Tuesday, August 25, 2020

Strengths And Weaknesses Of Ids Information Technology Essay

Qualities And Weaknesses Of Ids Information Technology Essay In spite of the fact that IDS is a valuable expansion to guarantee security, it excels on certain focuses, yet there are still a few impediments with it. Table 5.1 rundowns some the qualities and shortcomings of IDS. Qualities Shortcomings Observing client practices and framework occasion logs. Discovery yet not anticipation. Testing the framework configrutions of hosts. Bogus positive discoveries. Setting up pattern for the security condition of a framework, and following any progressions to that gauge. Bogus negative location. Ensuring against known dangers. Caricaturing assaults. Perceiving examples of movement that are unusual. Can't consequently examining assaults without human intercession. Incorporated administration. Deferrals of mark update. Making aware of suitable heads with proper methods. Simpler to perform security observing capacities for non-security specialists. Table 5.1: Strengths and Weaknesses of IDS. Observing client practices and framework occasion logs One of the qualities of IDS is that it gives capacity to screen the framework occasion logs of each host, which make heads to know when any progressions on the hosts. They can likewise use this data gathered by IDS to examine client practices, along these lines arranging the security procedure and approaches for their associations in like manner. Testing the framework configrutions of hosts IDS are likewise ready to test the security states for each host, when the framework is designed less than impressive or a pattern, it alarms to heads which host is set beneath a security level. Along these lines, chairmen can make further setups for that have. Setting up standard for the security condition of a framework, and following any progressions to that gauge With IDS, overseers can set up their own desire as a security benchmark. In view of that gauge, IDS continues following the distinctions and changes on the hosts, permitting chairmen to have all hosts in a similar security level they anticipate. Securing against known dangers The Signature identification methods make IDS to ensure frameworks and systems well against known dangers. It guarantees perceiving examples of framework occasions that contrast with the known dangers. Perceiving examples of action that are unusual When another assault doesn't exist in known danger marks, IDS has Anomaly recognition strategies for it. This strategy is acceptable at looking at framework exercises or system traffic against a standard to indentify strange practices, perceiving new assaults that Signature recognition methods miss. Brought together administration IDS gives an incorporated administration to overseers simpler to change logging components, perform programming redesign, gathering alert data and refreshing security setting and so on. Numerous IDS items even have an exceptionally straightforward menu to have the setup of IDS set up, which causes chairmen a great deal to screens a various of systems and hosts. Making aware of fitting directors with proper methods Based on sweep and match standard, IDS consistently send cautions to suitable individuals by proper methods. Managers can conclude who ought to get the alarms and characterize distinctive actuates they need to be cautioned. These fitting significance of messages to suitable individuals can be progressively powerful and productive to an association. Simpler to perform security checking capacities for non-security specialists Many IDS items currently as of now give essential data security strategies, in addition to simple design, permitting non-security master to perform security observing capacities for their associations too. This is likewise a quality that makes IDS to a triumph. Actually, there are a few shortcomings have been proposed as appeared in Table 5.1. Recognition however not avoidance IDS focus on location strategy but rather not counteraction, it is an inactive action. It is once in a while past the point where it is possible to distinguish an interruption, particularly now a few assaults are shipping quick on the current fast systems, when IDS sends a caution to managers, the genuine circumstance might be more terrible. Bogus positive discoveries The identification abilities of IDS can be characterized in four measures: True positive, False positive, True negative and False negative. Figure 5.3 represents the distinctions of them. Genuine positive demonstrates that the genuine assaults are recognized by IDS effectively; True negative shows that IDS is distinguished accurately that are not assaults; False positive demonstrates that IDS is distinguished mistakenly as obvious assaults however that are not genuine assaults; False negative shows that IDS is distinguished erroneously as not assaults however that are assaults. Figure 5.3: Measures of IDS IDS frequently create an excessive number of bogus positives, because of the erroneous suppositions. One model is searching for the length of URLs. Regularly, a URL is just around 500 bytes length, expecting that an IDS is arranged to trigger an alarm for refusal of administration assault when the length of a URL is surpass 1000 bytes. Bogus positive could be happened from some mind boggling site pages that are normal to store an enormous substance now. The IDS isn't committing error, the calculation is simply not great. So as to lessen False positives, overseers need to tune the suppositions of how to identify assaults in an IDS, however which is tedious. Bogus negative recognitions False negatives are likewise a shortcoming of IDS, programmers presently can encode an assault document to be unsearchable by IDS. For instance, cgi-canister/attack.cgi is characterized as a mark in an IDS, however the record is encoded to be cg%39-b%39n/a%39tt%39 by the programmers. While cg%39-b%39n/a%39tt%39 isn't characterized in the mark documents, the assault will go with no notification, at that point a False negative happens. Ridiculing assaults Hackers can use mocking assaults to daze the executives. For instance, programmers can utilize one of the IP in a system to make numerous False positive discoveries, chairmen may then set the IDS to disregard nearby traffic for this IP, after then programmers start the genuine assaults. Can't naturally researching assaults without human mediation Even IDS can recognize a large portion of the assaults in the hosts and systems, however it despite everything need managers to explore and perform response. Programmers can use this shortcoming of IDS to play out an assault, for example, a programmer can make a huge of assaults to have A, since IDS can't examine all the assaults naturally without anyone else, directors needs to invest energy to explore each alert from have A. In this way, the programmer may have more opportunity to make a genuine assault to have B. Postponements of mark update IDS depend on its mark database to distinguish a known interruption, IDS items ordinarily refreshing the mark database by the IDS merchants. The potential issue is the postponement of mark update fix, IDS merchants frequently set aside a long effort to distinguish another assault and finish an update fix. Be that as it may, even IDS sellers give the most update signature when they can. It is as yet a timeframe that the IDS can't distinguish another assault before refreshing the mark database.

Saturday, August 22, 2020

Enhancing Paracetamol with Silver Metal Ions

Upgrading Paracetamol with Silver Metal Ions 1-Introduction The paracetamol (Fig. 1) is one of the popular pain relieving drugs which is regularly named as N-acetyl-4-amino-phenol. Paracetamol has an antipyretic prescription with minimal toxicological symptom [1-7]. The fluorometry [8], iridescence [9], electrochemical [10], atomic attractive reverberation, mass spectroscopy [11] and fluid chromatography [12] are various investigations strategies used to assurance of paracetamol tranquilize in unadulterated and pharmaceutical styles. Paracetamol has a symptom as hepatotoxic in man and creatures in the event that it was taken with over portion [13-17]. In this in this examination paper, we planned to upgrade the proficiency of the medication within the sight of silver metal particles by development of new mind boggling. This complex was demonstrated utilizing spectroscopic and thermo gravimetric examinations. Fig. 1: Chemical structure paracetamol 2-Experimental 2-1-Materials Reagents (paracetamol and silver(I) nitrate) are in expository evaluation and utilized moving forward without any more decontamination. 2-2-Instrumentations The natural examination (%carbon, %hydrogen and %nitrogen) results were estimated utilizing CHN-2400 Perkin Elmer analyzer instrument. FT-IR spectra were examined on Bruker FT-IR spectrophotometer inside 4000-400 cm-1 locale. The UV-vis. spectra of reactants and silver(I) complex were checked utilizing Perkin-Elmer Lambda 4B spectrophotometer in dimethyl sulphoxide dissolvable. The thermo gravimetric examinations TG/DTG were completed in nitrogen climate utilizing Schimadzu TGA-50H warm analyzer. 2-3-Synthesis The 1 mmol of AgNO3 was broken down in 20 mL refined water and afterward blended to 20 mL of methanolic arrangement of paracetamol with 1 mmol proportion under attractive mixing. The pH of blend was killed at 7-8 utilizing weakened ammonium hydroxide arrangement. The blend was refluxed at 60 à ¯Ã¢â‚¬Å¡Ã‚ °C and left to vanish gradually at room temperature. The hasten was separated off, washy with hot methanol and dried at 60 à ¯Ã¢â‚¬Å¡Ã‚ °C. 2-3-Microbiological examination The natural movement of silver(I) complex was tried against microbes and growths with more than one test life form. The life forms utilized in the current examination including two microbes (B.subtilis Gram +ve), (E. coli Gram â€ve) and two organisms (Aspergillus niger and Aspergillus flarus). The consequences of microbiological examinations of bacterial and parasites against orchestrated silver(I) complex were appraisals. 3-Results and Discussion 3-1-Elementl examinations The exploratory information of %carbon, %hydrogen and %nitrogen are coordinated with the determined qualities (Table 1). The essential investigations results are bolster that NO3à ¯Ã¢â€š ¬Ã‚ ­ particles not recognized. The silver(I) complex is air stable with profoundly dissolving point > 300 oC. Table 1:Elemental investigations and physical consequences of Ag(I) complex [Ag2(para)] M.wt (g/mol) %C %H %N %M à ¯Ã¢ Ã¥' (à ¯Ã¢ 1. cm2.mol-1) Found Calcd. Found Calcd. Found Calcd. Found Calcd. 364.88 27.0 26.33 1.87 1.93 4.00 3.84 58.50 59.12 7.0 3-2-Molar conductivity The molar conductance estimation of the silver(I) complex of paracetamol tranquilize in DMSO dissolvable with centralization of 1.0010-3 M was seen as 7.00 à ¯Ã¢ Ã¥' (à ¯Ã¢ 1. cm2.mol-1) at 25 à ¯Ã¢â‚¬Å¡Ã‚ °C. This information proposed that silver(I) complex is non-electrolytes. 3-3-Infrared spectra The infrared assignments information of paracetamol free medication and its silver(I) complex are organized in Table 2 and silver(I) complex is appeared in Fig. 2. In view of the correlation between the infrared spectra of free paracetamol medicate ligand and its silver(I) complex, it has been talked about that, the assimilation band at 3300 cm-1 and 3200 cm-1 of free paracetamol have been doled out to â€OH and â€NH extending vibration movements. These groups have been nonappearance in the spectra of the silver(I) complex because of the contribution in complexation. The solid to-medium assimilation groups at 1650 and 1260 cm-1 in the range of para tranquilize are appointed to the extending vibration groups of à ¯Ã‚ Ã‚ ®(C=O) and à ¯Ã‚ Ã‚ ®(C-O), individually. These groups are moved to bring down wavenumbers at 1627 and 1100 cm-1 because of partaking in coordination mode. The nearness of new ingestion band at 510 cm-1 in silver(I) complex is doled out to à ¯Ã‚ Ã‚ ®(Ag - O) extending vibration. Upon the infrared otherworldly assignments, the silver(I) particles facilitated to para medicate through two spot of coordination (deprotonated of â€OH) and (deprotonated of â€NH and oxygen of carbonyl gathering) as appeared in Fig. 3. Fig. 2: FT-IR range of Ag(I) complex. Table 2: Infrared frequencies inside 4000-400 cm-1 of para and its Ag(I) complex. Compound à ¯Ã‚ Ã‚ ®(OH) + à ¯Ã‚ Ã‚ ®(NH) à ¯Ã‚ Ã‚ ®(C=O) à ¯Ã‚ Ã‚ ¤(CNH) amide gathering à ¯Ã‚ Ã‚ ®(C-O) phenyl gathering à ¯Ã‚ Ã‚ ®(M-O) para 3300, 3200 1650 1560 1260 [Ag2(para)] 1627 1550 1100 510 Fig. 3: Suggested structure of Ag(I) complex. 3-4-UV-vis. spectra The development of the Ag(I) complex was likewise affirmed by UV-vis. spectra in DMSO dissolvable inside the 200-600 nm run. It can see that free para has two ingestion groups at 300 and 390 nm due to à ¯Ã¢ Ã¢ °-à ¯Ã¢ Ã¢ °* intra-ligand change of the sweet-smelling ring and n-à ¯Ã¢ Ã¢ °* electronic progress, individually. 3-5-Thermo gravimetric examinations The warming rate was controlled at 10à ¯Ã¢â‚¬Å¡Ã‚ °C/min under nitrogen condition. The weight reduction was filtered from room temperature till 1000 à ¯Ã¢â‚¬Å¡Ã‚ °C. The thermo gravimetric bend of silver(I) complex is appeared in Fig. 4. The warm decay of [Ag2(para)] complex show at two stage. These means are happening at 200-1000 à ¯Ã¢â‚¬Å¡Ã‚ °C and comparing to the decay of para atom with a weight reduction of 11.4%. The last remaining item is silver metal debased with barely any carbon molecules. Fig. (3): TG/DTG bend of Ag(I) complex of paracetamol. 3-6-Microbiological examination Antibacterial and antifungal exercises of silver(I) paracetamol complex are evaluated against Escherichia coli (G â€ve), Bacillus subtilis (G +ve) and antifungal (Aspergillus niger and Aspergillus flavus). The antimicrobial movement filtered dependent on the size of restraint zone. Ag(I) complex is found to has high action against microbes and parasites. The information recorded in Table 3 and is appeared in Fig. 4. Table 3: Antimicrobial information of para complex Fig. 4: Statistical information of natural exercises of DMSO control and silver(I) complex References M.A. Jan Mens, Best Pract. Res. Clin. Rheumat. 19 (2005) 609. E. Dic, A. Ozdemir, D. Baleanu, Talanta 65 (2005) 36. A.B. Moreira, H.B.M. Oliveira, T.D.Z. Atvars, LL.T. Dias, G.O. Neto, E.A.G. Zagatto, L.T. Kubota, Anal. Chim. Acta 539 (2005) 257. B.B. Ivanova, J. Maxim. Struct. 738 (2005) 233. C. Xu, B. Li, Spectrochim. Acta A 60 (2004) 1861. L.G. Binev, Vassileva-Boyadjieva, Y.I. Binev, J. Maxim. Struct. 447 (1998) 235. A.M. MacConnachie, Intensive Crit. Care Nuts. 13 (1997) 238. J.L. Vilchez, R. Blance, R. Avidad, A. Navalon, J. Pharm. Biomed. 13 (1995) 119. D. Easwaramoorthy, Y. Yu, H. Huang, Anal. Chim. Acta 439 (2001) 95. H. Tanka, P.K. Dasgupta, J. Huang, J. Butt-centric. Chem 72 (2000) 4713. J.P. Shockcor, S.E. Wait, I.D. Wilson, Anal. Chem. 68 (1996) 4431. S. Murray, A.R. Boobis, J. Chromatogr. 33 (1991) 355. A.K. Singh, R. Negi, Y. Katre, S.P. Singh Journal of Molecular Catalysis A: Chemical 302 (2009) 36. L.F. Prescott, Paracetamol over measurements. Pharmacological thought and clinical administration. Medications, 25 (1983) 290. P.J. Harvison, F.P. Guengerich, Chem. Res. Toxicol 1 (1988) 47. L. Chavkin, H. Merkle. Us Patent (1979). F.J. Strenbenz, L. Weintraub, G.L. Cohen UK Patent. Application GB 2103 87A, 1983.

Tuesday, August 4, 2020

Ventria Bioscience ( Case) Example

Ventria Bioscience ( Case) Example Ventria Bioscience ( Case) â€" Essay Example > IntroductionVentria Bioscience is a company that deals with research in biotechnology. The company has been in existence since 1993. According to Deeter (2005), it was mainly established for the purpose of carrying out research on the rice. This was mainly for the purpose of improving its breed as well as ensuring that the nutrition is improved world wide. The company also carried out research on crops as the company contributed growing. Initially, the company specialized in adding traits to the crops so as to make them resistant to attacks by insects and diseases. The research was mainly done by experienced personnel in the field as all the personnel were qualified in the sector. The company then commercialized its operations using the techniques and the technology at its disposal. This worked well for the company and continued to grow and expand over the years. The management team then developed a second wave of research which was aimed at using the plants for medical purposes. Most people experienced some health problems after consuming some food crop. The plan was mainly to achieve the goals through genetic modification of the seeds (Altman, 2012). The report therefore discusses the issues surrounding the problems faced by the company in the quest to plant the pharmaceutical rice. Problems facing Scott Deteer and VentriaScott who is the CEO of Ventria faces a problem of approval by the authority to plant the pharmaceutical rice. The authorities are reluctant to give the company a go ahead due to the fact that some of the stakeholders have raised concerns regarding the pharmaceutical rice (Deeter (2005). This is despite the fact that the planting season is nearing and the company had not win the approval of the authorities. Despite the company coming up with plans of how to deal with the concerns raised by the stakeholders. The company therefore stands to loose a lot in terms of financial benefits if it does not embark on the project. This may lead to l osses for the company which may en d up being financially crippled. This is considering that the company had invested heavily on the research. It is also evident that the company may loose support of the clients as the company is already in crisis. The crisis may also erode the good public image of the company and hence making it less relevant in the sector (Sasson, 2006). Despite the fact that the intentions of the company were good, the public may end up misinterpreting it and hence causing a lot of damage to the company in terms of reputation. This issue therefore presents a major problem to Scott and the company as a whole. The company also depends on the capital venture for the purpose of its growth, development and operations. With the project on hold, the company may face a difficult time a head. This is also a problem and a great challenge for Scott who has to figure out a way of moving the company forward. The future of the company is also uncertain if the project does no t kick off unless Scott devises other means of ensuring the company beats the current challenge.

Saturday, May 23, 2020

Attribution Theory, By Fritz Heider Essay - 1714 Words

This paper acts in order to introduce and clarify Attribution Theory, in addition to demonstrating when it is purposeful and to what extent it is accurate. This will be accomplished through an explanation of the theory, which consists of its origins and key concepts. A communicative episode will be included to serve as an illustration, along with an analysis of the episode in order to explain the theory in motion. Lastly, its applications, assets, and liabilities are stated. Explanation of Theory In order to maximize the efficiency of processing new information, encounters, or experiences, what is seen is combined with past perceptions and notions to create an interpretation that acts as an explanation of what is not directly stated or known for one’s behavior.. Through this, appropriate action or conduct is formed or expressed. This process is known as Attribution Theory, primarily founded by Fritz Heider. The theory can be broken down into two important pieces, internal and external, each affecting the interpretation of one’s behavior. It is through these two paths in which individuals arrive to different conclusions despite the experience shared being the same. This is a The first of these distinctions is internal attribution, which â€Å"locates the cause of a particular behavior within the social actor† (Miller). Internal attributions are formed with interpretations or assumptions of one’s personality or traits. Since the formation of an inter nal attribution comes from aShow MoreRelatedFritz Heider : The Theory Of Attribution Theory1224 Words   |  5 Pagessecond component of social perception is attribution. Attribution is the process in which we attach meanings of other’s behaviors. Similarly, attribution theory refers to the study of models people implement in order to make judgments about the behavior of others. Fritz Heider, an Austrian psychologist whose work was related to the Gestalt school, published â€Å"The Psychology of Interpersonal Relations,† which expanded his creation of attribution theory. Heider initiated that â€Å"people are naà ¯ve psychologistsRead MoreAttribution Theory By Fritz Heider..according1600 Words   |  7 PagesAttribution Theory, attempts to explain causes of behavior. It attempts to explain the causes of people s behavior and attributing or explaining reasons as to why people behave the way they do Heider(1958). The theory was developed by Fritz Heider..According t o Heider (1958) a person can make two attributions; internal attribution, the inference that a person is behaving in a certain way because of something about the person, such as attitude, character or personality and external attribution,Read MoreThe Leading Body For Attribution Theory1502 Words   |  7 PagesThis essay will discuss the work of Fritz Heider (1958), the leading body for attribution theory and Harold Kelley (1972) and Bernard Weiner (1986), who along with many other psychologists have since attempted to further explain why and how we make attributions. Research to support and contradict their findings will also be covered throughout the text. The term attribution refers to how we as human beings attach meaning to our own, and other people s behaviour. It has been suggested by Fiske andRead MoreExplaining Human Behavior with the Attribution Theory in Fritz Heiders Book The Psychology of Interpersonal Relationships883 Words   |  4 Pagesspeak about the Attribution theory. Fritz Heider (1958), in his book The psychology of interpersonal relations, explained that through perception we know the world around us, a world made up of things and people and different events. Researching people’s naà ¯ve, intuitive understanding of interpersonal events. He explained that these common sense inferences sometimes are biased, but nonetheless mediate interpersonal relations. He presented also in his book the idea of attribution, which influencedRead MoreAttribution Theory: Examining External and Internal Attribution635 Words   |  3 PagesThe attribution theory is the theory on how people explain things. One of the best things about being human is being able to explain anything. A synonym of attribution is exclamation. We as humans have a strong need to understand things. If you can influence people and explain what is happening, you may be able to change them. Attribution Theory Attribution theory correlates with how people exemplify events and how it affects their behavior and thinking. People making casual explanations isRead MoreAn Evaluation of the View That; People Act as ‘Lay Scientists’ in Interpreting Their Social World, Perceiving and Analysing Information in an Objective, Rational Manner.1609 Words   |  7 Pagessocial interactions, they make inferences and assumptions about people’s behaviour and events that they encounter. This concept falls under the ‘attribution theory’ umbrella, which means; assigning cause to our own or other peoples behaviour. Fritz Heider (cited in Buchanan et al, 2007) was the first to propose a psychological theory of attribution. Heider discussed what he called â€Å"naà ¯ve† or â€Å"commonsense† psychology. In his view, people were like amateur scientists, trying to understand other people’sRead MorePerception Is The Organization, Identification And Interpretatio n Of Sensory Information1209 Words   |  5 Pagesconsidered a reliable tool to accompany the critical thinking process. The attribution theory says that when we observe behaviour we try to determine if it is internally or externally driven. If it is internally driven it is under the person’s control whereas external causes are not under the individual’s control. While people strive to find reason for behaviour, they fall into many traps of biases and errors. As Fritz Heider say, ‘our perception of causality are often distorted by our need and certainRead MoreResearch Report On Environmental Consequences1536 Words   |  7 Pagesa counteracting argument to this existing research and historiography, Fritz Heider, over a period of time, developed his Attribution Theory through the undertaking of social psychological research. The research of Heider attributed the behaviour of individuals to their disposition as human beings – effectively arguing that decisions taken were due to underlying lasting behaviours existing within a person. The work of Heider has significantly affecte d the process which has been undertaken by psychologistsRead MoreHow Does Attribution Affect A Person s Behaviour?1728 Words   |  7 Pages This study’s aim is to interview participants to determine if context or the situation will alter a person’s attributions towards a person’s behaviour. Five participants were tested on three behaviours occurring in six different environments. We predicted that they would look at the situation/environment initially before looking internally at the actor to determine whether their behaviour or normal or abnormal. It is proven that situations are more important than the behaviour when judging someone’sRead MoreEssay on The Departed† and Its Theories1694 Words   |  7 Pagesâ€Å"The Departed† and its theories The movies describes a major theme of â€Å"The Departed† as one of the oldest in drama—the concept of identity—and how it affects ones actions, emotions, self-assurance, and even dreams.† Many years later, an older Sullivan, now in his mid twenties, (Matt Damon) is finishing his training for the Massachusetts State Police with classmates, including fellow cadet Barrigan (James Badge Dale). In another class are Cadet Brown (Anthony Anderson) and Billy Costigan (Leonardo

Monday, May 11, 2020

Beyonce s Formation Anti Cop Or Pro Black - 965 Words

Beyoncà ©Ã¢â‚¬â„¢s â€Å"Formation†: Anti-Cop or Pro-Black? Speaking out against controversial issues, musically, is usually followed by harsh criticism, because it pushes the boundaries of artistic expression. In Beyoncà ©Ã¢â‚¬â„¢s song â€Å"Formation†, she opposes police brutality and racism, however many misconstrue her lyrics as being antipolice and ethnocentric. This may be Beyoncà ©Ã¢â‚¬â„¢s most controversial song yet. At the surface, Beyoncà ©Ã¢â‚¬â„¢s new video might seem like an attack on police, due to the sinking of the police car and seemingly anti-police imagery. I believe, however, that in her video she is instead advocating black pride while sending a self-empowering message. Following a surprise release on Saturday February 6th 2016, Beyoncà © shocked the world with her edgy and powerful music video made available for free download on Tidal. (Natalie, 2016) She then performed her new song during her guest performance at the Super Bowl Halftime Show. The video contained many elements such as the #blacklivesmatter movement, Martin Luther King reference, Katrina devastation of New Orleans, black empowerment, police brutality, unity, and the empowerment of women. I find it funny that people are attempting to make this righteous and powerful message into something negative. She is not attacking anyone. She is bringing attention to black lives in her message. In her video there are plenty of deep south references and images. There is a great deal of water flooding similar to a Lousisiana town or city.

Wednesday, May 6, 2020

Space design considerations for an architecture school Free Essays

And teaching staff in newly approved Institution / Program. Then it gives detailed time schedule for processing of applications . Page- 72 : It provides further information about Unapproved Institutions, detailed points to be carried out Action in case of violation of Regulations. We will write a custom essay sample on Space design considerations for an architecture school or any similar topic only for you Order Now It provides objectives , eligibility , processing fee and procedure for approval, conditions for approval regarding Collaboration Twining Program between Indian and Foreign Universities or Institutions in the field of Technical Education, Research and Training . Peg 73- 81 : It gives information about the program , duration and eligibility for students o be considered while giving admission to under graduate degree program, Post Graduate Degree and Post Graduate Diploma Programs (Full Time), Diploma Program, Post Diploma Programs . Page- 107 : It lists the approved Nomenclature of Courses of 400 courses taught under CACTI. It gives information in tabular form regarding the Norms for Intake Peggy-111 . Number of Courses / Divisions in the Technical Institutions of under graduate level, Post Graduate Degree and Post Graduate Diploma Level, Private Limited or Public Limited Company/laundry Establishing Diploma or UnderGraduate or Post Graduate Institute. Peg 12- : it describes the Norms for Land requirement and Building Space for Technical Institution , like the land requirement in acres in Other than Rural places(Competent Authority to certify that the place is not located in a rural area) and Rural Places as defined by Competent Authority. It gives detailed requirements of built-up area divided in 1 . Instructional area (NINA, carpet area in sq. M. ), Administrative area (DAD, carpet area in sq. M. ), Amenities area (AMA, carpet area in sq. 2. Circulation area (CIA) is equal to 0. 250 (NINA+DAD+AMA). M. ). , 3. Total built up area in sq. M. Is equal to (NINA+DAD+AMA) How to cite Space design considerations for an architecture school, Papers

Thursday, April 30, 2020

Pain Theories Essays - Pain, Acute Pain, Nociception,

Pain Theories Pain has been experienced by everyone regardless of age, gender or economic status. Pain is usually described as unfavorable experience that has a lasting emotional and disabling influence on the individual. Theories that explain and assist in understanding what pain is, how it originates and why we feel it are the Specificity theory, Pattern Theory and Gate theory. In this paper I will attempt to demonstrate my understanding of the theories and also will be critically analyzing the theories about the experience of pain by incorporating relevant concepts from literature and relating it to psychology. Pain has been described with a wide range of different words. McCaffery (cited in Adams and Bromley, p192, 1998 ) simply states that the experience of pain as being "what the experiencing person says it is, existing when he says it does". This definition by McCaffery strongly indicates that pain is conceived and experienced differently in an individualized manner .McCafferys's definition of pain suggests experiences of pain depends only on the person experiencing the pain and that no other person is fully capable to understand how he/she may be feeling as the result of pain. McCaffery does not actually state in his definition what pain is and what causes the discomfort, how and why pain arises(Adams and Bromley,1998). Bond (1984) describes pain as being a personal and unique experience which arises in the brain due to injury to the body tissue, disease or due to biochemical changes in our bodies. There are two main types of pain, acute and chronic. Acute pain is experienced for a short time and usually has a specific cause and purpose such as injury to body tissue (Adams and Bromley, 1998). Acute pain can be treated using drugs such as aspirin or other method of pain relieve. Chronic pain has no time limit therefore, can last for months and years, and serves no obvious biological purpose. Chronic pain can have a significant impact on the quality of person's life as chronic pain can trigger psychological as well as physical and emotional problems that leads to feelings of helplessness and hopelessness as most chronic pain can not be cured (Goleman and Gurin ,1993). Pain theories that I will discussing in this paper are specificity , pattern and gate control theory as these are the major theories that assist in explaining the concepts of pain . The modern perspective sees the concept of pain from a view that includes psychological factors but the earlier theories such as Specificity theory and Pattern theory were more focused on tissue damage as the cause of pain. The Specificity theory was originated in Greece .This theory was highlighted by Descartes in 1664 who expressed that the pain system as being like a "bell - ringing mechanism in a church"(Melzack and Wall , p196,1984) .Descartes (cited in Melzack and Wall ,1984) explained that when someone pulls the rope to ring the bell, the bell rings in the tower. Hence, specificity theory suggests that pain is caused by injury or damage to body tissue. The damaged nerve fibres in our bodies sends direct messages through the specific pain receptors and fibres to the pain center, the brain which causes the individual to feel pain (Adams and Bromley ,1998). This theory suggest that there is a strong link between pain and injury and that the severity of injury determines the amount of pain experienced by the person (Brannon and Feist , 2000). The Pattern theory was incorporated into the specificity theory which added more concepts to explain and extended its hypothesis of pain .The pattern theory states that nerve fibres that carry pain signals can also transmit messages of cold, warmth and pressure can also transfer pain if an injury or damage to body tissue occurs (Adams and Bromley,1998).The Pattern theory claims that pain is felt as a consequence to the amount of tissue damaged (McCance and Huether, 1990). Both Pattern theory and Specificity Theory are part of Linear model of pain which simply demonstrates that noxious stimulus such as tissue damage or injury results in the nerve tissues being stimulated which causes painful sensation which causes a response or painful behavior (Adams and Bromley, 1998). The Specificity theory and Pattern theory are not sufficient in explaining the experience of pain as the theorists fail to include any psychological aspects of pain. Adams and Bromley ,(1998) felt that the specificity theory does not see the individual difference in how pain is perceived by people. Brannon and Feist (2000) also emphasize that this particular theory declines to incorporate how