Need Help ?

Our Previous Samples

IntroductionIn his fantasy work, Bicentennial Man, Isaac Asimov invites the re ...

Introduction

In his fantasy work, Bicentennial Man, Isaac Asimov invites the reader to consider the philosophical ideal of what it means to be a human being. Asimov intertwines the impartiality of science and the irrationality of emotions by creating a “living” android character set in a “normal” family situation sometime in the future when robots can be purchased as Christmas presents.

Get original essay

A question is asked to make us think, but we feel we have the simplest answer to, “what makes us human?”. Truthfully, that is not the case proven in the book, Bicentennial man written by Isaac Asimov. Most would answer that what makes us human is our emotions, our thought process, and the way we look. According to Psychology Today, “One of the key characteristics that make us human appears to be that we can think about alternative futures and make deliberate choices accordingly.” Bicentennial Man proves all of this to be wrong. Andrew, the Bicentennial Man, shows emotion, looks like a human with human features and has his own thought process. How is this different from a human?

Bicentennial Man is a robot in a book written by Isaac Asimov. In Bicentennial Man, the setting takes place in San Francisco during the time of the mid-twenty-first century to the mid-twenty-third century. The structure of the book is a flashback; however, the book takes place in the future. Asimov is trying to predict what could happen in the future with robots and them wanting to become equal. The author is also trying to show how it feels like to be left out and when trying everything you can to be a part and you are still not accepted, it is a crushing feeling inside. The theme that is shown throughout the book is to challenge the reader to where the line is drawn inequality, as well as do they believe Andrew. This is shown when Andrew wants to be categorized as a human because he is able to do everything a human can, but he is denied. Other themes shown are the separation of mind and body, which is Andrew human enough and morality (Sakina). This creates ideas for the reader and an understanding to think about why and if Andrew should be considered human or not. The meaning of the title also closely relates to these themes. The meaning of the title of the book is the android, Andrew, achieves becoming as close to a human as possible on the two hundredth anniversary of his construction, where the World Congress declares him a Bicentennial Man. However, him becoming declared a Bicentennial man does not show a positive message. The message conveyed by the reader is self-loathing and how Andrew does not feel worthy of love, even after everything he does to try and declare himself human, his wish is still truly not fulfilled. Even though this is the message conveyed, the mood of the book is optimistic because Andrew has hope until the very end of trying to become a human and it shows in everything he does leading up until he decides it is time for him to go and starts slowly shutting himself down. The characters who do play a positive role in the book are the youngest Martin daughter, Andrew Martin, Richard Martin, and Portia Charney. The characters who play a negative role are Mechanical Man and Dennis Mansky who is the head of NorthAm Robotics. Sir, plays a huge role in the book having to do with Andrew’s humanity. He is the one who first guides Andrew on a path to being more than just a robot because Andrew had so much more to him than that. Little Miss also plays a unique role in the novel because she is the one who gave Andrew his name which adds a humanizing effect. Some literary devices used by Asimov in the book are euphemism and point of view. The point of view for the entire book does not change, it is seen through the eyes of Andrew the Android. This is to create, for the reader, an emotional attachment to Andrew. This emotional attachment is created for the purpose of the reader seeing Andrew’s whole life play out and how he has everything needed to become a human, yet the world keeps denying him of his goal. The whole book is written with euphemisms. Asimov downplayed the harsh information given the Andrew and showed how to some people, it was not a big deal to them that Andrew could not get declared a human because they believed he should not be.

To help understand the book a little more as well when reading it, you need to know Isaac’s Three Laws of Robotics. “1st law: A robot may not injure a human being or, through inaction, allow a human being to come to harm. 2nd law: A robot must obey orders given it by human beings except where such orders would conflict with the First Law. 3rd law: A robot must protect its existence as long as such protection does not conflict with the First or Second Law” (Sakina). The Robot is named Andrew and lives with the Martin family. Andrew was built and given certain parts in which how he would act. However, there was an accidental mishap in Andrew's positronic brain pathways such that he became very artistic and can learn on his own which is very uncommon and never happen before with the robots. When the doctors became aware of Andrews defect, they informed the Martin family that they could get rid of Andrew and get a new robot. However, Andrew was so close with the youngest daughter, Little Miss, so the Martin family opted to keep Andrew. Andrew also started to create beautiful artwork that would be worth a lot of money. The Martins started to sell Andrews art and give him half of the money they would make off the art piece. Andrew started to save up his money until he could finally upgrade himself. He then buys his freedom, buys himself organic parts to replace the old parts, writes on robot history, tries to gain legal rights for the robots, becomes a robobiologist and even starts to wear clothes. After achieving all of these tasks, Andrew feels he has the right to be declared a man instead of a robot because he acts more of a man. Sadly, he was turned down. After being denied such a request, he requests for his immortal body to start slowly draining. Andrew had jumped through so many hurdles to try and achieve being known as a “man” but humans felt that he did not have that right. Humans then became another hurdle for Andrew. The Martin children did not treat Andrew the way he should have been treated. An example is when they threw him out of their upstairs window for a laugh. This fall damaged Andrew quite a bit and there was nothing he could do about all of these torturing’s but take it. Since he acted as a human, he understood everything that was happening to him due to his advanced human development, but there was nothing he could do to help himself because in their eyes, he was just a robot. A shocking twist of events happen though and occurred that on Andrews 200th anniversary of being built, the president of the world declares Andrew the Bicentennial Man and signs off on it. This had amazed dying Andrew (Asimov). Andrew started off as a robot, having robot characteristics, following what his coding and his parts told him to do until an unexpected turn of events happen. Somehow there was an error in his coding in which he started to have human like characteristics and he started acting like a human. He showed emotions, was independent and had a stable, high functioning, working job. How was he any different from a human?

The story is told from the point of view of the android robot, Andrew. This causes the reader to, from the beginning, side with Andrew on his entire quest for finding humanity (Schutte). This is seen as odd due to most people would not side with a robot and their point of view, but since the beginning of the story, the reader is taken on a long trip of Andrew's life and his desires to become known as a human. Since the reader is viewing everything from Andrew's perspective, they can also view into his soul. It is not possible to deny something with a soul equal rights yet throughout the novel the society continuously does that. Since Andrew was presented with a soul, the readers feel they can sympathize with him. Also, at the end of the book, Andrew dies a “natural” death even though he is not considered human. How could a robot suffer a natural death and not be considered a human? Robots do not die natural deaths, they are either shut down or they break. Yet after all of this, Andrew is still only considered a Bicentennial Man. Asimov is sharing some insecurities of his own in this novel when he wrote an unintended insult about Andrew awaiting to hear if he was going to become declared human or not. Did Asimov write this novel and made himself the main character which is known as Andrew because this is where he is hiding all of his own insecurities? He disguised his emotions as a future robot. Maybe Asimov wrote this novel because he feels unwanted and he is showing it through Andrew and the actions of his writing. The text of the novel is also a philosophical text. A philosophical text is one in which when the main character has faced many setbacks throughout the novel. Andrew has faced many setbacks throughout this entire novel with the one thing on his mind, being declared a human. He feels he should have equal opportunity with humans because he can do everything they can do which was shown throughout the novel. This can relate to Asimov again because Asimov could have been at a point in his life where he was facing many setbacks and had to keep moving forward. I believe Asimov wrote this entire based on himself and how he had felt during this time of his life. I believe Andrew’s moment where he became known as Bicentennial Man was Asimov’s moment when he wrote and finished the book, Bicentennial Man. The main feeling Asimov had felt which drove him to write this book was the fact he did not feel human. Everything had added up in his life to make himself think, what truly does make one considered human? This is all shown through the android Andrew while he is searching for what could have him declared human and throughout the whole novel, he does so, facing many setbacks each time around. Maybe Asimov also does not feel human but does not know how to express it or show what makes one considered or declared a human. Even if Andrew meets the requirements they have to declare one human, he still is left an outsider. He is an outsider in his own community and will not be allowed into a community best fit for him. This is another example of how Asimov could be relating this back to himself, feeling left out, just like an outsider with nowhere to go. The destination he wants to go will not accept him and he feels lost, not knowing where to go or what to do. I believe that is how Asimov felt and that is why he is writing this book to help him in his stuck time of not feeling human and living it through Andrew.

Asimov is also trying to point out fears of people by not allowing Andrew to become declared a human. Many people fear robots are going to take over Earth and human life. There have been many movies, shows, and songs written about such a thing. Humans want to be known as superior and the best; once something tries to come into the way of that, they will do anything in their power to try and fight it. This leads back to Andrew wanting to become declared a human. Andrew's intentions of becoming human are not meant to be in a negative way. He wants to become declared a human because he has worked hard for everything he had accomplished and has every characteristic the same as the humans in the book, the only difference is he was built in a factory. Asimov is showing that the people fear if Andrew were to become declared a human, other robots who may contain a defect in the future, may want the same. If all robots came to the conclusion of wanting to be declared human, they contain more advanced abilities and technology than humans. They will then become superior over humans and humans do not want to lose their control over everything; they will have to become the slaves to the robots. Asimov showed at the beginning of the book how humans get robots to entertain and take care of their kids, do chores for them and in Andrew's case, they sold the artwork he had painted and kept a majority of the money for themselves. Asimov is trying to tap into people’s fears but not directly saying it in the book. By tapping into people’s fears, he would get an emotional reaction from the reader which causes the reader to read his book with more emotions. From the beginning of the book, Asimov is trying to get the readers emotionally attached to Andrew. That is why Asimov writes the book from Andrew's point of view, to create an emotional connection to Andrew. Asimov does this to show Andrew’s soul. A soul can show who someone or something truly is. A soul gives an insight into that person or robot. Once one knows a person’s soul, that is when it is determined if they contain good or bad intentions. Ever since the beginning of the book, Asimov shows Andrew with having good intentions. He does everything that is asked of him and even gets abused by children of the Martin family but still continues to have good intentions throughout the entire book, no matter what comes his way. Asimov also wrote this book around Christmas time; Andrew was a Christmas present to the Martin children. Christmas is known for the birth of Jesus Christ. Asimov wrote this book around Christmas time because it is shown as the birth of Andrew. The birth of Andrew is significant because it then shows how he helped many people in his life and how he grew significantly.

What many could argue about Andrew was that he was built in a lab and somehow there was an error to which caused him to start acting more like a human. But, humans are “built” in a way as well, just not in a lab. Humans grow inside their mother’s womb and are “built” by each of their parent’s Deoxyribonucleic acid (DNA). Andrew also showed emotions such as humans do and “grew up” to be very independent just like children do when they grow up to become adults. He got a job and became very successful just like humans do. This still questions on what truly makes us human. Andrew had all the “typical” human characteristics but still, they would not consider him a man due to him having been built a robot. A quote shared by Rupert Burns helps describe a characteristic as to what considers someone a human. “You see, Imperfection is the key. Imperfections make us individuals, that’s what makes us unique. See my nose, how it is all bulbous and pockmarked, well, I am the only one with my nose.” This is showing what makes you a human is your own unique characteristics that Andrew does not have. Andrew is built out of parts that every other robot is built with. Andrew should have been known as human. He has everything that considers one to be a human: characteristics such as sympathy and kindness. The real question is, why would the board not consider Andrew a human. Was it just because he was built in a factory as a robot? His defect allows him to have human-like characteristics and he accomplished so much yet still he was only considered a bicentennial man. How could it then be considered fair to treat Andrew they way people had even though he acted like them and had the same characteristics yet he was made of metal. No human in the story would have been treated the way Andrew was yet why was it ok to treat him like that with the only difference being he was made of metal? The answer to all of this was because the people did not want to consider him human because he was different. They were confused by something so new to them and they were not open-minded to the fact of letting in something new.

Get a custom paper now from our expert writers.

Get custom essay

Conclusion

In the end, what makes someone considered a human could be described in many different ways but proven wrong in the book Bicentennial Man. What people believe what makes you a human is your unique characteristics. Like Rupert Burns had said, Andrew had some of his own unique characteristics that no one else had. Andrew Martin was built from technological parts that every other robot was built from. Yes, he was unique in a way in which he had a more advanced thinking process and acted like the humans, but he did not look like them, he did not have anything unique to his appearance because he had looked just like all the other robots. That is why he was categorized into them and at first, was not declared a man. However, Asimov shows throughout the novel how this changes when Andrew buys himself all new parts to help give him human-like characteristics, but he still was not declared a human. Asimov shows all of this through the themes shown throughout the novel, the different emotions expressed, the novel being read by the reader through Andrew's point of view throughout the entire novel, and Asimov hiding his true life behind this fictional character. The Martin family got very lucky getting a robot-like Andrew, with all the characteristics that he acquired through his defect. They were able to humanize Andrew since the beginning of the novel, by having Little Miss give him his own name besides android, and by having Sir make it known to Andrew that he could be so much more than one of the ordinary robots that do chores all of their lives. Andrew is not considered human even though he feels emotions, has a soul, and a mind of his own, yet they still will not consider Andrew to be human. Asimov shows all of his details and hidden messages come together in the end by stringing together his theme, literary devices, the setting of the novel and the role each of the characters has to play in the novel. The point Asimov is trying to make about being human is what makes one human isn’t the emotions, the features, the self-thought process, it is feeling wanted. It is the feeling of being wanted and accepted is what declares or defines us, humans. Andrew was not wanted by everyone. He was not wanted in the way he should have been wanted. He was wanted in the way for slave labor but not for himself. This was what makes one human and this is what separated Andrew from everyone else.


READ MORE >>

Biddy is introduced early in Great Expectations and is mentioned regularly throu ...

Biddy is introduced early in Great Expectations and is mentioned regularly throughout, though she is not one of the major characters. She does, however, serve as a constant reminder to Pip of what he is leaving behind and, as she is more of a peer of Pips because of her intellect and age, she allows Pip an opportunity to articulate his thoughts more candidly and thoroughly at key points in the story. Dickens uses Biddy as a vehicle for many points made throughout the book and she largely represents the opposite of Estella and Pip in different ways. Biddy has a very aware tone when she is talking with Pip as though she understands and accepts all that will and has transpired (depending on which point of the novel is being examined) with an air of fatalism. Biddy is the sensible contrast to Pip’s immature idealism that is brought about by his infatuation with Estella and the upper class in general. Pip represents a very Romantic standpoint throughout much of the novel (until he comes to his ultimately Victorian realizations) and Biddy represents the pragmatic Victorianism. Ultimately, Dickens would not have been able to make as poignant of a point at the end of the novel if he did not have a character like Biddy—one who Pip recognized as intelligent, pretty, moral, and loving—slip through Pip’s fingers.

Get original essay

Pip’s realization that being a part of the upper class had no inherent value finally came after many years of neglecting the people who cared about him. Though Pip was a naturally kind hearted individual he was driven by an intense infatuation that began at an early age and was nurtured by false presumptions and convenient and misleading circumstances throughout the novel. There is no lack of evidence of Pip’s good nature, he helps Herbert Pocket by secretly buying him into a business, he ends up seeing the good in Magwitch and tries to help him as much as he can, and he seems to love everyone who loves him, but his Romantic ideals prevent him from being good to the people who love him and cause him to fall into a lifestyle in which he is not productive and enjoys wanton excess. It is strange to watch him change thus from his modest and moral beginnings and Biddy is a constant symbol of how Pip could have turned out had he not been influenced by Miss Havisham and Estella at such a young age. Pip’s kindhearted nature would never have been distorted with foolish dreams and fruitless infatuations if he had never left the forge to play at Satis House. He would have been happy to grow up among Joe and Biddy as a blacksmith, but in his first meeting with Estella he was made to judge himself through his comparison to her. John Stuart Mill could have written this allegorical scene as Pip for the first time in his life begins to question his own worth and the worth of his class because he was for the first time presented with something different.

As Biddy and Pip come to know each other more as they get older Biddy is obviously Pip’s antithesis in many ways. She remains humble because she was never introduced to the upper class and never proposed any “great expectations.” She seems to have been in love with Pip before he goes off to London, though she accepts the fact that Pip does not love her with a stoic calm. On a more reasonable level than Pip’s infatuation will allow him to fully realize he knows that he loves Biddy in a very sincere and rational way. He recognizes her worth and her virtues and he compares them to Estella’s meanness and coldness. He knows that biddy is the better choice of the two, but she is also a choice he can not allow himself to make. Pip thinks this very thing to himself while talking with Biddy out on the marshes as she prophetically watches ships sail by them. Biddy, being wise, knows that Pip is lost to her and that their figurative ship has sailed. By having the comparison between Biddy and Estella available Dickens has his protagonist not simply make a bad choice, but make a bad choice in the face of a perfect choice. He chooses infatuation over what could have been a deep and sincere loving relationship with Biddy.

Dickens uses Biddy to make Pip’s realizations upon his failure in and disillusionment of the upper class all the more powerful. Biddy is the salt in Pip’s wound, she is the ship that sailed from him. She plays a huge role in advancing the power of Dickens’ message against foolish idealistic dreams and impractical hopes. She is so admiringly simple and honest and pure while the high society that Pip chooses over her is so disappointing and, at times, cruel that when Pip realizes he has lost her and that he is not even worthy of her it amplifies the loneliness and sorrow experienced by the protagonist at the end of the novel. Biddy may not have taken up many pages in Great Expectations, but the story certainly would not have been the same without her.


READ MORE >>

Table of contentsAbstractIntroductionAdvanced Persistent Threat (APT) Progressio ...

Table of contents

  1. Abstract
  2. Introduction
  3. Advanced Persistent Threat (APT) Progression
  4. Most famous APT attacks in 21st century
  5. Why should you make use big Bigdata analytics in cyber security?
  6. Big Data Tools for Cybersecurity
  7. Conclusion

Abstract

In 2015 assault influencing the US Government's Office of Personnel Management has been ascribed to what’s being described as on-going cyberwar between China and the U.S. The most recent rounds of assaults have been alluded to utilizing a wide range of codenames, with Deep Panda being among the most common attribution. The attack on OPM in May 2015 was understood to have compromised over 4million US personnel records with fear that information pertaining to secret service staff may also have been stolen. And the FBI and various security experts concluded that it’s an advanced persistent threat (APT).

Get original essay

Executing an APT strike requires a bigger number of assets than a standard web application assault. The culprits are normally groups of experienced cybercriminals having considerable money related support. Some APT assaults are government-subsidized and utilized as digital fighting weapons. Traditional security systems may not be able to help to control or mitigate the issue. That’s where the Bigdata analytics comes in to the picture of information security providing the ability to correlate logging events based on time and user behavior across the entire spectrum of devices and technologies in an enterprise and many more dynamic insights and solutions to keep it secured.

Introduction

Cyber-attacks have pushed corporate fraud around the world to an all-time high, with information theft overwhelming the apportionment of physical resources out of the blue on record, as indicated by new information. Levels of reported fraud have gradually climbed since 2012, but 86 per cent of organizations around the globe revealed that they had encountered no less than one digital occurrence in 2017, as indicated by reactions given to Kroll's yearly worldwide misrepresentation and hazard study.

The reactions come as nervousness is high in meeting rooms about hacking following multiyear when the Wanna Cry digital assaults focused on a huge number of associations worldwide, disabling operations from the UK’s National Health Service to US delivery service FedEx. Even more as of late, the imperfections found in chips made by Intel, AMD and ARM, have raised fresh concerns that companies could be vulnerable to attacks. Information-related risks are now the greatest concern cited among executives who participated in the overview, as the experience of Equifax has honed minds and demonstrated that specialists are taking an increasingly robust response.

The US credit-reporting company now faces criminal and regulatory investigations on both sides of the Atlantic after a digital assault brought about the burglary of individual information of the same number of as 143m US citizens. The greater part the respondents to the review trusted that their organizations were "profoundly or somewhat vulnerable” to information theft; an ascent of six rate focuses on a year ago.

Advanced Persistent Threat (APT) Progression

A successful APT attack can be broken down into three stages:

  1. network infiltration,
  2. the expansion of the attacker’s presence and
  3. the extraction of amassed information—all without being identified.

Infiltration

Endeavors are regularly invaded through the bargaining of one of three assault surfaces: web resources, network resources or authorized human users. This is proficient either through malignant exchanges or social building attacks perils looked by considerable affiliations constantly. Additionally, infiltrators may all the while execute a DDoS assault against their objective. This serves both as a smoke screen to divert arrange work force and as a means of weakening a security perimeter, making it easier to breach.

When starting access has been accomplished, aggressors rapidly introduce an indirect access shell-malware that gifts network access and allows for remote, stealth operations. Secondary passages can likewise come as Trojans covered as genuine bits of programming.

Expansion

After the toehold is built up, aggressors move to widen their essence inside the system. This includes climbing an association's pecking order, trading off staff individuals with access to the touchiest information. In doing as such, they're ready to assemble basic business data, including product offering data, representative information and budgetary records. Contingent upon a definitive assault objective, the collected information can be sold to a contending undertaking, modified to disrupt an organization's product offering or used to bring down a whole organization. If harm is the thought process, this stage is utilized to inconspicuously pick up control of different basic capacities and control them in a succession to cause most extreme harm. For instance, aggressors could erase whole databases inside an organization and after that disturb arrange interchanges to delay the recuperation procedure.

Extraction

While an APT case is in progress, stolen data is normally put away in a safe area inside the system being attacked. When enough information has been gathered, the cheats need to separate it without being recognized. Normally, white noise tactics are utilized to divert your security group, so the data can be moved out surreptitiously. This may appear as a DDoS assault, again tying up network work force and potentially debilitating site protections to encourage extraction.

Most famous APT attacks in 21st century

Titan Rain (2003)

In 2003 malicious hackers situated in China started a progression of far-ranging cyber-attacks against U.S government focuses with the point of taking delicate state privileged insights and secrets, in a task nicknamed Titan Rain by U.S specialists (Thornburgh, 2005). The hackers' emphasis was on military information and included APT assaults on top of the line frameworks of organizations such as NASA and the FBI.

Sykipot Attacks (2006)

Sykipot cyber-attacks use vulnerabilities in Adobe Reader and Acrobat and are a part of a long-running set of cyber-attack crusades happened in a series pointed basically at U.S and U.K associations including resistance defense workers, broadcast and telecommunications organizations and government offices.

GhostNet (2009)

GhostNet is the name that analysts provided for an extensive scale cyber espionage task that was first came out in 2009. Completed in China, the assaults were fruitful in bargaining PCs in more than 100 distinct nations with an emphasis on penetrating network devices related with international embassies and government services.

Stuxnet Worm (2010)

Considered at an opportunity to be a standout amongst the most advanced bits of Malware ever identified, the Stuxnet Worm was utilized as a part of activities against Iran in 2010. Its intricacies showed that exclusive country state actors could have been engaged with its development and deployment. A key differential with Stuxnet is that, unlike most infections, the worm targets frameworks that are customarily not associated with the web for security reasons. It rather contaminates Windows machines by means of USB keys and afterward proliferates over the system, examining for Siemens Step7 programming on PCs controlling a PLC (programmable rationale controllers).

Deep Panda (2015)

A recently found APT attack influencing the US Government's Office of Personnel Management has been credited to what's being portrayed as on-going cyber war amongst China and the U. S (Jeremy, 2015). The most recent rounds of attacks have been referred to utilizing a wide range of codenames, with Deep Panda being among the most well-known attribution. The assault on OPM in May 2015 was comprehended to have bargained more than 4million US personnel records with expect that data relating to mystery benefit staff may likewise have been stolen.

Why should you make use big Bigdata analytics in cyber security?

Before, anything it’s good to understand how exactly the data analytics functions with available data sets.

The ever rise in the successful execution of digital attacks and its unwanted consequences and broad impacts demonstrate that the traditional cyber security instruments and practices are not ready to adapt to the complex danger scene because of the accompanying reasons

  • retaining a lot of information
  • analyzing unstructured information
  • managing expansive information distribution centers
  • responding progressively and
  • detecting Advanced Persistent Threats (APT).

To address these impediments, propose a development display for cybersecurity that energizes the fuse of enormous information apparatuses and advancements. There exist hundreds of such tools and technologies and are well-documented in the academic literature. A portion of the unmistakable enormous information instruments incorporate Hadoop, Spark, Storm, Flume, HBase, Hive, Kafka, Cassandra, and Mahout.

It has been proposed in that huge information instruments and innovations would change cybersecurity investigation by empowering associations to

  • collect a large amount of security-related heterogeneous data from diverse sources
  • perform deep security analytics at real-time and
  • provide a consolidated view of the security-related information.

The big data processing framework employed in the security analytic systems. The preparing structure gives the rules to handling the enormous information. In the reviewed papers, there are three frameworks used – Hadoop, Spark, and Storm. These frameworks are quite popular as evident from their use by well-known organizations such as Yahoo, Google, IBM, Facebook, and Amazon.

Big data analysis may be an appropriate approach for APT detection. A challenge in investigation APTs is that the huge quantity of data to sift through in search of anomalies. Data comes from ever-increasing range of numerous information sources that must be compelled to be audited. This huge volume of information makes the detection task appear as if finding out a needle in a very stack. Because of the amount of information, ancient network perimeter defense systems will become ineffective in police investigation targeted attacks and that they aren't scalable to the increasing size of organizational networks.

As a result, a brand-new approach is needed. Several enterprises collect information regarding users’ and hosts’ activities inside the organization’s network, as logged by firewalls, net proxies, domain controllers, intrusion detection systems, and VPN servers. Whereas this information is often used for compliance and rhetorical investigation, it additionally contains a wealth of knowledge regarding user behavior that holds promise for police investigation stealthy attacks.

Big Data Tools for Cybersecurity

Apache Spark

Apache Spark is a fast engine for data processing on a large scale. It is an open source cluster computing framework. Apache Spark can help cybersecurity officers analyze data and answer questions:

  • Which internal servers of the company are trying to connect to internationally based servers?
  • Has user‘s access pattern to internal resources changed over time?
  • Which users exhibit irregular patterns of behavior such as connecting using non-standard ports?

Spark powered big data discovery solutions can be used to detect anomalies and outliers within large datasets. Visualization techniques help when Large amounts of data i.e. petabytes of data is to be examined.

Fort scale

Services Fort scale is a big data solution against APT attacks. APT attacks can take place over a stretched period of time while the victim organization remains ignorant about the invasion. According to Fort scale, big data analysis is a appropriate approach for APT recognition.

  • A challenge in detecting APT is the massive amount of data to examine through in search of abnormalities.
  • The data comes from an ever-increasing number of miscellaneous information sources that have to be audited.
  • Fort scale uses Cloudera Hadoop distribution to address big data challenges and examine network traffic data to check for invasions if any.
  • Fort scale employs data science techniques like machine learning and statistical analysis to adapt to changes in the security environment.

IBM Security Radar

This tool uses big data capabilities to help keep pace with advanced threats and prevent attacks proactively. It uncovers hid connections inside huge amount of security information, utilizing examination to lessen billions of security occasions to a controllable arrangement of organized occurrences. It uses the following features of Big Data solution:

  • Real-time correlation and anomaly detection of security data, which is diverse in nature.
  • High-speed querying of security intelligence data.
  • Flexible big data analytics across structured as well as unstructured data – this includes security data, email, document and social media content, business process data; and other information.
  • Graphical front-end tool for visualizing as well as exploring big data.

Conclusion

Big data technologies are changing the whole world, everything from internet of things to gathering both more qualitative and more quantitative data will lead to better decision-making and insight. By utilizing enormous information innovations successfully, associations can be more proficient and more focused.

Privacy advocates and data organizers criticize the history of big data as they watch the growing ubiquity of data collection and increasingly tough uses of data enabled by powerful processors and boundless stockpiling. Scientists, business, and business visionaries firmly point to concrete or anticipated innovations that may be dependent on the default collection of large data sets. Also, the quick growth of the internet has bought with it an exponential increase in the type and frequency of cyber-attacks. Many well-known cyber security solutions are in place to counteract these attacks.

The huge argument today is how should privacy risks be weighed against big data rewards? Especially the recent controversy over leaked documents revealing the massive scope of data collection, analysis. Big data makes gigantic shot for the world economy in field of security, as well as in promoting and credit chance investigation to restorative research and developed arranging. In the meantime, the startling advantages of huge information are tempered by worried that advances of information biological community will turn over the power connections between government, business and people, and prompt racial or other profiling.

Get a custom paper now from our expert writers.

Get custom essay

Isolation over criminalization, and other bound adaptabilities. At long last: It is extremely essential to comprehend the security and protection suggestions coming about because of huge information executions supporting non-data security capacities. Specifically, security required executives should be aware of who Big data increases attack surface of hackers and understand how to protect against link ability threats.


READ MORE >>

With the advance growing of technology, expansion of research areas, deployment ...

With the advance growing of technology, expansion of research areas, deployment of different commercial and open sources GIS systems has lead out a massive collection of data stored in different debases. Nowadays, we generate about several trillion bytes of data every day, characterized by high dimensionality and large sample size and called Big Data or massive volumes of data. However, in today’s situation the data is mysterious, we have data rich but information poor.DM is the non-trivial process of identifying valid, novel, potentially useful and ultimately understandable patterns in data. Fayyad et al. (1996)

Get original essay

Spatial data mining in other way is a distinctive kind of data mining. The main distinction between data mining and spatial data mining is that, in spatial data mining tasks we use not only non-spatial attributes but also spatial attributes.It has been said that, the spatial data are special, and therefore treating or analyzing them needed special methods and techniques. This concept has appeared in different review papers and articles although few of them are against on this notion.Most of this review papers suggests that it is tremendous difficult task to mines interesting patterns in a geographical datasets compared to extracting them in traditional data, this is because geographical or spatial data is associated with complex spatial data types, spatial relationship, spatial heterogeneity, spatial autocorrelation, ecological Fallacy and Modifiable Areal Unit Problem (MAUP) In a such kind of situation, the adoption and effectiveness of traditional data mining techniques become thankless. In order to decide whether the spatial data are special or not, I suggest to spend our little time to have short tour to describe the term spatial analysis and then describe only two characteristics of spatial data.

Spatial analysis is special kind of methods with the aim of identifying or describing the pattern to identifying and understanding the process associated with that particular pattern. The results of Spatial analysis change when the locations of the objects being analyzed change. This is well explained by Tobler’s (1979) in his First law of Geography "everything is related to everything else, but near things are more related than distant things." The first law of geography is more emphasizing on spatial dependency or spatial autocorrelation which implies that the phenomenon on one location are more likely to repeat in a location near to it than its far away. Dealing with this kind of situation a very special techniques are needed First to compare the observed pattern in the data (e.g., locations in point pattern analysis, values at locations in spatial autocorrelation) to the one in which space is irrelevant (Anselin, 1989)

These datasets are scale dependent, query associated to extract information for this data set are more advanced and much complex as explained in . This oppose with the traditional statistics techniques which assume that observations are independent, and therefore in this sense these techniques cannot be implemented critically for the data showing spatial dependency behavior. Spatial data has another unique features called spatial heterogeneity which means that the behavior on relationship over space are not stable, they vary in different areas of the map. A realistic perspective on most spatial data has to assume that in general most spatial processes are nonstationary and anisotropic. Heterogeneity and nonstationary create additional problems in analysis, emphasizing the local nature of space/process interaction”.

In my point of view based on a number of readings, if we take an aerial sight on this reviews, there is no doubt that both of their arguments has one theme in common,” the tradition statistical technique cannot be applied on analyzing spatial data, the reasons behind this, is that; spatial data has a specific characteristic which make them to be more complex in developing a coherent and sturdy approach to spatial analysis based on traditional statistical techniques  .”Although in their review paper Marco Painho argue that “special nature of spatial data has lost and their fore spatial data has the same characteristics as a secondary data ”. But they were clear that, advance methods and technologies are needed to analyze these kind of datasets due to their unique features. Unique feature of spatial data is still emerged, the demands of GIS Science to perform advance analysis for accurate or error free become larger and complexity and need to understand spatial become a major reason for the need of GEOSPATIAL DATA MINING, as a central discipline to deal with modeling and analyzing spatial data.

List of References

  1. Anselin, L. (1989, 4 1). What is Special About Spatial Data? Alternative Perspectives on Spatial Data Analysis (89-4). Retrieved from https://escholarship.org/uc/item/3ph5k0d4: https://escholarship.org/uc/item/3ph5k0d4
  2. Mark Gahegan, H. M. (n.d.). Geospatial Data Mining and Knowledge Discovery. Retrieved from https://pdfs.semanticscholar.org/7e09/92a048952b4ee61b2993c4412b9db117ac97.pdf
  3. Painho M, B. F. (2005). ON THE PARTICULAR CHARACTERISTICS OF SPATIAL DATA AND ITS SIMILARITIES TO SECONDARY DATA USED IN DATA MINING. Retrieved from www.novaims.unl.pt: http://www.novaims.unl.pt/docentes/vlobo/Publicacoes/2_13_lobo05_secondary_data.pdf
  4. Ramón Giraldo, S. D.-N. (2018). Statistical modeling of spatial big data: An approach from a functional data analysis perspective. SCIENCE DIRECT, 1.
  5. Williamson, I. (2009, June). Is Spatial Special? Retrieved from [email protected]: http://www.csdila.unimelb.edu.au/publication/misc/is-spatial-Special-Ian-june09.pdf

READ MORE >>

Table of contentsIntroductionBilbo's JourneyNotion of HeroismBilbo Baggins in Co ...

Table of contents

  1. Introduction
  2. Bilbo's Journey
  3. Notion of Heroism
  4. Bilbo Baggins in Comparison to Harry Potter
  5. References

Introduction

The journey of a hero is an imperative part of any quest narrative. It shows not only the development of the character but allows the reader to feel part of the story. Within this essay I will be analyzing Bilbo Baggins journey as well as describe Bilbo in relation to an archetypal hero. Lastly I will be making a comparison between Bilbo Baggins and Harry Potter; what similarities and differences they may share.

Get original essay

The hero’s journey consists of 12 steps that the hero goes on; venturing between known and unknown worlds. I will briefly discuss the ways in which Bilbo Baggins experienced the hero’s journey below.

Bilbo's Journey

Step one is the ordinary world. Bilbo Baggins, who is a Hobbit, lives in a warm and comfortable home underground. Hobbits love a peaceful life, idling away and eating most of the time. Here he sits outside his Shire, smoking a pipe and enjoying the fresh morning air (Tolkien. 1996).

Step two is the call to adventure. Bilbo then meets the wizard, Gandalf, for the first time and is rather annoyed by the strangers visit, for he does not like unfamiliarity (Kuswidyasari. 2019:5-12). However; Gandalf identifies himself as an old family friend and that is when Gandalf invite Bilbo for an adventure; he feels Bilbo is the perfect candidate (Tolkien. 1996).

Step three is the refusal to the call. Bilbo detested the idea of adventures. So, when Gandalf asked him to participate in one, he politely refused but also invited him to tea the very next day (Tolkien. 1996).

Step four is meeting the mentor. The following day Bilbo opens his door to an extremely large party of Dwarves who made themselves comfortable in his home. Gandalf, who accompanied them, explains that they are on a quest to the Lonely Mountain to retrieve the stolen treasure from the wicked dragon Smaug. Bilbo would be given the name “Burglar” (Tolkien. 1996).

Step five is crossing the first threshold. Next morning Gandalf arrives and hurries Bilbo along to meet up with the Dwarves at the Green Dragon Inn (Tolkien. 1996). Bilbo leaves his comfortable burrow, leaves everything he holds dear and where he feels safe to travel into the unknown (Kuswidyasari. 2019:5-12).

Step six is tests, allies and enemies. Here Bilbo faced many challenges along the way. He encounters allies in Elrond at Rivendell, the Eagles, Beorn who gives them shelter and Gandalf of course who uses his magic from time to time. There were plenty of enemies namely, the Trolls who captured Bilbo, the Goblins who tortured them, and the Wargs who hated all Dwarves, Gollum the slimy creature and Smaug (Kuswidyasari. 2019:5-12). All of these tested and the Dwarves.

Step seven is the approach. Bilbo and the group eventually reached Lonely Mountain; once a place of glory (Tolkien. 1996). They decided to camp near the door in the center of the mountain (Kuswidyasari. 2019:5-12).

Step eight is the ordeal. Bilbo is the one who has to face Smaug so he approached Smaug and tried to talk to him however; Bard was the one to eventually kill the dragon.

Step nine is the reward. Bilbo is rewarded in many ways. He gets the elfin blade, “Sting.” He also settles the dispute between Thorin and the Lake Town people by giving away the Arkenstone. Bilbo gets one fourteenth of the treasure which has been promised to him too.

Step ten is the road back. Bilbo begins to travel home to Hobbiton. There is a conflict between the Dwarves and the Lake Men because they feel they need to be compensated for the part they played in the war.

Step eleven is the resurrection. The Battle of the Five Armies broke out. There was a war between the Goblins and the Wargs and their hated enemies the Dwarves, Elves and Men (Kuswidyasari. 2019:5-12).

The final step is return with elixir. Bilbo returns home with the magic ring and his share of the treasure. He buys gifts for his family and the ring helped him when he had unwanted guests (Kuswidyasari. 2019:5-12). Bilbo realized that the journey had changed him in ways he could not explain.

Notion of Heroism

I will speak about the notion of heroism and whether Bilbo Baggins identifies as an archetypal hero. There are various interpretations of what constitutes a hero. It is generally felt that a hero is one who faces danger or difficult situations with courage (Wiklander. 2011:4-15). In literature heroes are strong, brave and have the appeal of attractiveness both physical and emotional. In the fantasy world there are unforgettable heroes (Wiklander. 2011:4-15). For instance, Hercules is a hero who is known for his strength and courage.

If one should look at the traits of an archetypal hero they are as follows: “Unusual circumstances of birth, leaves family and lives with others, traumatic event leads to quest, has a special weapon and gets supernatural help (Wiklander. 2011:4-15).”

Bilbo is very different from the recognized ideas of a hero. He is small and fat, uncertain and does not participate in any spectacular acts (Wiklander. 2011:4-15). Nevertheless he is a hero. He completes a difficult quest, acquires a weapon, makes very brace decisions and is finally rewarded with wealth and fame.

When Bilbo accepts the terms offered by the Dwarves and joins them on the quest, he displayed heroism for it took great courage to leave home. Although warned about Beorn who was portrayed as cruel and impatient, Bilbo bravely joined him and they became good companions (Wiklander. 2011:4-15). By sparing Gollum’s life, Bilbo proved to be a man of compassion and one who hated violence. He was aware of the danger he but it did not deter him. Then, when he returned with his wealth and gave part of the treasure to the people in need (Wiklander. 2011:4-15).

While Bilbo did not slay dragons and defy death in any battles, he played a crucial part in every stage of the quest and proved to be a hero. Below I have chosen to focus on Harry Potter because I feel that both Bilbo and Harry share similar journeys. I will be now be comparing their similarities and differences.

Bilbo Baggins in Comparison to Harry Potter

Both characters are worried, nervous and without confidence. Harry because he is afraid that he won’t be chosen for Gryffindor, but is proved wrong and Bilbo who does not want to go on a dangerous adventure but he chose by Gandalf to do so. Each character acquires something with magical powers. Harry Potters gets a cloak which makes him invisible and Bilbo a ring with invisibility powers too. Both of these items help get each character out of tricky situations they may find themselves in.

Another similarity is that each has a magical mentor. Gandalf becomes the mentor to Bilbo and Dumbledore becomes the mentor to Harry (Fricka. 2019). Both of these characters grow in confidence, begin to accept responsibility and become braver at the end of it all. They realize that that although the journey was tough, it taught them valuable lessons.

In contrast to the above mentioned are the differences the characters share. One of the greater contrasts is that Harry has more support from his friends who encourage him and try to keep him out of trouble (Fricka. 2019). Bilbo, however, has no real close friend since that is the way Dwarves function (Fricka. 2019).

Another difference is that both characters have different experiences when facing dragons. Bilbo has to face his dragon alone knowing what danger awaited him, while Harry enters the trap door not aware or prepared for what was in store (Fricka. 2019). After each incident and test in Harry Potter and Bilbo Baggin’s journey, both the characters had immense internal growth.

Get a custom paper now from our expert writers.

Get custom essay

In conclusion, it is safe to say that Bilbo Baggins, while he may not have the physical appearance of a stereotypical hero, he is a hero nonetheless. His bravery and determination through the 12 steps proves that he was determined for greatness. It is evident that Bilbo and Harry share various similarities resulting in both characters coming out with a new outlook on life.

References

  1. Fricka. 2019. Harry, Bilbo and their rights of passage. [Online]. Available from: http://www.the-leaky-cauldron.org/features/essays/issue25/harryandbilbo/ [Accessed 20/10/2019]
  2. Kuswidyasari, R. 2019. The Hobbit: A Life-Changing Journey of Bilbo Baggins. [Online]. Available from: https://www.researchgate.net/publication/336638270_The_Hobbit_A_Life-Changing_Journey_of_Bilbo_Baggins [Accessed 20/10/2019] pg 5-12
  3. Reedsy. 2018. The Hero's Journey: an Author's Guide to Plotting. [Online]. Available from: https://blog.reedsy.com/heros-journey/ [Accessed 20/10/2019]
  4. Tolkien, J. 1996. The hobbit. London: Harper Collins. Pg 3-265
  5. Wiklander, C. 2011. The Image of Heroism in Tolkien’s The Hobbit. [Online]. Available from: https://gupea.ub.gu.se/bitstream/2077/25882/1/gupea_2077_25882_1.pdf [Accessed 20/10/2019] pg 4-15

READ MORE >>

Table of contentsWhat is drunkenness and its consequences?The fight against drun ...

Table of contents

  1. What is drunkenness and its consequences?
  2. The fight against drunkenness
  3. Bibliography

What is drunkenness and its consequences?

There are numerous health effects, both short and long term that can come about for both males and females with binge drinking. Binge drinking is considered to be not only deadly, as it is seen as a pattern of excessive alcohol use. Binge drinking is also costly, as it can contribute to health illnesses, injuries, and even death.

Get original essay

Binge drinking is defined by The National Institute on Alcohol Abuse and Alcoholism External as a pattern of drinking that elevates your BAC (blood alcohol concentration) to 0.08 grams percent or above. It is estimated that 90 percent of alcohol in the blood is ultimately broken down by your liver, with the remaining being passed through the kidneys and lungs. On average, the liver is limited in regards to how much alcohol can be broken down, which is one standard drink per hour. In regards to binge drinking, the issue comes about when you consume more alcohol than your liver can adequately process. When this happens, the blood alcohol content elevates, which will have an effect on the human body.

Though there are other factors that can contribute to the elevation of the blood alcohol content, such as your age, weight, and gender, the overall impact it has on your body is considered to be troubling. According to a study that was done by the CDC, it is estimated that nearly half of alcohol-related deaths are connected to acute intoxication. Acute intoxication is connected to binge drinking, as it’s produced by consuming a large amount of alcohol in a short period of time.

Acute intoxication is also known as alcohol poisoning. As previously mentioned, nearly half of all alcohol-related deaths are connected to acute intoxication, but there are other symptoms that one could experience before death, which includes a change in body temperature, shortness of breath, irrational thinking, and an increased heart rate.

There is also a connection between alcohol and suicide, as studies show that alcohol is often discovered in the system of those that committed suicide or attempted to. Not only could the consumption of large amounts of alcohol lead to danger for others outside of yourself, but it could also cause great damage to your immune system, as it threatens vital organs within the human body. With irritation of the organs, heavy alcohol consumption brings inflammation to the stomach, liver, and pancreas.

The heart is impacted as heavy drinking is associated with an irregular heartbeat and high blood pressure. It impacts the kidneys which could lead to dehydration and a cause of vital minerals becoming dangerously low, further putting you at risk for other health issues. Binge drinking has been shown to increase your chances of engaging in unprotected safe, which can lead to STIs. Alcohol increases your risk of developing numerous forms of cancer, which includes throat cancer, liver cancer, colon cancer, and rectum cancer,

A research study that was done by the University of California at San Francisco found that binge drinking sessions could cause symptoms of early-stage liver disease. Though more research would need to be done to validate the study, this is alarming to researchers, as it shows the long term effects that could come with heavy amounts of alcohol consumption. There are other long term effects that one should consider when binge drinking, as it is shown to have an impact on your bones and muscles, central nervous system, sexual health, and also your mental health, which are consequences that many are unequipped to handle.

There are multiple risky behaviors that are associated with binge drinking in young adults. Drunk driving is something that I would like to change, as it is a risk that could not only cause damage to yourself but also others as well. Drunk driving is more common amongst young adults, as studies show that every 51 minutes in America, someone is killed in a drunk driving crash. This risk of being involved in a driving-related accident is greater for young adults, as the CDC reports that drivers with a BAC level of 0.08% or higher were involved in fatal crashes where nearly three in 10 were considered to be young adults between the ages of 25 and 34.

The second largest group outside of 25-34, were 21 to 24-year-olds, as they made up 26% of fatal crashes. With the advancement of technology in 2019, there are a plethora of options that one could take to avoid driving drunk behind the wheel. I would also aim to change the behaviors of engaging in risky sex. The impact that alcohol has on cognitive processing could increase your chances of engaging in unsafe sex, which could lead to unplanned pregnancies and the spread of sexually transmitted infections. This is not only a risk for yourself but also to others, as such risky behaviors could cause significant harm to their physical and mental wellbeing,

The fight against drunkenness

The objective of this campaign is to bring awareness to binge drinking to young adults. Often, many are unaware of the negative impact that drinking could have on themselves and others, as they see the consumption of alcohol as a positive in social settings. By providing information, my goal is to significantly decrease the number of young adults that engage in drunk driving and risky sexual behavior. The plan is to also bring awareness to an issue that not only causes short term effects but also long term effects. There’s so much more life to experience and live; why not live it injury and disease-free? Not only can binge drinking ruin your chances of experiencing the best that life has to offer, but it could also ruin others.

The information for this campaign will be delivered in multiple ways to reach emerging adults. The Pew Research Center found that 90% of young adults actively use social media as of 2/7/2019, with YouTube and Facebook being the most popular. My plan is to use social media to bring this information to young adults about binge drinking and the impact it could have on not only their lives but the lives of others. Through video ads, humorous but informative memes, the message of this campaign will be disseminated.

Resources from the Chicago Department of Public Health goes beyond financial support, as connections to the multiple colleges and Universities throughout Chicago will be needed in order to spread the message to emerging adults. I believe the campaign would be stronger with the collaboration of the CDPH and the universities/colleges of Chicago. Grant opportunities, and access to reports, statistics, and data sets will be useful in giving us a greater understanding of how we should approach the dissemination of our message, in order to have successful results amongst emerging adults.

For this informational campaign to tackle binge drinking in young adults, I plan to partner with community colleges and universities in Chicago. Through this partnership, their social media platforms will be used to disseminate the message of the campaign. Alerts via email and text will also be sent out to students on both Friday and Saturday night, as a reminder to students on the dangers and risks of binge drinking. With assistance from colleges and universities, our marketing presence will be stronger and consistent in reaching students.

Positive feedback through social media will be monitored, along with surveys that will be given to students. This data will ultimately help us understand if the campaign is effectively working amongst our target group. We will also collect data from the colleges/universities in connection to the alcohol-related incidents that occurred on and off-campus with registered students before and after our campaign. I firmly believe that this data will give us a deeper understanding of our impact and success or failure. Students will also be followed up with on a consistent basis after the dissemination of our message to gauge the growth in their knowledge of binge drinking and the risks of it.

Bibliography

  1. College Alcoholism and Binge Drinking. (n.d.). Retrieved from https://www.alcoholrehabguide.org/resources/college-alcohol-abuse/.
  2. Corte, C. M., & Sommers, M. S. (2005). Alcohol and risky behaviors. Retrieved from https://www.ncbi.nlm.nih.gov/pubmed/16350769.
  3. Demographics of Social Media Users and Adoption in the United States. (2019, June 12). Retrieved from https://www.pewinternet.org/fact-sheet/social-media/.
  4. Lautieri, A. (n.d.). Signs of Alcoholism: Symptoms of Early, Chronic & End Stages. Retrieved from https://americanaddictioncenters.org/alcoholism-treatment/stages.
  5. Partnership News Service. (n.d.). Text Messages Can Help Reduce Young Adults' Binge Drinking. Retrieved from https://drugfree.org/learn/drug-and-alcohol-news/text-messages-can-help-reduce-young-adults-binge-drinking/.

READ MORE >>

It is joining together of DNA molecules from two different species that are inse ...

It is joining together of DNA molecules from two different species that are inserted into a host organism to produce new genetic combinations that are of value to science, medicine, agriculture, and industry. Since the focus of all genetics is the gene, the fundamental goal of laboratory geneticists is to isolate, characterize, and manipulate genes. Although it is relatively easy to isolate a sample of DNA from a collection of cells, finding a specific gene within this DNA sample can be compared to finding a needle in a haystack. Consider the fact that each human cell contains approximately 2 meters (6 feet) of DNA. Therefore, a small tissue sample will contain many kilometers of DNA. However, recombinant DNA technology has made it possible to isolate one gene or any other segment of DNA, enabling researchers to determine its nucleotide sequence, study its transcripts, mutate it in highly specific ways, and reinsert the modified sequence into a living organism.

Get original essay

Definition: A series of procedures that are used to join together (recombine) DNA segments. A recombinant DNA molecule is constructed from segments of two or more different DNA molecules. Under certain conditions, a recombinant DNA molecule can enter a cell and replicate there, either on its own or after it has been integrated into a chromosome.
Requirements to Produce rDNA:

  • I. Gene of interest, which is to be cloned.
  • II. Molecular scissors to cut out the gene of interest.
  • III. Molecular carrier or vector, on which gene of interest could be placed.
  • IV. The gene of interest along with the vector is then introduced into an expression system, as a result of which a specific product is made.

How to get a gene?

  • I. Isolate it from the chromosome;
  • II. Synthesize it chemically; and
  • III. Make it from mRNA.

Genes can be isolated from the chromosomes by cutting the chromosomes on the flanking sites of the gene using special enzymes known as restriction endonucleases. (2)

Basics Of rDNA: So What is rDNA?

Before we get to the "r" part of the DNA, we need to understand the DNA. All DNA is made up of the ribose sugar, nitrogen bases, and phosphate. There are four nitrogen bases adenine(A), thymine(T), guanine(G) and cytosine(C). These nitrogen bases are found in pairs, with A&T and G&C are paired together.

These bases can be arranged in an infinite way which gives rise to the formation of the famous "double helix" structure as shown in the figure:

The sugar used in DNA is deoxyribose (oxygen removed from the 2nd carbon of sugar). These all four bases are the same in all organisms but the variety of there arrangement and sequence in DNA leads toward diversity. DNA does not actually make the organism but makes the proteins. The DNA is then transcribed into mRNA and then it is translated into protein which forms the organism. By changing the sequence of DNA, the protein formed will also change. This results in either different protein or inactive protein.

Now we know that what DNA is. Recombinant DNA is combining two strands of different DNA. Thus, the name is the recombinant! which sometimes also called "chimera." By combining different strands of DNA, a scientist can create a different combination of DNA.

How Recombinant DNA is Made?

There are three different ways to make recombinant DNA:

1. Transformation;

2. Phage Introduction; and

3. Non-Bacterial Transformation.

Obtaining DNA:

Step 1: The DNA fragment containing the gene sequence to be cloned (also known as' insert') is isolated.

Step 2: Cutting DNA

Step 3: Joining DNA

Step 2: Insertion of these DNA fragments into a host cell using a "vector" (carrier DNA molecule)

Step 3: The rDNA molecules are generated when the vector self-replicates in the host cell.

Step 4: Transfer of the rDNA molecules into an appropriate host cell.

Step 5: Selection of the host cells carrying the rDNA molecule using a marker

Step 6: Replication of the cells carrying rDNA molecules to get a genetically identical cells population or clone.

The first step in making recombinant DNA is to isolate donor and vector DNA. The procedure used for obtaining vector DNA depends on the nature of the vector. Bacterial plasmids are commonly used vectors, and these plasmids must be purified away from the bacterial genomic DNA.

Ultracentrifugation:

A protocol for extracting plasmid DNA can be achieved by ultracentrifugation. Plasmid DNA forms a distinct band after ultracentrifugation in a cesium chloride density gradient containing ethidium bromide. The plasmid band is collected by punching a hole in the plastic centrifuge tube.

Alkaline Lysis:

Another protocol relies on the observation that, at a specific alkaline pH, bacterial genomic DNA denatures but plasmids do not. Subsequent neutralization precipitates the genomic DNA, but plasmids stay in solution. Phages such as ? also can be used as vectors for cloning DNA in bacterial systems. Phage DNA is isolated from a pure suspension of phages recovered from a phage lysate.

Cutting DNA

The restriction enzyme EcoRI cuts a circular DNA molecule bearing one target sequence, resulting in a linear molecule with single-stranded sticky ends.

Joining DNA: Insertion

A vector is any DNA molecule which is capable of multiplying inside the host to which our gene of interest is integrated for cloning. In this process restriction enzyme function as scissors for cutting the DNA molecules. Ligase enzyme is the joining enzyme that joins the vector DNA with the gene of interest. this will produce the recombinant DNA.

Definition:

It is a process for inserting foreign DNA into bacteria, could be used to reliably introduce DNA into bacteria.

Methods

1. Calcium chloride transformation:

In calcium chloride transformation, the cells are prepared by chilling cells in the presence of Ca2+ (in CaCl2 solution), making the cell become permeable to plasmid DNA. The cells are incubated on ice with the DNA, and then briefly heat-shocked (e.g., at 42 °C for 30–120 seconds). This method works very well for circular plasmid DNA. Non-commercial preparations should normally give 106 to 107 transformants per microgram of plasmid; a poor preparation will be about 104/µg or less, but a good preparation of competent cells can give up to ~108 colonies per microgram of the plasmid. Protocols, however, exist for making super-competent cells that may yield a transformation efficiency of over 109. The chemical method, however, usually does not work well for linear DNA, such as fragments of chromosomal DNA, probably because the cell's native exonuclease enzymes rapidly degrade linear DNA. In contrast, cells that are naturally competent are usually transformed more efficiently with linear DNA than with plasmid DNA.(4)

2. Electroporation:

Electroporation, or electropermeabilization, is a microbiology technique in which an electrical field is applied to cells in order to increase the permeability of the cell membrane, allowing chemicals, drugs, or DNA to be introduced into the cell.[1] In microbiology, the process of electroporation is often used to transform bacteria, yeast, or plant protoplasts by introducing new coding DNA. If bacteria and plasmids are mixed together, the plasmids can be transferred into the bacteria after electroporation, though depending on what is being transferred cell-penetrating peptides or CellSqueeze could also be used. Electroporation works by passing thousands of volts across a distance of one to two millimeters of suspended cells in an electroporation cuvette (1.0 – 1.5 kV, 250 – 750V/cm). Afterward, the cells have to be handled carefully until they have had a chance to divide, producing new cells that contain reproduced plasmids. This process is approximately ten times more effective than chemical transformation.

Selectable markers can be for antibiotic resistance, color changes, or any other characteristic which can distinguish transformed hosts from untransformed hosts. Different vectors have different properties to make them suitable for different applications. Some properties can include symmetrical cloning sites, size, and high copy number.

Antibiotic Selection

It is a technique in which transformed bacterial cells are plated on agar plates with different antibiotics, as a way to identify recombinant bacteria and non transformed cells. Procedure Transformed bacteria are plated on agar plates that contain an antibiotic-ampicillin or any other. Non-transformed bacteria cannot grow in the presence of ampicillin because they lack ampicillin plasmids containing an ampicillin resistance gene(ampR).

Disadvantage

Antibiotic selection alone does not distinguish transformed bacteria with a nonrecombinant plasmid that has recircularized from recombinant plasmids.

Blue-White Selection

It is a technique used to distinguish between recombinant bacteria and nonrecombinant bacteria(containing plasmid without foreign DNA). Procedure In this the agar plates also contain a chromogenic (color-producing)substrate for B-gal called X-gal (5-bromo-4-chloro-3-indolyl-BD-galactopyranoside).X-gal is similar to lactose in structure and turns blue when cleaved by B-gal. As a result, nonrecombinant bacteria -those that contain a plasmid that ligated back to itself without insert DNA-contain a functional LacZ gene, produce B-gal and turn blue. Conversely, recombinant bacteria are identified as white colonies. Because these cells contain the plasmid with foreign DNA inserted into the lacZ gene, B-gal is not produced, and these cells cannot metabolize X-gal. Therefore, through blue-white selection, nontransformed and nonrecombinant bacteria are selected against and white colonies are identified or selected for as the desired colonies containing recombinant plasmids.

Non-Bacterial Transformation

This process is very similar to transformation. The only difference is non-bacterial does not use bacteria such as E.Coli for the host. In microinjection, the DNA is directly injected into the nucleus of the cell being transformed. In biolistics, the host cells are bombarded with high-velocity microprojectiles, such as particles of gold or tungsten that have been coated with DNA.

Phage Introduction

Phage introduction is the process of transfection, which is equivalent to transformation, except a phage is used instead of bacteria. In vitro packagings of a vector is used. This uses lambda or MI3 phages to produce phage plaques which contain recombinants. The recombinants that are created can be identified by differences in the recombinants and non-recombinants using various selection methods. APPLICATIONS OF RECOMBINANT DNA TECHNOLOGYThe three important applications are (1) Applications in Crop Improvement;(2) Applications in Medicines; and (3) Industrial Applications.

I. Applications in Crop Improvement:

Genetic engineering has several potential applications in crop improvement, such as given below:

1. Distant Hybridization:

With the advancement of genetic engineering, it is now possible to transfer genes between distantly related species. The barriers of gene transfer between species or even genera have been overcome. The desirable genes can be transferred even from lower organisms to higher organisms through recombinant DNA technology.

2. Development of Transgenic Plants:

Genetically transformed plants which contain foreign genes are called transgenic plants. Resistance to diseases, insects and pests, herbicides, drought; metal toxicity tolerance; induction of male sterility for plant breeding purpose; and improvement of quality can be achieved through this recombinant DNA technology. BT-cotton, resistant to bollworms is a glaring example.

3. Development of Root Nodules in Cereal Crops:

Leguminous plants have root-nodules which contain nitrogen-fixing bacteria Rhizobium. This bacteria converts the free atmospheric nitrogen into nitrates in the root nodules. The bacterial genes responsible for this nitrogen fixation can be transferred now to cereal crops like wheat, rice, maize, barley etc. through the techniques of genetic engineering thus making these crops too capable of fixing atmospheric nitrogen.

4. Development of C4 Plants:

Improvement in yield can be achieved by improving the photosynthetic efficiency of crop plants. The photosynthetic rate can be increased by conversion of C3 plants into C4 plants, which can be achieved either through protoplasm fusion or recombinant DNA technology C4 plants have a higher potential rate of biomass production than C3 plants. Most C4 plants (sorghum, sugarcane, maize, some grasses) are grown in tropical and subtropical zones.

Applications in Medicines:

Biotechnology, especially genetic engineering plays an important role in the production of antibiotics, hormones, vaccines and interferon in the field of medicines.

1. Production of Antibiotics:

Penicillium and Streptomyces fungi are used for mass production of famous antibiotics penicillin and streptomycin. Genetically efficient strains of these fungi have been developed to greatly increase the yield of these antibiotics.

2. Production of Hormone Insulin:

Insulin, a hormone, used by diabetics, is usually extracted from the pancreas of cows and pigs. This insulin is slightly different in structure from human insulin. As a result, it leads to allergic reactions in about 5% of patients. Human gene for insulin production has been incorporated into bacterial DNA and such genetically engineered bacteria are used for large-scale production of insulin. This insulin does not cause allergy.

3. Production of Vaccines:

Vaccines are now produced by transfer of antigen-coding genes to disease-causing bacteria. Such antibodies provide protection against the infection by the same bacteria or virus.

4. Production of Interferon:

Interferons are virus-induced proteins produced by virus-infected cells. Interferon is antiviral in action and acts as the first line of defense against viruses causing serious infections, including breast cancer and lymph nodes malignancy. Natural interferon is produced in very small quality from human blood cells. It is thus very costly also. It is now possible to produce interferon by recombinant DNA technology at the much cheaper rate.

5. Production of Enzymes:

Some useful enzymes can also be produced by recombinant DNA technique. For instance, enzyme urokinase, which is used to dissolve blood clots, has been produced by genetically engineered microorganisms.

6. Gene Therapy:

Genetic engineering may one day enable the medical scientists to replace the defective genes responsible for hereditary diseases (e.g., hemophilia, phenylketonuria, alkaptonuria) with normal genes. This new system of therapy is called gene therapy.

7. A solution of Disputed Parentage:

Disputed cases of parentage can now be solved most accurately by recombinant technology than by blood tests.

8. Diagnosis of Disease:

Recombinant DNA technology has provided a broad range of tools to help physicians in the diagnosis of diseases. Most of these involve the construction of probes: short Segments of single-stranded DNA attached to a radioactive or fluorescent marker. Such probes are now used for identification of infectious agents, for instance, food poisoning Salmonella, Pus-forming Staphylococcus, hepatitis virus, HIV, etc. By testing the DNA of prospective genetic disorder carrier parents, their genotype can be determined and their chances of producing an afflicted child can be predicted.

9. Production of Transgenic Animals:

Animals which carry foreign genes are called transgenic animals.

Examples:

Cow, sheep, goat – therapeutic; human proteins in their milk. Fish like common carp, catfish, salmon, and goldfish contain human growth hormone (HGH).

Industrial Applications:

Get a custom paper now from our expert writers.

Get custom essay

In industries, recombinant DNA technology will help in the production of chemical compounds of commercial importance, improvement of existing fermentation processes and production of proteins from wastes. This can be achieved by developing more efficient strains of microorganisms. Specially developed microorganisms may be used even to clean up the pollutants. Thus, biotechnology, especially recombinant DNA technology has many useful applications in crop improvement, medicines, and industry.


READ MORE >>

Table of contentsIntroductionArjuna (Terminalia arjuna)Indian Gooseberry (Phylla ...

Table of contents

  1. Introduction
  2. Arjuna (Terminalia arjuna)Indian Gooseberry (Phyllanthus emblica)Asparagus (Asparagus racemosus)

Keywords: Medicinal plants, health benefits, bioactive components

Get original essay

Man uses medicinal plants in many ways to meet his basic need that is food, clothing and shelter since ancient times. As per World Health Organization (WHO) 80% of the world population still depend on medicinal plants. Medicinal plants have been utilized for a large number of years to flavour and preserve food, to treat wellbeing issue and to avoid illnesses including epidemics. Arjuna, amla, giloy, curry leaf, mulethi and aloe vera are used in all cultures around the world.These plants are rich source of bioactive components like phenols, flavonoids, triterpenoids, tannins etc. These bioactive components are rich source of functional foods. Recently medicinal plant based functional food becoming more popular among consumers due to constant health awareness, lesser side effects, availabiity and economic value. The medicinal plants based food may have antioxidant, antimicrobial, antiinflammatory, antidiabetic, anticarcinogenic, cadiotonic activities.

Introduction

Plants have also been used as medicines for thousands of years all over the world. Mostly developed countries still rely on plant based medicines for primary care WHO 1978. Globally, medicinal plants are being studied in order to develop new molecules for use in pharmacology, neutraceuticals, food supplements, folk medicines etc. A major traditional medicine which has been used as chemical compounds derived from medicinal plants (Amalraj & Gopi, 2017). Affirmation of the security, quality, and adequacy of therapeutic plants and natural products has now turned into a key issue in industrialized and in developing nations. Across the board utilization of home grown cures and healthcare preparations is depicted in the Vedas and the Bible (Shakya 2016).The information of their healing properties has been transmitted throughout the hundreds of years within and among human groups (Gupta et al., 2018). Therefore this chapter provides a review of major components present in whole grains and their role in maintenance of human health.

It has been reported that mostly plants have pharmacological effects because of metabolites. Plant-metabolites are organic compounds which can be classified into primary metabolites and secondary metabolites. Primary metabolites are organic compounds include glucose, starch, polysaccharide, protein, lipids and nucleic acid which are beneficial for growth and development of the human body. Plants synthesize secondary metabolites which include alkaloids, flavonoids, saponins, terpenoids, steroids, glycosides, tannins, volatile oils etc., The therapeutic efficacy of plants is because of these secondary metabolites for curing many diseases. Phytochemicals are pharmacologically active compounds. These include alkaloids have an antispasmodic, antimalarial, analgesic, diuretic activities; Terpenoids are known for their antiviral, anthelmintic, antibacterial, anticancer, antimalarial, anti-inflammatory properties; Glycosides are reported for antifungal and antibacterial properties; Phenols and flavonoids have an antioxidant, anti-allergic, antibacterial properties etc. and Saponin also known for anti-inflammatory, antiviral, plant defence activities etc.

Arjuna (Terminalia arjuna)

Combretaceae

The most common names of T. arjuna is Arjuna, Arjun (Hindi), Marudhu (Tamil and Malyalam), TellMaddi/Yella maddi (Telugu), Arjhan (Bengali), Sadaru (Marathi), Sadado/ Sadad (Gujrati), (Kannada) Neer Matti (Amalraj & Gopi, 2017).

Distribution

T. arjuna (Roxb.) Wt. and Arn. which is a deciduous and evergreen tree distributed throughout India including sub Indo-Himalayan tracts of Uttar Pradesh, Punjab, Deccan, South Bihar, Orissa,West Bengal and Madhya Pradesh mainly along riverside, rivulets and ponds and growing to a height of 20-30 m above ground level.

Botany

The tree is large about 60-80 feet in height, evergreen with a spreading crown and having drooping branches, new leaves appear in hot season (Feburary to April). Leaves of Arjuna are simple, often crenulations, borne subopposite, shortly acute or obtuse at the apex, coriaceous and oblong or elliptic. Their upper face is pale or dark green and the lower face is pale brown. The tree bears white sessile bisexual flowers in short auxiliary spikes or in a terminal panicle arrangement. Fruits of Arjuna are drupe, ovoid, fibrous-woody and smooth-skinned with five hard wings or angles which are oblique and curved upwards. Stem bark is simple, smooth and pinkish-gray in color in external view. An internal view, the bark is soft and reddish in color.

Bioactive Components

The chemical constituents of Arjuna present in root bark, stem bark, leaves, seeds and fruits. Root contains triterpenoids and glycosides, fruit contains triterpenoids and flavonoids, Leaves and seeds contain flavonoid and glycosides. But bark is considered most important constituent from medicinal point because it contains flavonoids, glycosides, polyphenols, tannins, triterpenoids, saponins, sterols and minerals such as calcium, magnesium, zinc, copper, amino acids also (Kapoor et al., 2014). Triterpenoids isolated from its bark are mainly arjunin, arjunetin, arjunic acid, arjugenin. Flavonoids mainly (arjunolone, flavones, bicalein, quercetin, kempferol and pelorgonidin) are detected from its bark.Various constituent of tannins are found in bark of T. arjuna. The constituent are Pyrocatechols, Punicallin, Castalagin, Casuariin, Punicalagin, Terchebulin, Terflavin C. Bark had 34% ash content consiting entirely of pure calcium carbonate. Aqueous extract of T. arjuna is reported to have 23% calcium salts and 16% tannins (Ramesh & Dhanraj, 2015) (Rasheed et al., 2013).

Health Benefits

Among various medicinal plants Terminalia species are known for their potential uses. Bark of Terminalia arjuna contains triterpenoids, tannins, phenolic acids, glycosides, antioxidants, magnesium, copper and zinc salts. Presence of these compounds plays an important role in curing cardiac diseases, cancer treatment, urinary tract infections, lung diseases and edema. In Ayurveda Arjuna bark powder is used as a cardio tonic, indigestion and bleeding disorders. Arjuna helps in maintaining the cholesterol level at the normal rate. In rural areas bark powder of Arjuna is used for snake bite and scorpion sting. Leaf juice of Arjuna is used to cure dysentery and ear ache. Regular therapy with Terminalia arjuna bark powder leads to significant regression endothelial abnormalities among smokers. T. arjuna based phytochemicals can be used on daily bases as tonic to maintain the healthy cardiovascular system because it is considered as one of the best heart tonic (Dwivedi, 2007) (Seth et al., 2013).

Nutritional Value

The bark of T. arjuna contains large amount of various minerals and trace elements such as magnesium (4000 mg/g), calcium (3133 mg/g), zinc (119 mg/g) and copper (19 mg/g). It contains some amino acids such as tryptophan, tyrosine, histidine and cysteine (Yadav et al., 2013).

Indian Gooseberry (Phyllanthus emblica)

Euphorbiaceae

The most common names of Indian gooseberry is Amalaka (Sanskrit), Adiphala (Hindi), Amla (Marathi), Amlaki (Bengali), Nelli (Tamil), Amalakam (Telugu), Ambala (Gujrati).

Distribution

Indian gooseberry is found through out tropical and subtropical India, Sri Lanka and Malaca. It is abundant in deciduous forests of Madhya Pradesh and Darjeeling, Sikkim and Kashmir. It is also widely cultivated.

Bioactive Components

Amla fruit contains a significant amount of vitamin C. Amla fruit is good source of cytokinin like substances identified as zeatin, zeatin riboside and zeatin nucleotide.

The seeds of Amla fruit yield brownish yellow 16% fixed oil. It also contains tannins like glucogallia, corilagin, chebulagic acid and 3,6-digalloyl glucose. Root of Amla fruit yields ellagic acid, lupeol, quercetin and ?- sitosterol (Thakur et al., 1989). The fruit is diuretic, laxative, carminative, stomachic, astringent, antidiarrhoeal, antihaemorrhagic and antianaemic.

Health Benefits

Indian gooseberry or emblic myrobalan is a medium sized tree the fruit of which is used in many Ayurvedic preparations since ancient time. It is useful in treating various diseases like haemorrhage, leucorrhaea, menorrhagia, diarrhoea and dysentery. It is reported that the combination of Amla and iron is useful for treating the various diseases like anaemia, jaundice and dyspepsia. Sanjivani pills are also available which is also made with other ingredients for use in typhoid, snake-bite and cholera. The green fruits are made into pickles and preserves to stimulate appetite. Seed is used for treating various diseases like asthma, bronchitis and biliousness. The combination of tender shoots of butter milk cures indigestion and diarrhoea. Leaves are also useful in conjunctivitis, inflammation, dyspepsia and dysentery. The bark has been used for various ailments including gonorrhoea, jaundice, diarrhoea and myalgia. The root bark is astringent and is useful in ulcerative stomatitis and gastrohelcosis. The anaemia, jaundice, heart complaints, and cold can be prevented by liquor fermented prepared from fruits of Indian gooseberry.

Nutritional Value

The fruit is a very rich source of Vitamin C (600mg/100g) and is used in preserves as a nutritive tonic in general weakness (Dey, 1980).

Moringa oleifera (Sohanjna)

Moringaceae

Distribution

The plant is widely disributed in western and sub- Himalayan tracts, India, Pakistan, Asia Minor, Africa and Arabia (Somali et al., 1984; Mughal et al., 1999) is now distributed in the Philippines, Cambodia, Central America, North and South America and the Caribbean Islands (Morton, 1991).

Botany

The tree ranges in height from 5 to 10 m (Morton, 1991). It is reported that it is found in wild and cultivated throughout the plains, especially in hedges and in house yards, thrives best under the tropical insular climate, and is plentiful near the sandy beds of rivers and streams (The Wealth of India, 1962; Qaiser, 1973). It can grow well in the humid tropics or hot dry lands, can survive destitute soils, and is little affected by drought (Morton, 1991). It tolerates a wide range of rainfall with minimum annual rainfall requirements estimated at 250 mm and maximum at over 3000 mm and a pH of 5.0–9.0 (Palada and Changl, 2003)(Anwar et al., 2007).

Bioactive Components

The whole gum extrudate contain L-rhamnose, galactose, glucuronic acid, and L- rhamnose, mannose and xylose. The stem bark also contain two alkaloids (moringine and moringinine), octacosanoic acid, Vanillin, ?- sitosterol, ?-sitistenone etc. (kerharo, 1969 & Faizi et al., 1994). Flower contains glucose, sucrose, some amno acids, ash, alkaloids, flavonoids etc. Moringa leaves contain flavonoids, phenolics, ascorbic acid and carotenoids. ?- sitosterol, calcium , iron, copper are also present. Leaves are source of protein and contain essential amino acids such as methionine, cystine, tryptophan and lysine and some vitamins also such as (vitamins A, B qand C, ?-tocopherol, riboflavin, nicotinic acid, folic acid, pyridoxine, ?-carotene etc. Seed oil contains fatty acids (oleic acids), sterols (campesterol, stigmasterol, ?- sitosterol, clerosterol) and Tocopherols (?-,?- & ?-) also.

Health Benefits

Various parts of this plant have been used in treatment of various diseases such as the leaves, roots, seed, bark, fruit, flowers and immature pods act as cardiac and circulatory stimulants, possess antitumor, antioxidant, antipyretic, antiinflammatory, antiulcer, diuretic, antihypertensive, cholesterol lowering, antidiabetic, hepatoprotective, antibacterial and antifungal activities.

Asparagus (Asparagus racemosus)

Liliaceae

The most common names of Asparagus is Satavari (Sanskrit), (Hindi), (Malyalam), Shatamuli (Bengali), Ammaikodi, Kilwari (Tamil), Kan: Aheruballi, Pilligadalu, Philithaga (Telugu), Manajolo (Orrissa).

Distribution

The plant is found wild in tropical and subtropical India including Andaman and Nicobar Islands. It is distributed from mean sea level upto 1500m in the Himalayas from Kashmir eastwards. The crop is cultivated in Kerala, Tamil Nadu, Andhra Predesh and northern states in India. However, most of the requirement of the industry is met through wild collections from forests. It is also grown in gardens. (Alok et al., 2013)

Botany

Satavari, Asparagus racemosus Willd. belongs to the lily family, Liliaceae. Asparagus adscendens Roxb., A. filicinus Lam., A. gonoclados Baker, A. officinalis Linn. and A. sarmentosus Willd. are the other important medicina l plant species of the genus. A. racemosus Willd. is an armed climbing undershrub with woody terete stems and recurved or rarely straight spines. The tuberous succulent roots are 30cm to 100cm or more in length, fascicled at the stem base, smooth tapering at both ends. Young stems are very delicate, brittle and smooth. Leaves are reduced to minute chaffy scales and spines; cladodes triquetrous, curved in tufts of 2-6. Flowers are white fragrant in simple or branched recemes 39on the naked nodes of the main shoots or in the axils of the thorns. Fruits are globular or obscurely 3-lobed, pulpy berries, on ripening purplish black in color; seeds with hard and brittle testa.

Bioactive Components

The major active constituents of Asparagus are steroidal saponins named as shatavarin I and shatavarin IV which are present in the roots. Shatavarins are the glycoside of sarsasapogenin which are generally occurring in two types of skeletons furostanols and spirostanols rhamnose. 8-methoxy-5,6,4’-trihydroxyisoflavone a new isoflavone was isolated by roots of A. racemosus by Saxena et al., 2000 (Aterya 1999).

Health Benefits

The phyto-estrogenic plant is used in Ayurveda because of its immuno-modulatory effects. It exhibit immuno-protective effect in chemotherapy. Ethanolic leaf extract shows anti-inflammatory effect18. It prevents diethylnitrosamine induced hepato-carcinogenesis2. The roots are used to treat inflammations, nephropathy, hepatopathy and tumours9. Asparagamine A, an alkaloid was isolated from root119. The roots extract has anti-oxidant activity60. Polysaccharides were found to be responsible to increase Natural Killer (NK) cell activity and thus also involved in rejuvenating immune system135 (Subramanyam and Immanuel 2016).

Nutritional Value

Get a custom paper now from our expert writers.

Get custom essay

It is reported that Asparagus roots contain protein 22%, fat 6.2%, Carbohydrate 3.2%, Vitamin B 0.36%, Vitamin C 0.04% and traces of Vitamin A (Joy et al., 1998).


READ MORE >>

Biochemistry or biological chemistry involves the study of components & comp ...

Biochemistry or biological chemistry involves the study of components & composition of living things along with the chemical processes. Biochemistry has been a key to our growing understanding of a myriad of health issues; from arteriosclerosis to cancer to diabetes. The tools of biochemists have identified the gene, protein and pathway disruptions that lead to disease and, in many cases, point us to preventions, treatments or cures.

Get original essay

By controlling information flow through biochemical signaling and the flow of chemical energy through metabolism, biochemical processes give rise to the complexity of life. Over the last 40 years, biochemistry has become so successful at explaining living processes that now almost all areas of the life sciences from botany to medicine are engaged in biochemical research.

Today, the main focus of pure biochemistry is in understanding how biological molecules give rise to the processes that occur within living cells, which in turn relates greatly to the study and understanding of whole organisms. Biochemistry is the study of chemical processes within and relating to living organisms. By controlling information flow through biochemical signaling and the flow of chemical energy through metabolism, biochemical processes give rise to the complexity of life.

Biochemistry is closely related to molecular biology, the study of the molecular mechanisms by which genetic information encoded in DNA is able to result in the processes of life. Depending on the exact definition of the terms used, molecular biology can be thought of as a branch of biochemistry, or biochemistry as a tool with which to investigate and study molecular biology.

Conference Series Ltd organizes biochemistry meetings to provide a platform for, Academicians, researchers, scientists, clinical research organizations, pharmaceutical companies as well as industrial leaders to participate and share their views.

Works Cited

  1. Alberts, B., Johnson, A., Lewis, J., Raff, M., Roberts, K., & Walter, P. (2014). Molecular biology of the cell. Garland Science.
  2. Berg, J. M., Tymoczko, J. L., & Stryer, L. (2002). Biochemistry. W H Freeman.
  3. Lehninger, A. L., Nelson, D. L., & Cox, M. M. (2012). Lehninger principles of biochemistry. WH Freeman.
  4. Lodish, H., Berk, A., Zipursky, S. L., Matsudaira, P., Baltimore, D., & Darnell, J. (2000). Molecular cell biology. WH Freeman.
  5. Nelson, D. L., & Cox, M. M. (2005). Principles of biochemistry. WH Freeman.
  6. Voet, D., & Voet, J. G. (2011). Biochemistry. John Wiley & Sons.
  7. Weil-Malherbe, H. (1963). Biochemistry and disease. Nature, 198(4873), 1213-1215.
  8. Williams, D. L. H. (2009). Biochemistry and molecular biology of parasites. Academic Press.
  9. Zanetta, J. P. (2018). Biochemistry and molecular biology of cancer. John Wiley & Sons.
  10. Ziegler, M. D., Fisher, C. K., & Smith, J. J. (2020). Biochemistry. Jones & Bartlett Learning.

READ MORE >>

Thousands of people lose their lives due to genetic inferiority. There are count ...

Thousands of people lose their lives due to genetic inferiority. There are countless life-threatening diseases and disorders that are contracted solely through heredity. It appears that there is nothing the afflicted can do to prevent this, as it is predetermined by their DNA. However, recent advances in biomedical sciences have given hope to those stricken by these genetic complications. Biologically engineered treatments for many insufferable inherited diseases have been identified. Along with biological self-improvement, certain genetic modifications could improve the lives of the poverty-stricken and starving as well. The production of biological engineered meat holds great promise in ending world hunger and saving additional lives. Though bioengineering is seen to be an immensely productive and life-saving scientific advancement, there are some who think the practice is immoral. This is untrue for several reasons. As a whole, bioengineering could vastly increase the lifespan of the afflicted and the malnourished, ultimately benefiting the entire human race. This makes bioengineering an ethical practice because it improves the lives of thousands in many different ways.

Get original essay

The most obvious improvement would be the production of biomedical treatments for genetic maladies. Infamous diseases that drastically devastate the human population can easily be treated, or even cured, as a result of further biomedical research. Such illnesses like cancer could be contained and Alzheimer’s Disease could be completely cured in time (Donahue & S. J., 2017). Going further, the regulation of bioengineering in medicine could heal those affected by painful neuromuscular disorders, such as Multiple Sclerosis and Parkinson’s Disease, as well as other biological complications that effect an individual’s day-to-day life such as Down Syndrome (Donahue, 2017). Even further, biomedical engineering could be used for spinal cord regeneration, granting a paraplegic the ability to walk (Donahue, 2017). It is evident that bioengineering is ethical because it improves the health and lives of so many otherwise hopeless individuals. The possibilities of bioengineering do not stop with the sick; biological modifications could end world hunger and livestock depletion as well.

Just as fatal genetic diseases hinder human survival, drastic malnourishment is an additional problem that effects the population, but on a much larger scale. Starvation is a worldwide problem that kills more humans than any inherited disorder ever could. Fortunately, world hunger could also effectively be solved with the regulation of biological and genetic engineering. Embryotic cells retrieved from preexisting livestock can be modified to produce genetically engineered meat that is safe for human consumption (Bartholet, 2017). Thus, the mass-production of biologically engineered foods could successfully tackle the immense problem of world hunger. This idea is not a theory or possibility; growing edible meat in a laboratory has already successfully been accomplished, making laboratory-grown meat a readily available solution (Bartholet, 2017). There are many more positive outcomes from genetically engineered food worth mentioning. Normalizing the consumption of laboratory-grown meat would also decrease the number of slaughtered livestock and the extinction rate for most species. The dependency on farm animals for high-protein foods is causing an unhealthy balance in the eco-system. With the global consumption of meat skyrocketing, an additional source of meat is needed. Abundantly-grown laboratory meat would solve both world hunger and animal endangerment and dependency (Bartholet, 2017). Though genetically engineered meat could greatly benefit the human and livestock population, there are opposers to the futuristic advancement.

Despite the copious amount of good bioengineering could do for the world, some question if the discovery is virtuous. Opposers to biological engineering and its many uses argue that it is nefarious or morally wrong to tamper with the genetic makeup of animals because it is disrupting fate and natural properties (Crichton, 2017). They also feel that there is still a lot bioengineering researchers do not yet know about these modifications, specifically the long-term effects of such biological progressions. Opposers claim that research should continue before we modify a human organ or allow people to eat unnaturally-grown foods (Crichton, 2017). These are valid assertions; however, it is apparent that bioengineering has more pros than cons. The only thing stopping the widespread use of genetic engineering is the beliefs of those with strong moral principles, and that is simply unfair. The option to genetically modify oneself or to consume laboratory meat should be offered to those who desperately need it. The only way to determine if it will benefit the human race in the long run is to allow experimentation, which appears promising. So far, biological engineering is a scientific advancement that has proven to generate more good than bad.

There is no doubt that bioengineering is ethical because it could potentially improve the health and lives of so many innocent human beings and more. Variations of biological engineering, both in medicine and in meat labs, may be the only solution to preventing the illnesses and deaths of so many. It can heal the sick, feed the starving, and save the environment. Though there are some that deem it unethical because of personal opinions, it is clear that bioengineering is in fact ethical because it has the capability to benefit more lives than it could possibly harm.


READ MORE >>
WhatsApp