to his or her email messages. Access control- strives at ensuring that the only person with exclusive control of computer resources has the authority. For instance, the company CISO should be the only one who has full control of user accounts. (b) Brie fly explain what vulnerabilities and controls are, and how they relate to each other. You may use an example to further illustrate the concepts. Vulnerability in computer or information security is a loop hole or a weakness that can be exploited by an attacker to compromise the security of the computer system. It is a combination of three key features: system flaw, ability of the attacker to access flaw and the attacker’s to capability to exploit the weakness. Security controls are countermeasures or safeguards implemented to prevent, lower or counteract any computer or network security risk. There are three major classes of controls. These are preventive controls, detective controls and corrective controls. A good example of a preventive control is the use of antimalware programs to prevent malware infections on the system. A monitoring system that tracks the system use is an example of a detective control while files and data recovery software used to retrieve lost data is a corrective control. The management of vulnerability is the basis of identifying the right system controls since it involves identification, classification, remedying and mitigating the flaw. (c) Discuss the use of controls. What principles need to be considered to maximise the effectiveness of controls that are in place in a computing system? Security control can be considered effective when applied in the right way. The security controls can be there but when one fails to use them effectively, they become less significant. There are three major classes of controls. These are preventive controls, detective controls and corrective controls. There are three principles that need to be considered to ensure maximum security. These are: The principle of effectives which insist that the security controls are effective they are applied in the right ways. Weakest link principle- there should be no point of weakness in a security control. Principle of easiest attack- the attacker always tri es to identify the weakest point to compromise the security. The weakest points are not necessarily the obvious link. 2. Wireless security requires addressing different aspects when compared with the case of wired networks. (a) Firewalls are a popular mechanism for protecting a network against a variety of threats. Give an overview of the different types of firewalls that exist, and describe their characteristics. According to Gregg (2010), firewalls

Friday, September 27, 2019

Assignment 6 Example | Topics and Well Written Essays - 1000 words

6 - Assignment Example Some of the differences between managers are leaders are that managers are administers while leaders are innovates and that managers are never original in their positions or even capacities but leaders are original (McCue & Jack 42-51). A manager tends to maintain status quo, focusses on control, and has a short-range view while a leader develops, focuses on people, inspires trust, and has a long-range perspective. Managers ask how and when, has eye on the bottom line while leaders ask what and why, and have eye on the horizon. A leader or a manager are two words that are used interchangeably to describe individuals holding formal authorities in organizations irrespective of their behavior in such positions. A manager does not necessarily exercise leadership in positions in which they are appointed even though leadership is just part of management. Generally, there are skills or traits that an effective leader is required to have as explained by various theories both old and contemporary theories. Some of the main traits that appear in leaders are ambition, zeal, intelligence, self-directive, and self-confidence (McCue & Jack 45-57). At times, physical characteristics, capability, and persona may be important aspects used to summarize what a leader is. There are six distinct characters that popular effective leaders have such as honesty and integrity. In addition, drive, motivation, cognitive ability, and business knowledge are also other characteristics of leaders. These traits would definitely distinguis h whether a manager will be an effective leader or not. Leaders are incredibly ambitious persons who are never afraid of taking inventiveness as well as people whom apart from willingness to lead, are especially ready to take charge. Furthermore, leaders usually have technical expertise in their businesses and are straightforward people who fulfill their promises. Leaders are individuals who

Thursday, September 26, 2019

Financial Covenants Essay Example | Topics and Well Written Essays - 1500 words

Financial Covenants - Essay Example (Mckean, 2005; Law, 2005; Moles and Terry 1997). For example, Junk Bonds whether secured or unsecured are always subordinate to debts to banks and Subordinated debt that ranks behind other issues of the same class is referred to as junior debt. (Law, 2005). Mezzanine finance, a typical example of subordinated debt is funding that possesses both equity and debt characteristics and it is usually provided by specialists' financial institutions. This funding like other forms of subordinated debt carries a very high risk of default and as a result earns a higher rate of return than pure debt although less than equity. Mezzanine finance can be secured or unsecured. (Smullen and Hand, 2005). Due to its mixed nature of both equity and debt characteristics, investors have the opportunity to earn interest alongside their equity stake in the company. (Terry and Brian, 2000). Mezzanine financing is also attractive to banks since it offers interest higher than that paid for senior debt especially in environments where competition makes it difficult for them to provide funding at the normal lending rate thus encouraging banks to embark on mezzanine financing as a means of earning higher returns. (Terry and Brian, 2000). The borrowing base of potential takeovers in the UK has increased as a result of increase willingness by UK lenders or investors to provide mezzanine finance. For example, bids for the Gateway and Magnet companies in the UK involved very large amounts of subordinated debt and as such reflect the importance of mezzanine finance to borrowers in large acquisitions, were financing required is beyond the limits set by equity and senior debt providers in their own lending criteria. (Terry and Brian, 2000). Terry and Brian (2000) assert that because inclusion of mezzanine debt allows a lower equity share as a percentage of the total funds provided than straight equity investment, equity investors prefer such inclusion in deal structures since it will improve returns to the equity shareholders. Including mezzanine in a deal reduces the investment required from equity investors by a percentage, which is higher than a reduction in their ultimate shareholding and therefore increases the overall return on investment. Mezzanine finance has also been used as a strategy for leveraged buy-outs, corporate takeovers and other acquisitions. The first instance of using mezzanine finance in such a way was in the United States of America. (Terry and Brian, 2000). The first instance in the United Kingdom was for the buy-out of Evans Halshaw. (Terry and Brian, 2000). Because of the separation of ownership from control and also as a result of information asymmetry between debt holders and the management of the company, it is has become a common practice that the loan agreement or indenture contains ratio covenants and other covenants so as to prevent the debt holders from losing their money in the event of insolvency or bankruptcy liquidation. In the preceding paragraph, we take a closer look at some of the covenants and assess their validity in actually providing protection to lenders or debt holders. Covenants and Events of Default Terry and Brian (2000) define Covenants as promises by the borrower to do or not to do certain things during the term of the debt facility. Events of Default are defined events which, if

Wednesday, September 25, 2019

Purposes and Benefits of Strategic Planning Essay

Purposes and Benefits of Strategic Planning - Essay Example Another purpose is that it doesn't allow the firm to get distracted by the prevailing conditions whether good or bad, it is a job of Manager who has done strategic planning of the firm to ensure that all the necessary activities are carried out in a planned way so that no obstruction occurs. "Strategic objectives are normally ones to be achieved over the medium to long term. They may be financial such as a certain increase in earnings per share or non financial such as a percentage increase in market share. In theory they should be capable of being quantifiable and hence susceptible to measurement" (p. 11) "In business strategy involves forming a path for the organization to follow that will lead to products or services that customer will want. This will usually mean some kind of new departure for the business, requiring the leader to implement various tactics or sub-strategies. These tactics are usually set out in the component parts of the business plan" (Hoddler, Stoughton, 2003: 20). The strategic planning process consists of two phases, the first one is strategy formulation stage, and the second one is strategy implementation stage, in the first phase we have to identify mission and strategic goals of business, of course when someone wouldn't know where someone is going, how could someone will get courage of moving forward, the second thing we have to care about is conducting competitive analysis, here we have to analyze the company's strengths, weaknesses, opportunities and threats (SWOT Analysis), than the last part of first phase appears in which there is a need of developing specific strategies, the three of them are corporate, business and functional levels of strategies. In the corporate level of strategy, which tells about what businesses the organization will operate and how resources would be allocated, the second one is business level strategy that tries to define the best means of competing within a business, it also supports the corporate level stra tegy, the third one is the functional level strategy which focuses on the specific action plans for managing a specific functional area within a business, it supports the business level strategy. The second phase of planning process is strategy implementation stage in which all that is planned previously is implemented on actual situations, it means exactly to evaluate the plans and control afterwards where required. Difference between Strategic and short- term planning As mentioned earlier, the Strategic Planning is a long term planning, it consists of time that is longer than one year, more formally such planning is done while considering all the past records and resources that the company or organization has, the strategic planning is basically coping with the company's "strategy Formulation" stage in which the company has more concerns on its mission and goal statement, its SWOT analysis and other specific

Tuesday, September 24, 2019

Social Enterprise And Increasing The Overall Well-being Research Paper

Social Enterprise And Increasing The Overall Well-being - Research Paper Example From the point of view of asset management, a social enterprise can increase the overall diversification of the portfolio while at the same time add more ethical trading and investing philosophy into the overall portfolio management also. It is generally believed that portfolio managers may have to only invest in the commercial entities to generate more value for their clients. Overall risk diversification and return strategies are therefore often tailored according to the dynamics of how a for-profit business actually operates and generate more value for the portfolio managers. Non-Profit wealth creation through social enterprise is viable and sustainable activity and can increase the overall well-being of the society while at the same time allowing asset managers to actually diversify their risks and also add more ethical investing and portfolio management orientation to the whole process of asset management. (Field, 2014) This paper will be focusing on understanding the impact of non-profit wealth creation on the overall portfolio risk and return. This paper will further add on to whether the non-profit wealth creation will actually add more ethical orientation to the portfolio management or not. The overall concept and idea of a social enterprise existed for long, however, it has recently gained more momentum with large organizations such as Dannon entering into joint ventures to form social enterprises. A social enterprise’s focus is on the use of commercial strategies and tactics to achieve more value and improvement in the human and environmental well-being. A social enterprise’s main objective, therefore, is not the maximization of the shareholders’ value or wealth but to help improve the environment and the human life.

Monday, September 23, 2019

Representing Nature in Jeddah city Term Paper Example | Topics and Well Written Essays - 750 words

Representing Nature in Jeddah city - Term Paper Example In January 2011 torrential rains caused destructive floods. Massive rescue operations were quite successful and many people were evacuated from the areas exposed to the disaster (Byron, 2011). Reportedly, the damage caused by the flood â€Å"was attributed to the lack of a drainage system for flooding and rain water† (Byron, 2011). Insufficient drainage system led to spread of sewage. Admittedly, the sewage and contaminated water can cause proliferation of numerous diseases in people and animals. Apart from this sewage and contaminated water leads to numerous environmental problems. For instance, it negatively influences ground waters leading to â€Å"salinization of the water affecting vegetation in the areas† (Magram, 2009, p.125). It goes without saying that this environmental issue has been considered politically. At this point it is worth mentioning that the majority of environmental issues should be (and usually are) regarded politically, due to the nature of thes e questions which are â€Å"inherently subjective† (Norheim, 2004, p.48). ... Notably, Jeddah is â€Å"the most significant city† in Saudi Arabia and its growth â€Å"has been rapid and diverse† (Magram, 2009, p.120). Rapid growth of population and industrial development of the city which was accompanied by the development of recreation infrastructure and the lack of attention to environmental issues led to environmental degradation. Such problems as sewage capacity issues, desalinization of water which threatens marine ecosystem, ground water contamination, which is the source of numerous diseases (and can even cause epidemic) have not attract much attention until floods caused serious problems. It is important to note that floods are recurrent phenomena in Jeddah. In 2009 there was a flood which also caused numerous victims and money losses. Reportedly, the government tried to solve these problems, but this year flood proved that these measures were insufficient. More so, people argued that â€Å"hundreds of millions of dollars spent on upgrad ing the preparedness after last year’s flood were allegedly riddled with corruption deals† (Nuseibeh, 2011, p.7). Ineffective policy of those in power led to numerous riots. Reportedly, the flood in Jeddah took place â€Å"at a time of unprecedented unrest† in Saudi Arabia. Admittedly, environmental issues aggravated the situation. At this point it is possible to point out that environmental issues, viewed politically, can be used by different people differently. In the first place, they have already caused social and political protests. On the other hand, those who want to gain people’s trust can use (and do exploit) these issues promising to solve environmental problems caused by floods, or prevent the floods. Thus, these problems can lead to political changes. It goes

Sunday, September 22, 2019

Mexican Politics Research Paper Example | Topics and Well Written Essays - 2000 words

Mexican Politics - Research Paper Example This country’s 2006 election was chaotic and led to months of disputing the outcomes of the elections, where riots were held all over the capital streets. There have been some deep-seated political problems that Mexico has been trying to shed off, although at a much slower pace due to its entrenched customs (Carruthers, 1996). The politics of this country are influenced by so many factors and the war against narcotics that was started by PAN government led by Filipe Calderon in 2006 when it took over leadership of the government. The narcotics war has led to serious concerns over the future of Mexican political stability and has put bear many unanswered questions. The militarization of the narcotics war has led to some political pundits arguing that Mexico could soon be classified under failed states. This label seems very disturbing and paints the country as being on the verge of collapse, which might not be the case. However, there are numerous challenges that the political platform of Mexico faces when issues of social order and political stability are considered. The political future of this Mexican state is of importance to its Northern counterparts (Manaut, 2004). A factor that has always posed challenges to those who get into analyzing the politics of Mexico is the fact that Mexican society is complex in nature and its massive geographic size, as well as demographic figures, is quite phenomenal. It has over 32 states with an estimated 112 million people and has a metropolitan area that hosts over 21 million inhabitants (Merrill & Miro, 1996). This country has over 62 indigenous languages, although Spanish is the most dominant of them all. 60% of Mexicans are Mestizos, 30 % are Amerindians, while 10% are groups of European, Asian, and others. It has a federal form of government, a system that makes it possible for it to accommodate this demographic diversity and size. Mexican politics is quite an interesting field of study (Hal, 2010).   Analysis Mexico is a country that has very sharp definitions of regionalism and these regional variations have had a serious impact on the political landscape of this country. Many observers argue that this regionalism is to blame for the civil conflicts witnessed in the past and currently being seen, and also gives this as the best explanation for Mexico fitting well in the states where an assertion of authority by the central government is necessary. This was most evident during the Zapatista uprising in Chiapas in 1990. There was also the need to suppress Yucatan during the Caste War of the 19th century. As is the case with many federal governments, Mexican states that are away from the capital city have expressed issues with the service given by the federal government and feel they have not been well served. This has led to the central government’s ineffectiveness to administer these marginalized states and some basic facilities such as schools have failed, leading to high levels of discontent (Harvey, 1994). An interesting twist to the politics of Mexico is the claim of democratic governance since independence.  Ã‚  

Saturday, September 21, 2019

Spider Womans Granddaughters by Paul Gunn Allen Essay Example for Free

Spider Womans Granddaughters by Paul Gunn Allen Essay In the introduction of Spider Womans Granddaughters, by Paul Gunn Allen, she provides background information pertaining to Native American history and culture. The purpose of this preface is to offer the knowledge necessary to understand the stories. She achieves this goal with the employment of the rhetorical strategies pathos and reference to authority. Allen strongly utilizes pathos. Her use of vocabulary conveys an extremely negative perception of the Anglo-American interactions with the Native Americans. Allen initially describes a road that travels through an Indian Territory in Oklahoma as a beautiful drive, lined tastefully with billboards however then reveals that the roadside signs mark the sites of starvation and slaughter. She continues to portray Anglo-Americans as insidious and pernicious. Allen also illustrates the affects of the massacring of the Native Americans: our numbers were horrifyingly diminished. These desperate, emotional words are deliberately used to provoke pathos effectively. Allens reference to authority compliments her appeal to emotion, as her points are represented with the words and opinions of indubitably respected figures. She shows the stubborn and misunderstanding views of Senator Dawes: He noted that Indian people had a good literacy rate, adequate food and shelter, medical care for all, and a thriving economic base, but he was disturbed because they continued to live communally. She includes this adamant refusal of the Indian lifestyle that was ultimately the cause of the suffering and injustice endured by the Native Americans, and reflects it in the words of an American leader. Allen exhibits the opinion of William Brandon: Of the approximately 150 million acres owned by the Indians in 1880 over ninety million acres were extracted from the Indians pocket. She also alludes directly to the holocaust by describing the westward expansion as such, and provides further allusion by relating schools to concentration camps. Paul Gunn Allens use of the rhetorical strategies of pathos and reference to authority create a nearly irrefutable vision of the Native Americans inauspicious history. Given this overview, the reader is provided the  necessary intellect to fully comprehend the stories.

Friday, September 20, 2019

Antivirus Software The Advantages Computer Science Essay

Antivirus Software The Advantages Computer Science Essay Antivirus is defending software designed for guarding your computers system smart cell phones against Virus, Trojans Hijackers etc. These all Viruses, Trojans Win32 etc. are called Malicious Software in computer world. All Antivirus software run in the background at all times to protect defense your computers system smart cell phones some antivirus are automatically updated through internet some antivirus are needs manual updated through internet to protect your systems against Malicious software. [1] Introduction: Antivirus software provides many critical layers to protect from Virus, win32, Trojans worm etc. The first document removal of the computer viruses was written by Bernd Fix. There are two types antivirus application in the computer world so that the time of the Atari ST platform designed in 1987 the first one was G Data second was UVK 2000 made by Bernd Fix in 1987.The word Antivirus is come from the word Antibiotic which means implies combat with an invading force of the programs. Fred Cohen designed the strategies relative to an Antivirus software program in 1988 to solve the virus problems. [2] The old previews years Antivirus software are not so good because those software only detected the Virus Spyware etc. remove it from your computers system damage your some operating system files inside your computers now AntiVirus software much better than old ones because it detected the virus remove it without deleting your operating system files inside your computers it also fight against new malicious software which come from internet network. Well in the preview years Antivirus software are not completely free downloadable on the internet means you could only find some antivirus software with trial version now Antivirus software are completely free download without trial version . New Antivirus also checked the incoming outgoing mail, email attachments etc. It also has internet security for internet threats. [2] Advantages and Disadvantages: Antivirus software is very useful in the preventing, controlling, virus many more viruses program, which can damage the computers components from inside operating system files to. [2] Antivirus software are used the methods for searching killing Viruses some of the well knows patterns of computer data programs. [2] Antivirus programs are very effective against the viruses program, whose is the biggest threat for your computer systems. [2] Antivirus program has some limitations drawbacks on the other hand, which effect on the computer system performance. [2] In the computer world, inexperienced users can have many problems with the antivirus programs or software such as inabilities to understand, threats of the software success of the antivirus programs software are dependent on the ability of the user to understand Or knowing the right kind of balance between the positives negatives things in the computer world. [2] Antivirus software or programs can cause problems during the installation window in the computer system or upgrade the Windows Service packs in the computer system. [2] Antivirus software can be hampered some few software programs because it used its own firewall to block application to store in the computer system. E.g. True Crypt. [2] Some Antivirus program will not knowing by the policy assessment before make its own policy when it install in the computer system. [2] There are three major types of detection which is used to identify the potential threats in the computer system such as: Signature based, Heuristic based File emulation method. [3] Signature based detection: In this method, you can identify the viruses malware virus software. Antivirus software can also compare the content files of the computer system to dictionary files of virus signatures because viruses are embed into themselves in the files shape or in pieces shape to infect the computers. [3] Heuristic based detection: In this method, you can only detect malicious activity relative to viruses identify unknown viruses in the computer system. [3] File emulation: In this method, it has using the heuristic type approach which it executing the program in a virtual environment which effect the action of the program performs it also carries out the disinfection actions relative to the programs which run in the computer. [3] What is a Virus? Viruses are the category of malicious program code software, viruses are used for attempted to breach security value break them damage data of the computer system display unwanted messages on the display screen when the antivirus program for gabbing user passwords on a networks are called LOGIN.exe. These real LOGIN.exe programs which have intruder or infect the user programs are called Trojan Horses when viruses program fall into the Trojans category than these viruses program have the ability to reproduce themselves again again until users computer systems slow down performance processing to any application it infected the your operating system. [4] Why Do Viruses Exist? Now-a-days every computer virus programs are written by someone who wanted it to infect damage other peoples computer systems smart cell phones our world. So these Viruses program coding pass from computer to other computers system these viruses may be not have direct effect on the some computers but it effects on the other resources like(Disk space Memory) thats why these viruses are harmful it coding are very complex it also contain some serious bugs which damages the computer system pretty badly. [4] How do we will know if we have a virus want to protect our computer systems? If the someone computer systems are very running slower, freezing it displaying error messages again again than you should have the viruses in yours computers or operating system than u must install Antivirus software scan your computer system with latest internet updated of the Antivirus programs security to clear your computer with viruses. [4] How do we get these viruses on our computer system or operating system? Computer systems can be infected by viruses because: User using the Internet without having the latest updates of the Antivirus programs security installed into your operating system. [4] User using the Internet without having a working firewall on the operating system or Antivirus software. [4] User who opening the email attachments without knowing that whos will send him or her. [4] User visiting unreliable website pages than viruses automatically stored into your computer because these website pages contains the infected viruses programs. [4] How do we get rid of the malware software? To get rid of the Viruses you should use latest Antivirus software or latest Antivirus program security updates now-a-days much new Antivirus software are able on the Internet free cost with one years updates free e.g. Norton Antivirus, McAfee Antivirus Kaspersky Antivirus etc. [4] What are types of Virus in the computer world? There are several types of viruses in the world which your computers your operating systems for examples: Worms, Trojan horses, Logic bombs, Mutated viruses, Polymorphic viruses, Bounty hunters, Boot sector viruses Macro viruses etc. [4] Worms: Worms Viruses are used to spread over a network of the internet hacks the computer system or operating system which connects with internet networks. [4] Trojan horses: Trojans viruses are used to create a security hole in the computer programs or operating system infected the system files inside. [4] Logic bombs: Logic bombs viruses are used to trigger the specific event means computer systems date programs of remote activation etc. [4] Mutated viruses: Mutated viruses are used to rewritten by hacker users to change the behavior or signature of the programs made the multiple versions of the same viruses that infected the computer programs or operating system. So these viruses are also called variants. [4] Polymorphic viruses: Viruses which are used to automatically change according their appearance, like as a chameleon by giving the viruss signature of the programs in encrypt-decrypt function so virus can only be recognize its own signature of the program. This kind of virus is called Polymorphic viruses. [4] Bounty hunters: Bounty hunters viruses are used to modify signature program stored by Antivirus program in the order to render them an inoperable in the operating system. [4] Boot sector viruses: A boot sector virus is used to infecting the boot sector of a hard drive of the computer system. (Just like MBR Master boot record) it also has infected the speed of the processer. [4] Macro viruses: Viruses which came from email, email attachments etc. to damage the operating system or hack the computer system [4] BackDoor.exe Viruses: These viruses are highly dangerous because it can give the complete shell of the victims computers to the attacker. These exe are made by many encryption techniques, so anti-virus hardly detects these types of viruses. [4] What is Firewall Spyware? Firewall: Firewall is software or program which have security tool to help limit internet network traffic with hackers or viruses to getting in your computer system. Firewall helped protects your computer from future hackers new incoming viruses. [4] Spyware: Spyware are used to a multitude of malicious software programs which access your computer system. When Spyware viruses infect your computer system or operating system than it will slow down your operating system speed performance your computer system going to hang again again. [4] Issues relative with the Antivirus software: Unexpected renewal costs: Some of the commercial antivirus software which includes end-user license agreements which effect on the subscription automatically renewed it, cost so much which you not expected. [5] False positives: Antivirus software can used to identify non-malicious files which having the viruses so that it will be cause serious problems for the computer system because false positive make operating system files very unstable because of the viruses. [5] System interoperability related issues: When the multiple antivirus programs running on the computer or operating system than it will degrade the performance of the operating system create conflicts in every programs running on the operating system. So this concept is called Multiscanning If the functionality of the few software programs can be hampered by the active antivirus software on the operating system. [5] Effectiveness: The effectiveness of antivirus programs have been decreased in the previews year because of new good Antivirus software launch on the markets computer threat going dropped from 40-50% to 20-30% in this preview year. [5] Rootkits: Rootkits are major challenge for antivirus programs on the operating system it had admin area access to the system to control, invisible hidden the EXE from the running processes of the task manager on the computer system. [5] What is Cloud antivirus method? Cloud antivirus method is a technology that used the lightweight agent software to protect the computer system or operating system it also used for analysis the data with providers infrastructure. To implement this Cloud antivirus method we used the multiple antivirus engines which scanning suspicious files from the operating system this concept is called Cloud AV. Cloud AV was designed to send programs on the internet network where detection programs are used to improve the detection rates with multiple antivirus behavioral on the internet network. [5] Online Scanning: Some of the Antivirus provides maintain of websites with free online scanning on the internet with the entire computer such as like local disks, critical area files relative to the computer systems. Well as you know that internet becomes the vehicle for communication in this world people using digital communication on the internet with very fast speed scope so that new kinds of viruses are increasing spread all over the world of the internet network. If someone will not want to install antivirus on his or her computer than he or she can easily scan his or her computer online this is quickly possible solution. [5] What do u means by the birth rate death rate of the viruses? The Birth rate of the viruses: The birth rate of the viruses depends upon the one infected computer system or operating system which can spread this infection to other computer system or operating system. [5] The Death rate of the viruses: The death rates of the viruses depend upon the infection found on the computer system or operating system destroy that computer system. [5] Antivirus products: There many products of antivirus. Some of them are discuss below: Avast Free AntiVirus: Avast is an antivirus computer program made by AVAST Software a.s. Avast is the freeware version of the Avast company. Avast can be installed on Microsoft Windows, Macintosh Operating System X and Linux. It also has command line scanner system and different dangerous script blocker. It has many new features e.g. file system shield, Real time protection form worms and threats. Mail shield protect from dangerous mails and attachments In it. Web shield protects form malicious URL or virus containing sites. Network shield protect from attacking ports and known network worms. Boot time scan, scans the infections that are loading during windows startup and remove them. If any virus is found, antivirus displays the notification to the user, and asks for action to take. [6] AVG AntiVirus: AVG is another antivirus program made by AVG Technologies. It can be installed on multiple platforms and FreeBSD computing platforms. It also has a free version of antivirus. There are many components in avg antivirus. Anti-Spyware protects you from different spyware which are in your computers. Link Scanner scans the web links, whether they are affected or not. Web Shield protects you from viruses which come into your computer through internet. It has own firewall system to protect the system. It also has servers version to protect the web/file servers, mail servers and dns severs. [6] Avira AntiVirus: Avira is considered as the 6th largest antivirus software worldwide. And it has 100 million customers. It can be installed on Android and other operating systems. It runs as a background process which checks every file opened or downloads form the internet. It has different components in the antivirus. Email scanning which supports POP3 and SMTP protocols. Web Guard to block the access of malicious sites. It has personal firewall and anti-spam system. Backup module to protect and secure the important data. Keep an eye on different Botnets, and prevent them. It offers tools including a Rescue System utility used to write a bootable CD and DVD. Some main features of Avira windows versions are: [6] Anti-Phishing Mail Guard Game Mode AnitBot Parental Controls Bitdefender Antivirus: The Bitdefender products include antivirus and antispyware, personal firewall, privacy control, user control, backup for company and home users. PC Tuneup and Performance Optimizer. It can be used in Symbian Operating System, Windows Mobile, and Solaris. A free basic online scan is offered by the Bitdefender via the bit defender website. Bitdefender introduces the new technology B-HAVE. Through which it can detect the unknown threats.[6] ESET NOD32 Antivirus: ESET first ever product was NOD, an antivirus program for computers running MS-DOS. Then after some time period it introduces the NOD32 for Windows XP. In September 2010 ESET released NOD32 antivirus for Macintosh OS. It also supports BSD, Linux, Novell NetWare and Sun Solaris. ESET NOD32 includes an enhanced media control that automatically scans all USB, CD/DVD and external hard drives. [6] F-Secure Antivirus: F-secure is first antivirus to establish an existence on the World Wide Web. F-secure first introduced the anti-rootkit technology. It can be installed on Mobile security; it has also the facility of online Backup and anti-theft for Mobile. Also available for Linux, servers, Policy Manager, protect the message security gateway. F-secure developed the new technology through which new or unknown malware, which causes the changes in windows files and windows registry. F-secure teach the one semester course in university about new viruses and other technology. F-secure antivirus can also detect the backdoor.exe virus. F-secure also helping the authorities to catch the mafia or terrorist organization through their antivirus. [6] K7 Antivirus: K7 is the first antivirus to build their own NST (Nano Secure Technology), has ability to protect the system at multiple layers. Which can detect and remove the existing threats and as well as future threats. It provides support browsing against attacks by the attackers, to steal the passwords or even your money. It also produces the various applications and antivirus for DOS. The basic feature are firewall, Anti-spam, Anti-Spyware tools, K7 mail security, security tools to detect the key loggers, Tracking Cookie detection, usb scanning, safe cloud base scanning.[6] Kaspersky Antivirus: Kaspersky product designed to protect the users from malicious malware and other threats. It runs on different platforms and Linux version available only for business users. Its features include real-time protection, removal and detection of viruses, Trojans, worms, spyware, key loggers, backdoors, sql injection and many others. It also has the online helping facility to help and guide the user about their new products. Rescue disk facility is also available in Kaspersky. This scans the computer at boot time. The features which are not implemented in the antivirus program are personal firewall, AntiSpam and parental controls. Kaspersky uses the highly graphics to display the interface, so their system requirements are high. At early stages of Kaspersky, it has very crucial flaws in it, through which attackers can attack and run the piece of code to compromise the users pc. [6] McAfee Antivirus: McAfee Antivirus is very powerful antivirus it is light weight. This Antivirus is the leading antivirus software in the security industry markets. This Antivirus have two features one is ScriptStopper second is WormStopper it automatically updater it virus definitions updates on the regular basis from internet network. [7] Panda Antivirus: Panda Antivirus have Ultrafast new feature scanning engine as compared to other antivirus applications. This Antivirus have the Anti-Phishing filter Anti-Banking Trojans engines in the Identity protection area it have advanced heuristic scanning with personal firewall. [7] ZoneAlarm Antivirus: ZoneAlarm Antivirus have very strong removal ability to destroy the dangerous viruses also having multilayered security. This Antivirus used less processer power of performance it used very low computer system resources. [7] TrendMicro Antivirus: TrendMicro Antivirus is very popular antivirus, which mostly used for Spyware protection Adware protection from viruses. This Antivirus has some new features like Remote file locking sharing registry files. [7] Sophos Antivirus: Sophos Antivirus includes the network access control, Anti-spyware etc this types of Antivirus are used for watching on the data supplying through monitoring tracking software means like upload videos. [7] Rising Antivirus: Rising Antivirus is the Chinese Antivirus software it is used for UTM, spam-blocking firewall etc. This Antivirus basic function is BIOS rootkit checks. [7] Vba32 Antivirus: Vba32 Antivirus programs are used in the personal systems it neutralizes viruses which infected or attack the computer systems on the real time. Linux Shield: Linux Shield is the Antivirus product used in the Linux operating systems to clean the viruses from Linux operating system. [7] Technology Highlights: There are many technology highlights such as : First Generation (Antivirus): The first generation of Antivirus software are based on the signature detection polymorphic engines. [8] Second Generation (Antimalware): In the preview few years, new types of malware software are emerge file-less network worm etc are on the spotlight of the massive damage viruses are on the internet network. These problems can be solving by personal firewalls clear the signatures packet from viruses used smart clean Browser which will not infect the operating system with the spyware Trojans viruses. [8] Third Generation (Proactive Technology): TruPrevent: This behavioral technology is used for research development of the technologies. It has two main function technologies: Behavioral of analysis blocking known computer system. [8] (i). Behavioral Analysis: This Act as last line of defenses against new viruses which executing in the computer system it give real time results used behavioral category alone. [8] (ii). Behavioral Blocking: This is the Second main component of the TruPrevent. It knew hacker viruses behavioral to attack system application by injecting with program codes into the computer system. [8] Genetic Heuristic Engine: These technologies are inspired by the biology work as an organisms which individually identified by the other organisms. It based on the digital genes. This carries out new viruses harm things which going to infect or damage the computer system or operating system. [9] Collective Intelligence (The Next Generation): Collective Intelligence used the approach which collect the objective of this technology in which after clean the computer system or operating system it automatically generated full report cleaning viruses report it much faster lightweight in the future. It protected your computer system 95% up to 98% it also give your infecting computer system percentage according to the report. It is also collect the data from the communities which can tell us about the behavioral patterns of the any programs files. It also have the information about higher visibility threats against viruses or active on the internet network it can be automatically do data processing on the computer system analyzes thousands of new samples which received every day from internet network it will not expired the data which infect by the new malware viruses. It automatically saved the data files from new old malware it also release the knowledge extracted from delivering to user on the web services updates i t. In this platform we can do collective intelligence technology or platform for online services designed to perform of the machines against malware viruses solve the security solution. It also gives corporate requirements information performance of the malware thats why we created a specific managed service called Malware Radar. [10] Proof Point Virus Protection key capabilities: Viruses Protection key depend up on the efficient message analysis, Continuous business enterprise virus-detection updates, Integrated Administration reporting flexible policy management message disposition. Viruses protection key have the enterprise antivirus engine which gives good efficiently of the scanning messages attachments for new malicious codes which give fully proof point platform find new viruses definition which created the cloud-based Dynamic system which secure channel guarantees with proof point protection is already up to date than it will gives business enterprise with maximum detection against all viruses for IT administrators gives very importance to all antivirus enterprise of the proof point of the protection. It also used dynamic update service make for organizations. In this proof points virus protection are also used an integrated administration reporting in the enterprise protection suite with complete control on it. In the virus protection it used u nified interface on the enterprise antivirus technology which allows business configure with all aspects of the viruses protection. Virus protection includes virus filtering activity which detect cleaning processes. Proof point virus protections also have the flexible policy management message disposition which defines enforce virus-related security policies of any company organization. Virus protection has viruss analysis with message in which it can be quarantine for administrative rights. Proof point virus protection is also used for targeted Attack protection with new approach big data analysis techniques. Cloud-based solution is used to clean your email attacks full lifecycle approach. It can use proof point anomalytics techniques for email threats identified on the real time which includes message properties. It is protect URL with click time defense service which ensures the dynamically rewritten to the suspicious URL based on the analysis of proof point Anomalytics, pr oof point malware analysis service it respond on the threat insight service which performances security professionals on the real time for specific threats on the web-based dashboard. [11] System Shield from Viruses: System shield approach is used to ensure real time threat protection advanced seek destroy methods. It increases computer system performance reliability create seals off intelligently from future threat viruses programs. System shield active boots your defense technology which are virtually invisible when the virus comes into the system than it will protect it uses less memory for protection used few CPU resources to recover it from viruses antispyware software. Some user turn off security programs when the playing games for high-performance revolution on the game thats why system shield are used on the system to run in the background while antivirus security programs is turn off. System shield are used overloaded layers for security protection. [12] System shield do multiple detection techniques for maximum protection flexible architecture that allows for faster processes against on malware software. To avoid computer viruses recent threats do not open email attachments avoid the download files from unknown website. [12] Antivirus software is the important tool for protection of the computer system from viruses worms. This antivirus technology gives benefits to users for clean computer system from viruses. Many of viruses spread to the computer system or operating system through internet network now-a-days 50,000 viruses are online on the internet network which infects 20,000 computer system or operating system on daily based. These viruses infect user personal information private files in the computer system. One of the main problems of the antivirus technology is that most of antivirus software or programs slow down computer system processes memory or corrupt the operating system. This antivirus technology used computer support representation (CSR) in the IT security. Some antivirus technologies have scan engine for carrier-grade protection some organization need best of the best antivirus technology to clean from viruses, spyware other malware software. Some antivirus technologies have dual p rotection used server space leading antivirus competitor. [14] The last generation antivirus software has lineup detection for file-reputation analysis which used for incorporate cloud-security increases the safety. This antivirus used side by side computer security. Advanced Antivirus technologies are used for developed proactive protection of the viruses annoying security clean with the web-link scanners. All security software used scope of the protection in which solution multi-layered protection has traditional protection. Antivirus software has effectiveness on the computer system operating system. Some Antivirus software very complex stuff to understand it. All antivirus software features will have security solution which boots the usability, security, maintains performance. Security software must be upgrade to detect latest viruses. Now-a-days antivirus technologies are used in the cell phones, emails, live chatting other resources. It also gives online offline services support easy to use in the real life all these modern technol ogies. [15]

Thursday, September 19, 2019

Banning Cars Essay -- Papers benefits pros cons Essays Vehicle

Banning Cars There are always two sides of the story. In this essay I am going show the good points and the bad points about banning cars. Many things have to be considered before a change of this magnitude can happen. I will also express my own opinion to show what a person of the public would think of the change. ====================================================================== The good points weigh out the bad points by a long way. One big reason for this is pollution and the environment. The environment has been effected by cars and their pollution from the time cars were invented. The pollution that comes from cars is made up of carbon dioxide, carbon monoxide, ozone, and many other poisonous gases. This kills plants and animals and destroys the ozone layer. The pollution forms a layer in the atmosphere which, keeps the heat in causing global warming and is dangerous to the earth. If cars were banned the demand for petrol would be no where near as much as before. This would mean not as much oil would ...

Wednesday, September 18, 2019

Tracing the Moral Development of Huck Finn Essay -- Mark Twain The Adv

Tracing the Moral Development of Huck Finn Living in the 1800's wasn't an easy task. There were many hardships that a person had to endure. In the novel, The Adventures of Huck Finn, the author Mark Twain portrays the adventure of a young boy. Huck, the young boy, goes on a journey with various dilemmas. The novel starts off in Missouri on the Mississippi River. Huck is taken from his guardians by his father and then decides to runaway from him. On his journey, he meets up with his former slave, Jim. While Huck and Jim are traveling down the Mississippi River, they meet a variety of people. Throughout the novel he takes on many different tasks which help shape his moral conscience. Taking on a new friend which society shuns, being without material possessions, and taking responsibility for his actions help Huck refine and reform the morals that make him a more mature young man. Huck develops morally from his companion on his journey, Jim, a runaway slave. At first, Huck doesn't respect Jim because he's his slave. "†¦He slipped Jim's hat off his head and hung it on a limb right over him†¦" P.6. This shows how Huck likes to trick Jim and play games on him. Later the two meet up on an island and immediately befriend and join up together. "†¦I didn't do him no more mean tricks, and I wouldn't done that if I'd 'a' knew it would make him feel that way." P.86. Huck says this after fooling Jim and telling him that a real event was just a dream of his. He r...

Tuesday, September 17, 2019

English Literature and Background Essay

MA (Previous) Semester I Paper I Paper II Paper III Paper IV Paper V Semester II Paper I Paper II Paper III Paper IV Paper V Semester III Paper I Paper II Paper III Paper IV Paper V History, Structure and Description of English –I English Literature up to the Early Seventeenth Century—I English Literature up to the Early Seventeenth Century—II English Literature of the Seventeenth & Eighteenth Century—I English Literature of the Seventeenth & Eighteenth Century—II History, Structure and Description of English –II English Literature of the Nineteenth Century—I English Literature of the Nineteenth Century—II English Literature of the Twentieth Century—I English Literature of the Twentieth Century—II MA (Final) American Literature—I Indian Writing in English—I Postcolonial Literature English Language Teaching Inter-Disciplinary (ID-I) : Writing for Academic and Professional Purposes Seminar Semester IV Paper I American Literature—II Paper II Indian Writing in English—II Paper III Specializations: 1) Women’s Writing 2) Indian Literatures in Translation 3) Modern Classics in Translation one specialization to be offered in each college Paper IV Project Work Paper V Inter-Disciplinary (ID-II) : Literature and Film Seminar Department of English University College of Arts & Social Sciences Osmania University, Hyderabad MA (Previous) Semester I—(Papers I to V) Semester I—(Papers I to V) Paper I Unit 1 History, Structure and Description of English-I a) Indo-European Family of Languages b) Descent of English: Old English, Middle English and Modern English a) Language as a System of Communication b) Levels of Language Description: Phonology and Morphology a) Phonetic Description of Consonants b) Phonetic Description of Vowels a) Noun Phrase Structure (Determiners, pre and post modifiers, number, and gender) b) The Simple Sentence in English a) Verb Phrase Structure (Verb types, tense, aspect, concord; phrasal verbs) b) Coordination and Subordination (Semantic Implications) Look more:  example of satire in huckleberry finn Unit 2 Unit 3 Unit 4 Unit 5 Paper II Unit 1 English Literature up to the Early Seventeenth Century—I Background Renaissance; Reformation; Development of British Drama; University Wits Poetry Geoffrey Chaucer Edmund Spenser General Prologue to The Canterbury Tales Sonnets 34 (â€Å"Lyke as a Ship†¦Ã¢â‚¬ ) Sonnet 54 (â€Å"Of the World’s Theatre†¦Ã¢â‚¬ ) Sonnet 68 (â€Å"Most Glorious Lord of Life†¦Ã¢â‚¬ ) Everyman in His Humour The Duchess of Malfi The Spanish Tragedie Doctor Faustus Unit 2 Unit 3 Drama Ben Jonson John Webster Drama Thomas Kyd Christopher Marlowe Unit 4 2 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad Unit 5 Prose Francis Bacon Sir Philip Sidney Essays (â€Å"Of Truth†, â€Å"Of Death†, â€Å"Of Revenge†) An Apologie for Poetrie Paper III Unit 1 Unit 2 English Literature up to the Early Seventeenth Century—II Background Translation of the Bible; Utopia; Tragedy; Comedy Drama William Shakespeare Drama William Shakespeare Poetry John Donne George Herbert Poetry Andrew Marvell Richard Lovelace King Lear Henry IV: Part I Twelfth Night The Tempest â€Å"A Valediction†, â€Å"The Canonization† â€Å"The Good-Morrow† â€Å"Virtue†, â€Å"Pulley†, â€Å"Collar† â€Å"To His Coy Mistress†, â€Å"Garden† â€Å"To Althea From Prison† To Lucasta, Going Beyond the Seas† Unit 3 Unit 4 Unit 5 Paper IV Unit 1 Unit 2 Unit 3 Unit 4 English Literature of the Seventeenth and Eighteenth Centuries—I Background Allegory; Neo-Classicism; Epic; Rise of the English Novel Poetry John Milton Paradise Lost (Bks I & IX) Poetry John Dryden Absalom and Achitophel â€Å"Mac Flecknoe† Fiction Daniel Defoe Robinson Crusoe Henry Fielding Joseph Andrews Prose John Dryden Essay of Dramatic Poesy (Up to â€Å"Examen of ‘The Silent Woman’†) Preface to Shakespeare (Up to the paragraph Samuel Johnson beginning â€Å"So careless was this great poet†¦Ã¢â‚¬  3 Unit 5 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad Paper V Unit 1 Unit 2 Unit 3 English Literature of the Seventeenth and Eighteenth Centuries—II Background Pastoral Poetry; Restoration Comedy; Satire; Sentimental Comedy Poetry Alexander Pope Poetry William Blake â€Å"The Rape of the Lock† (Canto I) â€Å"An Essay on Criticism† (Part I) Songs of Innocence (â€Å"The Lamb†, â€Å"Holy Thursday†, â€Å"The Chimney Sweeper†) Songs of Experience (â€Å"The Tyger†, â€Å"Holy Thursday†, â€Å"The Chimney Sweeper†, â€Å"London†, â€Å"A Poison Tree†) â€Å"Elegy Written in a Country Churchyard† The Way of the World The Rivals â€Å"Sir Roger in Church† â€Å"The Aims of the Spectator† â€Å"Mr. Bickerstaff on Himself† â€Å"The Spectator Club† Unit 4 Unit 5 Thomas Gray Drama William Congreve R B Sheridan Prose Joseph Addison Richard Steele 4 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad MA (Previous) Semester II—(Papers I to V) Paper I Unit 1 History, Structure and Description of English—II a) Word Formation in English b) Change of Meaning a) Levels of Language Description: Syntax b) Varieties of Language: Dialect, Idiolect, Register, and Style a) Word Stress in English b) Properties of Connected Speech: Weak forms/Elision and Intonation a) Behaviourist and Cognitivist Approaches to Language Learning/Teaching; Differences between First Language Acquisition and Second Language Learning b) Role of English in India and the Objectives of Teaching English at the College Level a) Techniques of Teaching Prose, Poetry, Grammar, and Vocabulary b) Language Testing Unit 2 Unit 3 Unit 4 Unit 5 Paper II Unit 1 Unit 2 English Literature of the Nineteenth Century—I Background Romanticism; Fancy and Imagination; Gothic; Historical Novel Poetry William Wordsworth S T Coleridge Poetry P B Shelley John Keats â€Å"Intimations Ode†, â€Å"Tintern Abbey† â€Å"Rime of the Ancient Mariner† â€Å"Ode to the West Wind†, â€Å"To a Skylark† Odes: â€Å"On a Grecian Urn,† To Autumn,† â€Å"To a Nightingale† Emma Wuthering Heights Unit 3 Unit 4 Fiction Jane Austen Emily Brontà © 5 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad Unit 5 Prose Charles Lamb William Hazlitt â€Å"Dream Children†, â€Å"Old China† â€Å"The Indian Juggler†, â€Å"The Fight† Paper III Unit 1 English Literature of the Nineteenth Century—II Background Science and Religion; Pre-Raphaelites; Dramatic Monologue; Realism and Naturalism Poetry Alfred Lord Tennyson Robert Browning Poetry Elizabeth Barrett Browning â€Å"Ulysses†, â€Å"Lotos Eaters† â€Å"My Last Duchess†, â€Å"Andrea Del Sarto† Unit 2 Unit 3 G M Hopkins Matthew Arnold Unit 4 Fiction Charles Dickens Thomas Hardy Prose Matthew Arnold John Ruskin Sonnets from the Portuguese 21 (â€Å"Say over Again †¦Ã¢â‚¬ ) 32 (â€Å"The first time that †¦Ã¢â‚¬ ) 43 (â€Å"How do I love thee †¦Ã¢â‚¬ ) â€Å"Pied Beauty†, â€Å"God’s Grandeur†, â€Å"Windhover† â€Å"Dover Beach† Hard Times Tess of the d’Urbervilles â€Å"The Study of Poetry† Unto This Last (Section I) Unit 5 Paper IV Unit 1 Unit 2 English Literature of the Twentieth Century—I Background Modernism; Dada and Surrealism; Symbolism; Stream of Consciousness Poetry W B Yeats T S Eliot â€Å"Easter 1916†, â€Å"Second Coming†, â€Å"Byzantium† The Waste Land 6 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad Unit 3 Fiction D H Lawrence Joseph Conrad Prose Virginia Woolf E M Forster Drama G B Shaw J M Synge Sons and Lovers Heart of Darkness A Room of One’s Own â€Å"Art for Art’s Sake† (from Two Cheers for Democracy) Saint Joan Riders to the Sea Unit 4 Unit 5 Paper V Unit 1 Unit 2 English Literature of the Twentieth Century—II Background Postmodernism; Impressionism; Existentialism; Movement Poetry Poetry Ted Hughes Phillip Larkin Seamus Heaney Fiction William Golding Graham Greene Drama Samuel Beckett Tom Stoppard Short Story Roald Dahl A S Byatt â€Å"Thought Fox†, â€Å"Hawk Roosting† â€Å"Churchgoing,† â€Å"Toads† â€Å"Digging†, â€Å"Punishment† Lord of the Flies The Power and the Glory Waiting for Godot Indian Ink â€Å"Lamb to the Slaughter† â€Å"The Umbrella Man† â€Å"Sugar† (from Sugar and Other Stories) Unit 3 Unit 4 Unit 5 7 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad Syllabus of M A (English) (With effect from 2009-10) MA (Final) Semester III—(Papers I-V) Paper I Unit 1 American Literature—I Background American Frontier; American Renaissance; American Transcendentalism; American Puritanism Poetry Phyllis Wheatley Walt Whitman â€Å"On Being Brought from Africa to America† â€Å"When Lilacs Last in the Door-yard Bloom’d†, â€Å"Out of the Cradle Endlessly Rocking†, â€Å"Crossing the Brooklyn Ferry† â€Å"I taste a liquor never brewed†, â€Å"She sweeps with many-colored brooms†, â€Å"After great pain a formal feeling comes† The Scarlet Letter The Adventures of Huckleberry Finn The Hairy Ape Death of a Salesman â€Å"The American Scholar† â€Å"Civil Disobedience† Unit 2 Emily Dickinson Unit 3 Fiction Nathaniel Hawthorne Mark Twain Drama Eugene O’Neill Arthur Miller Prose Ralph Waldo Emerson Henry David Thoreau Unit 4 Unit 5 8 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad Paper II Unit 1 Indian Writing in English—I Background Indian Nationalist Movement; Use of English for political awakening; Reform Movements; Rise of the Indian Novel Poetry (Selections from Indian Poetry in English. Ed Makarand Paranjape. Macmillan, 1993) Sri Aurobindo â€Å"I have a hundred lives† â€Å"The Golden Light† â€Å"Thought the Paraclete† Toru Dutt â€Å"Sita†, â€Å"Our Casuarina Tree† Sarojini Naidu â€Å"The Pardah Nashin†, Ghanashyam† Fiction Krupabai Satthianandhan Mulk Raj Anand Fiction Raja Rao R K Narayan Prose Rabindranath Tagore B R Ambedkar Kamala: a Story of Hindu life Untouchable Kanthapura The Man-Eater of Malgudi â€Å"Nationalism in India† (from Nationalism) â€Å"The Annihilation of Caste† (Collected Works of B R Ambedkar, Vol III) Unit 2 Unit 3 Unit 4 Unit 5 Paper III Unit 1 Unit 2 Postcolonial Literatures Background Colonialism-Imperialism; Postcolonialism; Nationalism; Diaspora Poetry Christopher Okigbo Edward Brathwaite Judith Wright â€Å"Heaven’s Gate†, â€Å"Death lay in Ambush† â€Å"Didn’t He Ramble†, â€Å"Calypso† â€Å"Eve to Her Daughters†, â€Å"Bullocky† Things Fall Apart The Edible Woman Unit 3 Fiction Chinua Achebe Margaret Atwood 9 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad Unit 4 Drama Wole Soyinka Derek Walcott Prose V S Naipaul Ngugi wa Thiong’o Kongi’s Harvest Dream on Monkey Mountain Unit 5 â€Å"Indian Autobiographies† (from Literary Occasions: Essays) â€Å"The Language of African Literature† (from Decolonizing the Mind) Paper IV: ENGLISH LANGUAGE TEACHING Unit I History of English Language Teaching in India: Some important landmarks: a) Critique of Macaulay’s Minute; b) Landmarks of English Education in India after Independence: Kunzru Committee, the three language formula and Kothari commission. c) Ramamurthy Commission Report d) Curriculum and its components; Syllabus/ Paper Design; materials development Major Approaches, Methods and Syllabi: a. Traditional methods – Use of the Grammar Translation method, Direct method, Reading method; b. Structural Approach: Audio-Lingual Method, Types of syllabi: structuraloral-situational, notional-functional; linguistic competence and communicative competence; Error analysis and Remedial teaching c. Communicative approach, Krashen’s Monitor Model (Natural method); task based syllabus d. Humanistic Approaches: Community Language Learning, Suggestopaedia Classroom Techniques: a. Lecture mode; classroom discussion; Peer and pair work; b. Role play; Team teaching; Teaching large classes. c. Teaching Aids: Use of the Blackboard, flip charts, , OHP, audio visual tools, Television, d. Traditional and digital Language Lab; the Computer and the Internet. Teaching of Language skills: a. The teaching of listening, speaking, reading, writing and related study skills b. Teaching of literature c. Stylistic approach to the teaching of literature (norm, deviation, and foregrounding); d. Teaching of language through literature. 10 Unit II Unit III: Unit IV: Department of English University College of Arts & Social Sciences Osmania University, Hyderabad Unit V: Testing and Evaluation: a. Importance of Testing, traditional testing methods; Different types of tests b. Group Discussion (GD) c. Interview d. Course Evaluation Paper V : Inter –Disciplinary ID-I : Writing for Academic and Professional Purposes Unit 1: Language CompetenceA. Communicative Grammar: Nouns, articles, prepositional phrases, tenses subject verb agreement, modal verbs, difference between spoken & written language B. Sentence structure, kinds of sentences-statements, interrogatives, question tags passive constructions, reported speech; use of conditionals, compound & complex sentences C. Academic Reading : read to write- focus on the gist, idiom, rhetoric, style and genre specific features in different texts ; intensive & critical reading, note making Unit 2: Organization of writing A. Guided writing, expansion, use of connectives, sequencing, writing a paragraph free writing, mind mapping. Paraphrasing, summarizing, writing an abstract Writing letters, resume and email ( e-mail etiquette) B. C. Unit 3: Academic Writing A. B. C. proposals, SOPs ( statement of purpose) structure of a report, report writing Writing an essay; (descriptive, argumentative and scientific) Unit 4: Professional Writing A. Inter office memos, professional reports( business, survey, minutes of a meeting) B. Editing, writing a review, creative writing (Ad writing, slogan writing and writing headlines). C. Technical writing; product and process writing, writing a user manual SEMINAR PRESENTATION 11 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad MA (Final) Semester IV—(Papers I-V) Paper I Unit 1 Unit 2 American Literature—II Background American Dream; Multiculturalism; Lost Generation; American Comedy Poetry Robert Frost Wallace Stevens Robert Lowell Unit 3 Fiction Ernest Hemingway Saul Bellow Drama Lorraine Hansberry Neil Simon Short Fiction Henry James William Faulkner Issac Asimov â€Å"West Running Brook†, â€Å"Home Burial† â€Å"Sunday Morning† â€Å"The Emperor of Ice-Cream â€Å"For the Union Dead† â€Å"At a Bible House† The Old Man and the Sea Seize the Day Raisin in the Sun Sunshine Boys â€Å"The Middle Years† â€Å"Go Down Moses† â€Å"The Bicentennial Man† Unit 4 Unit 5 12 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad Paper II Unit 1 Indian Writing in English—II Background Decolonization; Counter DisPapers; Partition Literature; Myth and Literature Poetry (Selections from Indian Poetry in English. Ed Makarand Paranjape. Macmillan, 1993) Nissim Ezekiel Kamala Das A K Ramanujan Unit 3 Fiction Salman Rushdie Shashi Deshpande Drama Girish Karnad Mahesh Dattani Short Fiction Bharati Mukherjee â€Å"Enterprise† â€Å"Poet, Lover, Birdwatcher† â€Å"An Introduction† â€Å"The Old Playhouse† â€Å"A River†, â€Å"Love Poem for a Wife-I† Unit 2 Midnight’s Children The Binding Vine Hayavadana Final Solutions â€Å"A Wife’s Story†, â€Å"Management of Grief† (both from The Middleman and Other Stories, 1989) â€Å"The Accompanist† â€Å"A Devoted Son† (both from Games at Twilight, 1978) Unit 4 Unit 5 Anita Desai 13 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad Paper: III: (Specializations) A) Women’s Writing B) Indian Literatures in Translation C) Modern Classics in Translation Paper III A) Women’s Writing Unit 1: Background The Woman Question: New Woman; Women’s Liberation Movement; Feminism; Re-reading the Canon Prose Mary Wollstonecraft Unit 2: Vindication of the Rights of Women (Introduction and Chapter 2) The Second Sex (Essay on Biology) Simon de Beauvour Unit 3: Poetry Elizabeth Barret Browing Sylvia Plath Margaret Atwood Grace Nichols Anne Stevenson Fiction Virginia Woolf Nadine Gordimer Drama Carly Churchill Alima Ata Aidoo â€Å"A Curse for a Nation† â€Å"Lady Lazarus† â€Å"Circle† – Mud Poems â€Å"Making Poetry†, The Spirit is too Blunt an Instrument Unit 4: Mrs Dalloway July People Unit 5: Top Girls Anowa Paper III (B): INDIAN LITERATURES IN TRANSLATION Unit 1: i) ii) Background Types of Natya (Nataka, Prakarana, and Prahasana) and Theory of Rasa and Kavya Indian Concept of Translation (from Translation as Discovery by Sujit Mukherjee, Chapter 2 & 3) Scope of Comparative Literature (â€Å"Comparative Literature in India: A Perspective† by Bijay Kumar Das from Comparative Indian Literature ed. Rao & Dhawan) 14 iii) Department of English University College of Arts & Social Sciences Osmania University, Hyderabad iv) Dalit Aesthetics (â€Å"Dalit Literature and Aesthetics† from Towards an Aesthetics of Dalit Literature by Sharavan Kumar Limbale) Poetry Sangam Poety – from Poems of Love and War Trans by AK. Ramanujan, Akam Poems – â€Å"Kurinci† (page 15), â€Å"Neytal† (page 41),†Palai† (page 53), â€Å"Mullai† (page 81), â€Å"Marutam† (page 97), Puram Poems – â€Å"King Killi in Combat† (page 123) Gurram Joshua – I was one of them†, The Bat Messenger† (From Twentieth Century Telugu Poetry. An Anthology ed. By Velcheru Narayan Rao, OUP 2002) Jibananda Das – â€Å"Banalata Sen†, The Naked Solitary Hand† (From Signatures ed by Satchidanandan, Sahitya Academi, New Delhi) Drama Kalidas Unit 2: i) ii) iii) Unit 3 i) Abhgnana Shakuntalam from The Plays of Kalidasa by Barbara Stoller Miller, Ed Columbia University Press, 1984 Silence! the Court is in Session (OUP) ii) Unit 4: i) Vijay Tendulkar Fiction Premchand Godan; a novel of peasant India Tans by Jai Ratan and P. Lal Bombay: Jaico, 1979 ii) U.R Anantha Murthy Smakara: A Rite of Dead Man Trans by A.K. Ramanujan (OUP) Short Fiction Unit 5: i) Folktales – â€Å"Bopoluchi† (A Punjabi Folk Tale), â€Å"Why the Fish Laughed† (A Kashmiri Folk Tale), Folktales from India selected and ed. By A.K. Ramanujan, Penguin Books India, 1994. Ismat Chugtai – â€Å"Chauti Ka Jowra† from Inner Courtyard. Ed Lakshmi Holmstrom, Rupa, 2002. Mahasweta Devi – â€Å"Shishu† from Women’s Writing, Vol II Ed by Tharu & Lalitha, OUP, 1991. ii) iii) 15 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad Paper III (C) : Modern Classics in Translation Unit 1: Background Enlightenment; Bourgeois Experience; Epic Theatre ; Magic Realism. Poetry Charles Baudelaire : The Sick muse, Even She was called Bautrice By Many Who knew Not Wherefore, The Remorse of the Dead Pablo Neruda: What Spain was Like, The Heavenly Poets, Opium in the East Joseph Brodsky: Odysseus to Telemachus, Nune Dimmittis, Nature Morte Unit 3: Fiction Gustav Flaubert: Milan Kundera: Drama Anton Chekhov Betrolt Brecht Unite 2: Madame Bovary Book of Laughter Forgetting Unit 4 The Cherry Orchard Mother Courage Unit 5: Short Fiction Franz Kafka Gabriel Garcia Marquez PROJECT WORK Metamorphosis No one Writes to the Colonel PAPER IV Paper V: Inter-Disciplinary (ID-II) Literature and Film Unit1: Background: a) Elements of a narrative: Theme, Plot, Structure, Setting, Character, Point of View b) Narrative devices : genres, montage, film noir, flashback, special effects Unit 2: Drama and Film a) George Bernard Shaw – Pygmalion (1913) b) George Cukor (Director) – My Fair Lady (1964) Unit 3 : Novel and Film a) EM Forster – A Passage to India (1924) b) David Lean (Director) – A Passage to India (1984). Unit 4: Short Fiction and Film a) Ruskin Bond – â€Å"The Blue Umbrella† b) Vishal Bhardwaj (Director) – â€Å"The Blue Umbrella† (2007) 16 Department of English University College of Arts & Social Sciences Osmania University, Hyderabad Suggested Reading Beja, Morris. Film & Literature, an introduction, Longman, 1979. Bluestone, George. Novels into film, Johns Hopkins Press, 1957. Boyum, Joy Gould. Double Exposure : Fiction into Film, Seagull Books, 1989. Corrigan, Timothy, ed Film and Literature: An Introduction and Reader. Prentice Hall, 1999. Das Gupta, Chidananda. Talking about films. Orient Longman, 1981 Deborah Cartmell and Imelda Whelehan, eds. Adaptations: from text to screen, screen to text. Routledge, 1999. Elliott, Kamilla. Rethinking the novel/film debate. CUP, 2003. Literature –Film Quarterly. McFarlane, Brian. Novel to film: an introduction to the theory of adaptation. OUP, 1996. Ray, Satyajit. Our Films, Their Films. Orient Longman, 1976. Reberge, Gaston. The Subject of Cinema, Seagull Books, 1987. Stam, Robert and Alessandra Raengo, eds. A Companion to literature and film. Blackwell Pub., 2004. SEMINAR PRESENTATION

Monday, September 16, 2019

Quality Of Life Thalassemia Patients Health And Social Care Essay

Thalassemia is familial upset of blood characterized by anaemia. It is the most common individual cistron upset in the universe with bulk of new instances in the development states. Thalassemia is a chronic disease in which patients can non do plenty good quality haemoglobin to prolong life. Therefore these ruddy cells break down prematurely ensuing in terrible anaemia. Epidemiology It is prevailing in the antecedently malaria endemic zones all over the universe. The planetary thalassaemia bearer frequence is about 5 % . It is widely prevailing in Bangladesh with bearer frequence of 7 % among which 4 % HbE bearers and 3 % beta thalassaemia bearers. It is estimated that 7000 new babes born with thalassaemia each twelvemonth. Thalassemia patients undergo womb-to-tomb blood transfusion and Fe chelation. WHO defines quality of life as â€Å" an person ‘s perceptual experience of their place in life in the context of the civilization and value systems in which they live and in relation to their ends, outlooks, criterions and concerns. It is a wide ranging construct affected in a complex manner by the individual ‘s physical wellness, psychological province, personal beliefs, societal relationships and their relationship to salient characteristics of their environment. â€Å" 1RationaleHemoglobin upsets are an emerging planetary wellness job. The quality of life surveies in developed states revealed important lessening in QOL due to hard and long term intervention. Though the disease is rather common in Bangladesh, there was no survey conducted on health-related quality of life ( HRQOL ) in Bangladesh and hazard indexs associated with it. There is scarceness of published research in thalassaemia in Bangladesh. A PubMed hunt with keyword ‘Thalassemia Bangladesh ‘ returned merely 13 consequences. Most diseases have a major impact on the afflicted single above and beyond mortality. Diseases that may non be deadly may be associated with considerable agony and disablement. For this ground, it is besides of import to see the impact of a disease as measured by its consequence on a individual ‘s quality of life, even though such step are non, in fact, steps of disease happening. For illustration, it is possible to analyze the extent to which patients with thalassemia rheniums compromised by the unwellness in transporting out activities of day-to-day life. Although considerable contention exists about which quality of life steps are most appropriate and valid there is general understanding that such steps can be reasonability used to be after short-run intervention plan for groups of patient. Such patients can be evaluated over a period of months to find the consequence of the intervention on their ego reported quality of life. Quality of life steps have besides been used for set uping precedences for scarce wellness attention resources. Although prioritization of wellness attention resources is frequently chiefly based on mortality informations, because many diseases are chronic and non life threatening, quality of life must besides be taken into history for this intent. Patients may put different weights on different quality of life steps depending on cultural background, instruction, and for illustration, spiritual values. As a consequence mensurating quality of life and developing valid indices that are utile for obtaining comparative informations in different patients and in different populations remain a major challenge. 2Conceptual ModelResearch QuestionWhat is the wellness related quality of life among the thalassaemia patients in the selected centres? What are the hazard indexs associated with the wellness related quality of life of thalassaemia patients?AimGeneral ObjectiveTo find the wellness related quality of life among the thalassaemia patients in selected centres and designation of the associated hazard indexs.Specific aimTo mensurate the wellness related quality of life among the thalassaemia patients in selected centres To compare the wellness related quality of life in this survey with antecedently published surveies. To happen out the hazard indexs that influences wellness related quality of life.List of variablesDependent VariablesHealth Related Quality of Life ( HRQOL )Independent VariablesSocio-demographic variables Age Sexual activity Religion Highest instruction ( in old ages ) Area of abode District of abode Highest instruction of household caput Occupation of the household caput Family income Number of siblings Number of thalassaemia among the siblings Disease and intervention related variables Type of thalassaemia Age of first diagnosing Blood group Requires blood transfusion Age of first transfusion Transfusion interval Pre-transfusion haemoglobin degree Duration since last transfusion Serum ferritin degree Type of Fe chelator Regularity of Fe chelator Splenectomy Date of splenectomy Complications i.e. Hepatitis B, C Visit to specialist physician for thalassaemia Physical scrutiny variables Height Weight Liver size Spleen size Facial alterations Composite variables Body mass index Height for age z mark BMI for age z markOperational Definition of the VariablesHealth Related Quality of Life ( HRQOL ) : Individual ‘s ability to map physically, emotionally and socially within his/her environment at a degree consistent with his or her outlook measured utilizing structured and good validated tool PedsQL. Age: Age of the respondent calculated in old ages by subtracting day of the month of birth from day of the month of interview. If day of the month of birth is non available, age in accomplished old ages is taken alternatively. Highest instruction: Highest formal instruction of the respondent calculated in figure of old ages. Area of abode: Residence of the respondent in footings of belonging to metropolis, town and small town. City is defined as the big and of import town such i.e. divisional centres. Town is defined as the population centre smaller than metropoliss i.e. territory central office. Highest instruction of household caput: Highest formal instruction of the household caput calculated in figure of old ages. Family income: Monthly income of the caput of the household along with income of the other household members. Number of siblings: Number of siblings of the respondent. Number of thalassemics among the siblings: Number of siblings enduring from thalassaemia other than the respondent himself. Type of thalassaemia: Respondent or parent reported thalassemia type as diagnosed in the haemoglobin cataphoresis. The common types are Beta thalassaemia and Hb E beta thalassaemia. Age of diagnosing: The age at which thalassaemia was foremost diagnosed in the respondent. Blood group: Blood group and Rh type of the respondent. Requires blood transfusion: Weather the respondent requires blood transfusion of keeping life. Age of first transfusion: The age at which the respondent received foremost blood transfusion. Transfusion interval: Respondent or parent reported usual interval between blood transfusions. Pre-transfusion hemoglobin degree: Respondent or parent reported pre-transfusion haemoglobin degree during last 3 months. Duration since last transfusion: Duration since last blood transfusion calculated from last day of the month of transfusion as reported by respondent or parent. Serum ferritin degree: Serum ferritin degree in ng/L in last six month as reported by the respondent or parent. Type of Fe chelator: Type of Fe chelator taken by the respondent. The options are desferrioxamine, deferiporne, deferasirox or combination of these drugs. Regularity of Fe chelator: Weather the respondent takes the drugs daily or as prescribed. Splenectomy: If splenectomy was done. Date of splenectomy: Date or twelvemonth of the splenectomy as reported by respondent or parent. Complications i.e. Hepatitis B, C: Weather any complication ensuing from intervention of thalassaemia is present i.e. hepatitis B, hepatitis degree Celsius, diabetes, bosom disease, hypothyroidism and growing deceleration. Visit to specialist physician for thalassaemia: If the respondent visits specialist physician for thalassaemia and continuance since last visit to a specializer physician. Height: Height of the respondent measured in centimetre utilizing height base. Weight: Weight of the respondent measured in kg utilizing bathroom graduated table. Liver size: Size of the liver in centimetre signifier costal border along the mid costal line. Spleen size: Size of the lien in centimetre from the costal border along the axis of the spleen towards navel. Facial alterations: Facial alterations scored harmonizing to three standards i.e. bossing of the skull, giantism of zygoma, dental malformation. Each standard was scored 0-4 and amount of all standards used as the concluding mark.Review of Related LiteratureInternational PerspectiveIt is estimated that more than 300,000 kids are born with familial disease of haemoglobin each twelvemonth among which about 80 % born in low to income countries.3Regional PositionNational PerspectiveQOL A survey of hurting in the thalassaemia patient used SF-36v2 wellness study for adult/adolescent and kids were used PF-28 child wellness questionnaire.4 Iron Chelation Therapy ConformityPainThe progresss in the intervention of thalassaemia have resulted in increased life anticipation 5. The drawn-out life spans have exposed antecedently unidentified issues like bodily hurting. A survey conducted in the Thalassemia Clinical Research Network ( TRCN ) among 265 adults/adolescent and 103 kids with thalassemia 69 % of adult/adolescent reported bodily hurting with at least 28 % reported at least moderate hurting. Parent reported hurting in 56 % of kids while merely 11 % reported pain reasonably frequently. Though there was no difference in the hurting in kids with thalassaemia compared with the general population, hurting increased significantly with age. The survey besides showed that increased hurting is associated with lessening in quality of life and increased anxiousness and depression. 4 : Methodology This survey was done to happen out the wellness related quality of life of the thalassaemia patient in the selected centres in Dhaka metropolis and hazard indexs associated with it. The undermentioned methodological analysis was followed to carry on the survey.Study DesignA cross-sectional survey was designed to measure the HRQOL and associated hazard indexs. Figure 1: Conventional diagram of a cross-sectional surveyStudy PeriodThe entire survey period accounted 6 months from January 2010 to June 2010. During this period a scope of activity was undertaken get downing from title choice, protocol readying, protocol presentation, informations aggregation, informations cleansing, information analysis, study composing and printing. The clip allocated for informations aggregation by class coordinator was from 18 April 2010 to 7 May 2010. The elaborate work agenda is appended in AnnexureA -A 1.Study LocationThis survey was done on thalassaemia patients came at 3 centres in the Dhaka metropolis viz. ASHA -Thalassemia Center, Bangladesh Thalassemia Society and Thalassemia Hospital and Red Crescent Blood Center. Dhaka Shishu Hospital Thalassemia Center was planned as one of the sites in the initial protocol, but the establishment declined the research worker for informations aggregation. Therefore it was replaced with Red Crescent Blood Center with permission from research usher.Study PopulationThe survey population included all the patients coming to the survey location for outpatient audience and blood transfusion.Study SampleSampling Technique and Sample SizeA convenient sampling was done. All available instances within the informations aggregation period were included in the survey. Overall 120 instances were included in the survey.Calculation of Sample SizeEligibility CriteriaInclusion StandardsExclusion StandardsDevelopment of Research InstrumentA pretested semi structured Bangla questionnaire and checklist was used for informations aggregation. The variables were identified harmonizing to the specific aims and taking the of import variables into consideration which reveled in the literature reappraisal. Then appropriate graduated tables of measuring for these variables were identified and English questionnaire was drafted. After necessary rectification and tuning the English questionnaire was translated into Bangla. Th e questionnaire was so reviewed by research usher and co-workers of the research worker. The PedsQL Core scales 6-11 by James W. Varni was used for appraisal of quality of life with due permission from the writer. The tool consists of 4 ( four ) graduated tables for different age group i.e. Young grownup ( 18-25 ) , adolescent ( 13-18 ) , kid ( 8-12 ) , immature kid ( 5-7 ) . The interlingual rendition of the instrument was carried out harmonizing to the lingual guideline sent by the writer. The purpose was to develop a questionnaire which is conceptually tantamount to the original version, every bit good as clear and easy to understand. The interlingual rendition procedure consisted of three stairss – Forward Translation Backward Translation Patient Testing In each measure a interlingual rendition study was prepared and sent to writer. For interlingual rendition of the PedsQL to Bangla, the research worker appointed two transcribers viz. Dr. Jenny Roslin D'costa and Dr. Tareq Salahuddin and himself acted as the undertaking director for the interlingual rendition procedure as stipulated in the lingual proof guideline. Each the transcriber was given the 4 ( Young grownup, adolescent, kid, immature kid ) original PedsQL graduated tables for different age group along with the lingual proof guideline. They were asked to interpret independently. After completion of the interlingual rendition a meeting was arranged on 16.04.2010 for rapprochement of the interlingual renditions. The undertaking director went through all 4 graduated tables one by one. There was no major dissension among the transcribers. They agreed to alter some of the words with equivalent word and rephrased some of the instructions and inquiries. Both the transcriber translated â€Å" walk more than one block † literally. The undertaking director pointed that actual interlingual rendition of western block will transport no significance in Bangla and among the mark population. Therefore he suggested it to be replaced with Bangla equivalent. He quoted Wikipedia mention below to explicate the significance of block. hypertext transfer protocol: //en.wikipedia.org/wiki/City_block â€Å" Since the spacing of streets in grid programs varies so widely among metropoliss, or even within metropoliss, it is hard to generalise about the size of a metropolis block. However, as mention points, the standard block in Manhattan is about 264 by 900 pess ( 80 m A- 270 m ) ; and in some U.S. metropoliss criterion blocks are every bit broad as 660 pess ( 200 m ) . The blocks in cardinal Melbourne, Australia, are 660 by 330 pess ( 200 m A- 100 m ) , formed by dividing the square blocks in an original grid with a narrow street down the center. † The transcriber discussed the issue and replaced block with â€Å" walking more than 100 paces † which is frequently used in Bangla to intend â€Å" walk a short distance † . After alteration of all four graduated tables ( Young grownup, adolescent, kid, immature kid ) version -1 of each paperss was prepared. Dr. Md. Rajib Hossain was appointed for the backward interlingual rendition of Bangla VersionA aˆ‘A 1 of the PedsQL graduated tables ( Young grownup, adolescent, kid, immature kid ) and research worker himself acted as the undertaking director. He was besides given the lingual proof guideline and asked non to entree the original graduated tables from cyberspace. After completion of the interlingual rendition a meeting was arranged on 17.04.2010 to compare his interlingual rendition with the original graduated tables. The consequence of the treatment in the meeting is documented in the undermentioned subdivision. The rubric contrary translated as â€Å" list † alternatively of â€Å" stock list † . This is due to non holding a similar word Bangla word. The closest interlingual rendition was synonymous to â€Å" name † and Dr. Hossain accepted it. In the Young Adult Report, Teen Report and Child Report â€Å" walking more than one block † , which was changed to â€Å" walking more than 100 paces † in forward interlingual rendition due to cultural differences was rearward translated same. Dr. Hossain besides agreed on the alterations made. The point 8 â€Å" I have low energy † was reverse translated as â€Å" I feel weak † . Therefore the interlingual rendition in version 1 was updated in version 2 which literally translates to â€Å" I have low energy † . In the emotion subdivision, point 4 â€Å" I worry what will go on to me † translated back as â€Å" I get dying about my hereafter † but it was decided to maintain the current Bangla interlingual rendition. In â€Å" how I get along with others † point 5, there is non actual interlingual rendition of â€Å" equal † hence the contrary interlingual rendition was â€Å" others of my age † which was acceptabl e. The other differences were considered as normal lexical fluctuations. In Young Child Report, â€Å" a batch of job † in the direction subdivision was back translated â€Å" large job † . In the reply options â€Å" a batch † was translated as â€Å" many times † . The difference was due to weak backward interlingual rendition. â€Å" Functioning † in the subdivision rubrics had no actual Bangla word, which was reflected in each of the subdivision rubric. The difference was acceptable. In the first subdivision â€Å" Physical operation † , foremost 6 points was translated as interrogative get downing with â€Å" Do you † . Therefore sentence building was altered to repair it. The other differences in all the graduated tables were considered normal lexical difference transporting the same significance of the original graduated table. The alterations were incorporated in version-1 of the translated graduated table and the version 2 is produced. In the patient proving measure, the research worker found that in the Likert graduated table ( 0-4 ) , patients did non understand the difference of â€Å" frequently † and â€Å" about ever † clearly. Therefore he suggested interlingual rendition of these two points to be modified which retranslate as â€Å" frequently † and â€Å" ever † . However the writer of the tool expressed his concern that altering â€Å" about ever † to â€Å" ever † will cut down your responses at that terminal of the graduated table. He advised to return to â€Å" about ever † which will be helpful in comparing the research worker ‘s findings with other published informations on the PedsQL utilizing a one-sample t-test. The writer suggested utilizing cognitive questioning method to get the better of this issue. The survey questionnaire was besides pretested along with the PedsQL graduated tables. Entire 37 points were included in the concluding questionnaire after necessary all right tuning.Datas Collection PlanThe PedsQL Generic mark tool has 4 graduated tables for different age group of 5-7, 8-12, 13-18 and 18-25 old ages. The sale for 5-7 old ages is interviewer administered while remainders are designed to be self administered. However the research worker communicated the writer of the tool about the low literacy rate which may cut down the pertinence of the ego administered tool. The writer provided a Cognitive Interviewing Guideline, which was applied for questioning all the tools.Data Processing and Analysis PlanAfter aggregation, informations were checked exhaustively for consistence and completeness. Datas were cleaned and edited manually. Statistical Package for Social Science ( SPSS ) version 16.0 for Windowss was used to analyse the information. Descriptive statistics were compu ted for the demographic variables. Chi-square analysis was carried out to measure the important association of qualitative informations. Datas were presented by tabular arraies and graphs.Quality AssuranceStudy RestrictionsPurposive samplingEthical IssuesThe survey was done through aggregation of informations utilizing questionnaire and neither any intercession nor any invasive process was be undertaken. However, prior to induction of the survey ethical clearance was taken from NIPSOM ethical commission. Before induction of the interview a brief debut on the purpose and aim of the survey was presented to the respondents. They were informed about their full right to take part or decline to take part in the survey. The research worker besides assured the respondents that there was no invasive process included in the survey and all the findings of the survey will be used to steer the service suppliers and policy shapers for the betterment of thalassaemia intervention. A complete confid ence was given to them that all information provided by them will be kept confidential and their names or anything which can place them will non be published or exposed anyplace. Their engagement and part will be acknowledged with due regard. After completion of these processs the interview was started with their due permission. : Consequences This cross sectional survey was conducted among 108 thalassaemia patients in three thalassaemia intervention centre in Dhaka metropolis. The information was analyzed utilizing appropriate descriptive and illative statistical processs and presented in this chapter utilizing tabular arraies and graphs, harmonizing to specific aims where applicable. The determination is organized under the undermentioned subdivisions4.1 Socio-demographic features of the respondents4.2Socio-demographic features of the respondentsData was collected on socio-demographic position of the respondents which is shown in the tabular array xx.xx.Age of the respondentsThe age of the respondent was usually distributed ( One sample Kolmogorov Smirnov Test, P =0.28 ) with average 13.28 old ages and standard divergence A ±5.19 old ages. There was no important difference of quality of life in one manner ANOVA ( F=1.68, p=0.18 ) among the PedsQL age groups.Table 1: Age distribution of respondents harmonizing to PedsQL age groupsAge groupFrequencyPercentage5-7 old ages 17 15.7 8-12 old ages 44 40.7 13-17 old ages 25 23.1 18-25 old ages 22 20.4 Entire 108 100.0AgeSexual activityReligionHighest instruction ( in old ages )Area of abodeDistrict of abodeHighest instruction of household caputOccupation of the household caputFamily incomeNumber of siblingsNumber of thalassaemia among the siblingsCorrelation analysis and additive and ordinal logistic arrested development were used to pattern forecaster of hurting. Forecasters important in initial analysis, commanding for age, sex, and state, thalassemia diagnosing, regular transfusion, bone denseness, pre-transfusion haemoglobin degree. Partial correlativity, commanding for age and sex, was used to measure the consequence of hurting on quality of life. : DiscussionDiscussion12