Wednesday, October 30, 2019

An Objective Way of thinking using mathematical principles Article - 1

An Objective Way of thinking using mathematical principles - Article Example Then one should seek to establish for each class of experience, what classes of knowledge are required for that class. For the Visual class of Experience one realises that all that can be acquired are those classes of knowledge that the individual’s senses can receive without any interpretation. This reasoning can be set out in the form of a series or SET of equations 3/ One of these classes is the ‘visual experience’ e.g. viewing the world that surrounds us for which the ONLY class of knowledge one requires to satisfy this class of experience, is that which can be gathered through the specific human’s senses e.g. for the sight sense, ‘colours that form shapes’. This applies to all the members of reality that make up the world that surrounds us. No further interpretation is required or can be made through the ‘visual experience‘. [See also the solution to Big Question 2 which details how the personal TEMPLATE works. For it includes what classes of knowledge the senses can detect and those that cannot be detected I.e. complete SET that can be used to represent any human.] 4/ Thus by adopting this thinking strategy of accepting what one receives through the senses without personal interpretation I.e. subjectivity [perceptions], everyone would be able to see the same / real world rather than seeking to create their own world. My appreciation for Roger Penroses essay asking "What is reality?" was diminished because he gave no clear-cut definition of what he means by "reality" (18 November, p 32). As a result, the discussion seemed like nothing so much as an overview of the implicit etymology and current range of English-language meanings of that word. One can easily imagine dictionary definitions that either include or exclude physical events at the quantum scale, or human mental events such as unexpressed thoughts. I am not a linguist, but I suspect that the words for "reality" in other languages may not exactly

Sunday, October 27, 2019

Alu elements

Alu elements Introduction For centennials scientists and laymen alike have been awe-inspired and intrigued by the phenomena that is Alu elements. It is a family of short interspersed repeats that have mobilized throughout primate genomes by retrotransposition over the past 65 million years of primate evolution (Comas et al., 2001). Alu elements are regarded as Sort Interspersed Nuclear Elements (SINES) whose length spans 300bp. In close proximity to the centre of the Alu element itself, is a recognition site for the restriction enzyme Alu I, of which its name is ascertained. These Alu elements accounts for 5% of the human genome and is believed to have arisen from a gene that encodes the RNA component of the recognition molecule (Smith, 2005). Alu is a transposable DNA sequence that has the ability to repeatedly copy and insert itself into new chromosome loci i.e. jumping-genes. More specifically Alu is a retroposon it necessitates the retrovirus enzyme reverse transcriptase to produce an identical copy of itself that has the capacity to be mobile. This is achieved when the inserted Alu, by processes of RNA polymerases, is transcribed into mRNA. The newly formed mRNA is converted to a double stranded molecule. This is accomplished by the action of reverse transcriptase. In the end, at any new chromosomal locus at the site of a single or double stranded break, the DNA copy of Alu is integrated (Robinson, 2005). In order for an Alu element to self transcribe, each has an internal promoter for RNA polymerase III. Nevertheless, it lacks the ability to produce a copy of itself. Furthermore, to integrate this copy into a new chromosome position. But other transposons the very functions Alu lacks. One of these other transposons is L1, a Long Interspersed Nuclear Element (LINES), as a results of LINES ability to retain a functional reverse-transcriptase gene. In addition to LINES ability to reverse transcribe RNA to DNA , L1 reverse transcriptase is also able to produce single stranded nicks in DNA. If a chromosomal locus contains the sequence AATTT, the reverse transcriptase enzyme will produce a nick the polyadenalated tail of the Alu transcript hydrogen bonds to the TTT sequence at the nicked site. Thus creating a primer for for the reverse transcription. Enabling the DNA copy to migrate (Fisher, 2007). This representation depicts the efficiency of L1. Moreover, how L1 provieds the the fuctions for Alu tranposons. In essence, it shows how Alu is a parasite of L1 i.e. a remnant of an ancestoral retrovirus (Kass et al., 2007). This study examines PV92, a human-specific Alu insertion on chromosome 16 and which belong to the subfamily Alu Y. The PV92 genetic system has only two alleles indicating the presence (+) or absence (-) of the Alu transposable element on each of the paired chromosomes. It is aimed at extracting DNA, amplifying it and running it on a 2% agrose gel. The results attained will be analysed for the possible Alu insertion or deletion. It is hypothesised that with the aid of specific molecular biology techniques, analysis of the PV 92 Alu element can be achieved and the population will be in Hardy-Weinberg Equilibrium. Method And Materials A) DNA Samples For approximately 1minute, sterile nylon swabs were rubbed inside the cheek. The swabs were then placed in 250 µl of QuickExtract and rotated in such a manner that no solution was spilt. Thereafter, swabs were pressed against the sides of the tubes, removed the tubes were closed. The tubes were vortexed for 10seconds and incubated for 1minute at 65 °C. A second vortex then followed for 1seconds. The tubes were then incubated for 4minutes at 98 °C. Upon completion, the tubes were re-vortexed for 15seconds. With the use of a nanodrop, the DNA of each tube could be quantified. The expected yield for each tube was 20ng/ µl. B) PCR Conditions In a final volume of 150 µl, a standard master mix was prepared. Each master mix comprised 1x reaction buffer, 200mM dNTP mix, 1.5mM MgCl2, 1 µM of each primer and 0.016U/ µl of Taq polymerase. Following a 1:1 dilution, the DNA stock was diluted to a concentration of 15ng/ µl. The reaction was set up by mixing 15ng of DNA to a master mix which was made up to a final volume of 25 µl. Finally, the preparation of the negative control followed containing 24 µl of master mix which was made up to a final volume of 25 µl. The reactions were then run for 30 cycles by means of the subsequent constraints: 95 °C 1min, 55.5 °C 1min, 72 °C 1min and 72 °C 7min. This was then held at 4 °C. C) Gel Electrophoresis In an Erlenmeyer flask, 2g of agrose powder was weighed out and 100ml of 1x TBE was added. The agrose was dissolved by heating in a microwave oven. The solution was then cooled and 1 µl of EtBr was added. The agrose was then poured into a casting tray with a comb and this was allowed to set at room temperature. Of the PCR product, 10 µl was mixed with 1 µl loading dye. Then 10 µl of the newly formed sample was loaded onto the gel alongside the MW marker. Using a UV light, the DNA fragments could be visualised and photographed. The size of the amplified product could then be attained. Results Frequencies for a class of 70 students ++ = 35 individuals +- = 30 individuals = 5 individuals Therefore the total number of alleles = 140 Allele frequency distribution of the ++ and allele in the Normal Population Allele frequency for ++ allele = [(++ x 2) + (+-)] à · (n), where n= number of alleles in the whole population Therefore: Allele frequency for ++ allele = [(35 x 2) + 30] à · (140) =0.714 =71.4% Allele frequency for allele = [( x 2) + (+-)] à · (n), where n= number of alleles in the whole population Therefore: Allele frequency for L allele = [(5 x 2) + 30] à · (140) =0.286 =28.6% Observed Frequencies (OF) OF = Number of individuals for a specific allele à · total number of individuals in the sample Therefore: ++ allele = 35 à · 70 = 0.50 +- allele = 30 à · 70 = 0.43 allele = 5 à · 70 = 0.07 Hardy-Weinberg Equilibrium (HWE) The formula for determining HWE = p2+2pq+q2 Therefore: HWE = (0.714)2 + [2(0.714 + 0.286)] + (0.286)2 = 1 Comparison of observed frequencies with expected frequencies Observed Expected (O-E)2 à · E ++ 50 51 0.0196 +- 43 41 0.0976 7 8 0.1250 Total ∑ 0.242 For degrees of freedom = 1 and a 95% probability, the critical value attained from the Chi square table is 3.843 Discussion The results attained depicted that 35 individuals in the sample were homozygous for the insertion, while 30 were homozygous for no insertion. Only 5 individuals in the sample were heterozygous. This shows that a greater percentage of the population can pass on the PV92 insertion to their offspring. The allele distribution frequencies of the ++ and +- allele in the normal population revealed that 71.4% of the population was ++ which is just below 2 ½ times more that the 28.6% attained for the allele. The observed frequencies materialised similar results. The ++ allele had the highest frequency with +- having the lowest. Once more, the allele was the intermediate. When comparing the observed frequencies to that of the expected frequencies, the critical value attained was 0.242. With the respects to the Chi square table, for degrees of freedom being 1 and for a 95% probability, the critical value was 3.843. The Hardy-Weinberg principle implies that both allele and genotype frequencies in a population remain stable i.e. equilibrium, from cohort to the next except if specific disturbing influences are launched. Those comprise non-random mating, mutations, selection, limited population size, overlapping generations, random genetic drift and gene flow (Wikipedia, 2010 and Roux, 1974). With the above mentioned, it was attained that the sample was found to be in equilibrium as the calculated critical value was less than the one attained from the Chi square table at a 95% probability. Therefore, it can be said with much certainty that the hypothesis made was true. References * Comas, D., Plaza, S., Calafell, F., Sanjantila, A. and Bertranpetit, J. (2001). Recent Insertion of an Alu Element Within a Polymorphic Human-Specific Alu Insertion European Journal of Pharmacology Molecular Pharmacology Section, 247, 239-248 * Fisher, L. (2007). Alu Frame-set. (Online) (Cited 28 March 2010) Available from http://www.geneticorigins.org/pv92/aluframeset.htm * Kass, D., Jamison, N., Mayberry, M. and Tecle, E. (2007). Identificatin of a unique based Alu-polymorophism and its use in Human Population studies. Journal of Genes. * Robinson, N. (2005). PV92 Locus Alu: How to Track Human Migration Following This Gene Insertion. (Online) (Cited 28 March 2010) Available from http://www.associatedcontent.com/article/1452910/pv92_locus_alu_how_to_track_human_migration_pg2.html?cat=58 * Roux, C. (1974) Hardy-Weinberg Equilibria in random mating populations. Theoretical population biology. 5: 393- 416 * Smith, A. (2005). What is PV92? (Online) (Cited 28 March 2010) Available from http://www.fbr.org/swksweb/pv92.html * Wkipedia (2010). Hardy-Weinberg principle (Online) (Cited 28 March 2010) Available from http://en.wikipedia.org/wiki/Hardy%E2%80%93Weinberg_principle

Friday, October 25, 2019

Hawthornes Young Goodman Brown †The Theme :: Young Goodman Brown YGB

â€Å"Young Goodman Brown† – the Theme  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚        Ã‚   Clarice Swisher in â€Å"Nathaniel Hawthorne: a Biography† states: †When Hawthorne called his stories ‘romances,’ he meant that they belong within the romantic movement that . . . . emphasize imagination and personal freedom† (18). It is the purpose of this essay to interpret the theme of Nathaniel Hawthorne’s â€Å"Young Goodman Brown† and determine where this â€Å"personal freedom† leads.    Edmund Fuller and B. Jo Kinnick in â€Å"Stories Derived from New England Living† state: â€Å"’Young Goodman Brown’ uses the background of witchcraft to explore uncertainties of belief that trouble a man’s heart and mind† (31). It is on that one night of the year when witches have their coven in the deepest woods that the young husbandman, Goodman Brown, takes leave of his wife, Faith: â€Å"YOUNG GOODMAN BROWN came forth at sunset, into the street of Salem village, but put his head back, after crossing the threshold, to exchange a parting kiss with his young wife.† The reader receives a premonition of the impending evil intrigue with Faith’s staement of her foreboding, troublesome dreams:    "Dearest heart," whispered she, softly and rather sadly, when her lips were close to his ear, "pr'ythee, put off your journey until sunrise, and sleep in your own bed tonight. A lone woman is troubled with such dreams and such thoughts, that she's afeard of herself, sometimes. Pray, tarry with me this night, dear husband, of all nights in the year!"    Regarding the theme, the clues increase when Goodman, having left his wife, Faith, all alone and melancholy, enters the woods and encounters a sinister type with whom he has previously made an appointment for this particular evening:    As nearly as could be discerned, the second traveller . . . had an indescribable air of one who knew the world, and would not have felt abashed at the governor's dinner-table, or in King William's court, were it possible that his affairs should call him thither. But the only thing about him, that could be fixed upon as remarkable, was his staff, which bore the likeness of a great black snake, so curiously wrought, that it might almost be seen to twist and wriggle itself like a living serpent. This, of course, must have been an ocular deception, assisted by the uncertain light.    The evil nature of this individual is made manifest, and thus evil enters the story in a significant way.

Thursday, October 24, 2019

Althete Safety

No matter what age. Gender, or ethnicity sports are universal. Whether the sports are American or otherwise, anyone can play/do sports. Thousands of people sign up to play sports in this country every day. In America, sports are one of the top hobbies people do every day. There are so many sports; It is in fact difficult to choose a few among them. However each sport has Its own set of rules. Sports are more popular for teens nowadays but they are the top reason teens are getting injured these days.Rules used to be very minimal when sports were first rated, but as of today each sport has its own specific set of rules to follow by. At every sporting event It Is mandatory to have some type of medical team or medical kit with you at all times. Concussions are the biggest concern when it comes to injuries. Especially playing football, or boxing or other head to head sports. In each sport they make rules to try and prevent the cause of concussions. The rules in each sport nowadays are so advanced that they try so hard to push the Importance of how bad a concussion can be toward an athlete.A concussion could ruin a player's season, or even career. This doesn't happen to teen athletes. This could occur to those playing in the NIL (National Hockey League), the NFG (National Football League) and even boxing along with many other sports. Many people believe that the new set of rules and regulations set for each sport to try to protect athletes from being injured is unnecessary; while others believe that they're great and can definitely save people. Many people are all for the rules and regulations to protect the athletes.Most of the reason they have these rules and isolations Is to prevent lawsuits and of course concussions According to past experiences with teammates it should be a requirement for student athletes or any athlete for this matter to be provided with training in recognizing symptoms of certain medical issues such as; concussions, asthma, or other head and neck injuries. Being both healthy and safe will help you become a better athlete and obviously will help you stay safe of other injuries.Injuries at teenage levels can be taken very serious, even if it's Just a sprain or a pulled muscle. Stretching out each day when you aka up, before and after you work out will not only loosen up your muscles but it'll reduce the percentage of injuries. According to â€Å"USA Today† 1. 35 million youth athletes have a serious injury each year due to sports and not being healthy with your body. The top youth sports injuries occur with contact of the head or your ankles.The highest percentage rate of injuries Is your ankles at 15%. The second highest Is your head with 14%. Surprisingly enough the lowest percentage injury Is your knees at 9%. The most common sports for these types of Injuries to happen are in football and basketball. According to â€Å"USA Today' the number of people with concussions this past year at ages 19 and under is at 3 94,350 playing football. The number of concussions due to playing basketball is at 389,610 this past year.These Injuries are due to no safety training to these student athletes. By age the highest percentage rate for concussions is 47% at ages 12-15. The lowest percentage rate for concussions is at 5% for athletes 7 and under. Increasing. Athletes would rather focus on playing the game and getting ready to compete then focusing on their warm up and being provided with training. However, any Americans frequently utilize the healthcare system for treatment of injuries resulting from everyday activities such as sports.Whether the sports are for the school or an intramural the number of injuries is still pretty high due to the fact of not training the symptoms of injuries. Every year the percentage rate goes up because of the different rule changes. Many suffer from minor or even serious sports-related injuries. Throughout the years of sports so many rules have changed that the injury l evel on student athletes keeps changing. However, the number of injuries occurs a lot wrought bigger level sports, such as; the NFG, NIL and boxing or other head on sports.The sports don't have to be head on Just to injure yourself. You can play any sport and injure anything in your body if you use it the wrong way. The more you don't focus on training for the symptoms the easier it is to injure yourself. It could change your life in a negative way. Whether you train yourself or not for the symptoms of injuries there's still a possibility you can get injured. You can't prevent getting injured 100%, but if you trained yourself for the symptoms then you have a better chance to prevent injury.

Wednesday, October 23, 2019

The Ipremier Company

The iPremier Company: Denial of Service Attack 1. Company overview The iPremier is Web-based Commerce Company and established in 1996 by two founder students from Swarthmore College. The company is one of the top two retail businesses in online transaction which selling from vintage goods and to the luxury item. Its well knows that during fiscal year 2006, iPremier has grabbed profit $2. 1 millions with sales of $32 million from their high-end customer.The company has also recorded with growth by 20% annually for the last three years consecutive sales whereas back in late 1998, the company’s history of stock price had nearly tripled, especially when the euphoria of the 1999, which the market is rose to tripling, prices. Its mean the company has strong cash position. The most interesting strategic is flexibility return policies which to allow customer to thoroughly examine the products before deciding whether to keep them.2. Management and cultureThe management at the company is build-up from the mix of talented youngster who been loyal from l ong time period and experiences managers who had been gradually recruited as the company grew. The recruiter team has focused on well-educated technical background with knowhow in business environment especially business professionals with reputations for high performance. All employees will subject to quarterly performance appraisal that tied directly to the compensation. It’s competitive environments work, whereby unsuccessful managers will not last long.Company has standardized on its governing value in terms of discipline, professionalism, commitment to delivering results and partnership for achieving profits. iPremier orientation towards doing â€Å"whatever it takes† to get projects done on schedule, which is especially related with customer satisfaction orientation by providing benefit. It’s essential in company to develop the competitiveness environment in order to compete the MarketTop as major competitor. Therefore the R&D team should more creative to be advance by developing the related software require for the program to attract customer.3. iPremier IT Technical ArchitectureIn general, iPremier has engaged Q-data for collocation facility where Internet data’s will store in outsource system. The collocation facilities are sometime called â€Å"Internet Data Center† or simply â€Å"hosting facilities†. Q-data as partner will provide floor space, redundant power supplies, and high-speed connectivity to the Internet, environmental control and physical security. All these recognized as Network Operation Center for websites basis. Figure-1, shown the iPremier IT technical architecture system that include of â€Å"firewall† system to protect a local network and the computers that could be a feature of against unauthorized access. pic] Figure-1, iPremier IT Technical Architecture4. Case of Hacked January 12, 2007iPremier system has hacked by unknown intruder sending email in every second with message â€Å" ha† and locked the website that caused iPremier customer can’t access. It’s the first time iPremier through Q-data attack by unauthorized people. The chronology as follow: 04:30 am, as the approximately the first email received in Q-data mailbox system and continued in every second, that could said â€Å"ha.. ha.. ha.. a† from anonymous source. Leon Ledbetter as the new operation staff was suggested by Joanne Ripley, technical operation team leader, should report and make an emergency call to the iPremier new CIO, Bob Turley on which being away from the HQ and just arrived in New York to meet with Wall Street analysis. Bob Turley has give suggestion to check the emergency procedure in motion and make call operation staff in Q-data since he understood that iPremier has the right to get better service of monitoring 24/7. 4:39 am, the consolidation period to handle the case with few suggestion from other iPremier senior high level management such as seeking t he business operation standard (emergency procedure and business continuity plan), IT help desk, restarting the Web server, pull the plug (physically disconnect to the communication line) and approach on DoS system that it maybe potentially targeted by hacker. 05:27 am, restoration system period by trial and error approach on SYNCHRONIZEDSystem that related with the DoS system as the next step.There was something happened in SYN-ACT system which looks like â€Å"SYN flood† from multiple sites directed at the routers that runs the firewall services. SYN-ACT is the Web server communication whereas each conversation begins with a sequence of â€Å"handshake† interaction. The computer system will initiate to send information to synchronize in the web server. The contacted Web server responds with a synchronized acknowledge or â€Å"SYN-ACT† Theoretically, SYN flood is an attack on a Web server intended to make it think a very large number of â€Å"conversationsâ₠¬  that are being initiated in rapid succession.Because each interaction seems real traffic to the Web site whereas the Web server will automatically expands resources dealing with each one. By flooding the site, an attacker can effectively paralyze the Web server by trying to start too many conversations with it. 05:46 am, systems back to normal, the attack just stopped without any action to be done. It seems DoS denial of service attack. The Web site is running, and customer who visits iPremier website wouldn’t know anything since the hacked was stopped by own self.5. Answer the questionsQ-1: How well did this company perform during this attack? In general, iPremier seems not well prepare when hack has happened although the business operation standard i. e. emergency procedure and business continuity plan in ordered but misplaced due to in proper filing. There are few items highlighted from the case; o No crisis management strategy which means there is no emergency procedu re in motion being set for business continuity plan whereby the current business operation standard is not in proper binder and out of date from the current use of technology No disaster recovery plans in place o Too much reliance on outsourcing o Never practice incident response o External factor that indirectly affect to company Q-2: What should they have done differently, before or during the event? Before: o iPremier should have chosen a better Internet Hosting business with better firewalls (software and hardware) – be accessible 24/7, have their own technical support, keep logs of events, do regular system updates and backups. Standard Operating Procedures (SOP) in case of DoS attacks (as well as other technical problems), and have emergency response team ready to execute it as soon as possible. PR SOP for every crisis scenarios, and the PR team should have prepared statements ready within the first couple of hours o Engaged the help of external Tiger Team to test its s ystems and external audit company to do a security audit During the event: o Follow suggestion by Joanne Ripley to disconnect all production computers and rebuild from scratch.They have documentations for that, minimal risk of something going wrong o Attempts to place a spyware/malware inside the company’s systems through a thorough check on all files in the system o Release a prepared statement to all stakeholders. Information flow on the company’s effort to restore service to normal should be constant o Keep records of company’s effort to overcome the threats and find any other unusual activities in the systems, which will be useful for post-mortem o iPremier should alert and get help from relevant authorities o The aim of this effort is twofold; Firstly, to defeat the threats to the company’s systems as comprehensively as possible†¢ Secondly, to alert the authorities that the company is currently under attack by unknown attacker(s), and the compan y is not liable for any illegal activities that might have emanate from the company’s computers while the company is under attack Q-3: What should they do in the aftermath of the event? iPremier as virtual business company (Web-based Commerce) should do correction action plan with the following area; Provide accurate, reliable info about the status of the event o File-by-file examination:Evidence of missing dataBegin study of how ‘digital signature technology' might be used to assure that files on production computers were the same files initially installed thereRestart all production computer equipment sequentially without interrupting service to customersImplement secure shell access so that production computing equipment could be modified and managed from off sitePracticing simulated attack by nominated task force incident response teamDefine the security requirements for the system, and then begin a process of reworking its security architecture accordinglyGet infra structure up and running quickly by lease sophisticated firewall, upgrade and up-to-date OS as well as Security PolicyEstablish secure encrypted tunnel through Virtual Private Line Q-4: What, if anything, should they say to customers, investors, and the public about what has happen?In Information Technology and System business that ethic in information society is important which affect to the responsibility, accountability and liability of the company, especially where the Company has public registered. It’s therefore iPremier senior high level management has done the right action to disclose the incident to avoid panic investor, legal action and minimize the customer impact. 6. Conclusion Revisit and update the Standard Operation Plan and Business Continuity Plan as Company strategy to sustain in core business as Web-retailer provider o Regularly revisit and upgrade the server security system – hardware and software o Avoid dependency on single source provider for dat a storage and server security system o Providing proper and sufficient disk space for back-up data o Upgrade with the new security system.