Friday, January 31, 2020

Chromatography Experiment Essay Example for Free

Chromatography Experiment Essay Aim: To identify different unknown amino acids, within given substances. Apparatus: List 1 List 2 * 2 test tubes * Test tube rack * 2 bungs * 2 pins * 5 known amino acids: * Proline * Leucine * Lycine * Asparagine * Arginine * 1 unknown amino acid * Paper Chromatography * Paper Solvent * Pencil * Ruler * Tweezers * Paper Towel * Pipette * Ninhydrin * Incubator * Scissors * 1 Jam Jar * Treated Orange Juice * Untreated Orange Juice * TLC * TLC Solvent * Pencil * Ruler * Tweezers * Pipette * Paper Towel * Ninhydrin * Incubator Diagram 1: Diagram 2: Method (Part 1): * Cut 2 strips of paper chromatography using tweezers and scissors while resting on paper towel * Measure 1cm from bottom of strip and draw a line across * Draw a cross in the centre of this line * Attach a pin to the top of the chromatography paper, and put pin in bung * Place inside test tube, and measure 5mm from where the bottom of the paper lies, draw a line across the test tube * Do the same with both strips * On the cross put 10 drops of a known amino acid, wait for each drop to dry in between * On other strip put 10 drops of unknown amino acid * Pour paper solvent into both test tubes up to line drawn * Put bung in both test tubes, let solvent work its way up chromatography paper * When near top of paper, take out, and draw line across where solvent has reached. Method (Part 2): * Place TLC on paper towel, draw line across at 1cm from bottom * Draw 2 crosses each 1/4 way across line * On 1st cross put 10 drops of treated orange juice, letting each drop dry in between * On second dot put 10 drops of untreated orange juice * Pour TLC solvent into bottom of jam jar * Using tweezers place TLC into jam jar * Let TLC soak up solvent * When nearly at top take out and draw solvent line across Method (Part 3): * Take the results of method part 1 and 2 and spray all with ninhydrin spray * Place in incubator until amino acids can be seen * Draw lines across where colours end, and work out Rf values for all lines Results Chromatograms: Results Table: Rf value = distance moved by solvent / distance moved by solvent front My Results Solvent Front Substance Front Rf value Treated Orange 4.6 1.8, 2.8, 3.3 0.39, 0.61, 0.72 Untreated Orange 4.7 0.5, 2.0, 2.6, 3.0 0.11, 0.43, 0.55, 0.64 Leucine 7.9 4.7 0.59 Unknown 7.0 4.2, 4.8 0.60, 0.69 Class Results Calculated Rf value Average Actual Rf Proline 0.76 0.87 0.82 0.48 Leucine 0.79 0.59 0.69 0.73 Lycine 0.41 0.45 0.43 0.14 Asparagine 0.26 0.54 0.40 Arginine 0.53 0.53 0.2 Conclusion and Evaluation: From these results I can say that in the unknown substance, were two amino acids, and from what my results tell me, I can predict that they were Arginine and Leucine. The Treated orange juice appeared to have three amino acids in it, my results tell me that these are Asparagine, Arginine and Leucine. The untreated Orange Juice seemed to have four unknown amino acids, my results tell me that these were Asparagine, Lycine, Arginine and Leucine. I could tell this as I matched up the Rf values with the ones that seemed to be the closest match. I know that these results were not that accurate as I know the Rf values for four of them. For Proline the real Rf value is 0.48, but our class results got 0.76 and 0.87 with an average of 0.82. This is clearly wrong. Therefore anything that I have predicted to have Proline in, might not have it in. For Leucine the real Rf value is 0.73, and our class results are 0.79 and 0.59 with an average of 0.69. This is a very close result, so it is quite accurate. So it is likely that if I have predicted it to have Leucine in it, it probably does. For Lycine the real Rf value is 0.14, and our class values are 0.41 and 0.45, with and average of 0.43. This is not a very good match. From this I can tell that anything I have said to have Lycine in it, probably does not have it in. For Arginine the real Rf value is 0.2, and we only have one class result for that and it is 0.53 which is clearly wrong. This shows us that anything I have predicted to have Arginine in, probably wont. For Asparagine, we are not sure of the real Rf value, so I can not tell if our results are right, but guessing from the rest not being accurate, it probably is not. Saying this, not only could our results from the known amino acids be wrong, but also so could our results from the unknown amino acids, and the treated and untreated Orange Juice. This tells me that our results could have been wrong on both accounts, and so could possibly be right! We can not be sure, but we do know that the results for the known amino acids were not as accurate as they should have been. These errors could be down to a number of things. Firstly if we had touched the paper chromatography or TLC at any time we would have left our own amino acids on it, and so our experiment would have been inaccurate. It was very hard not to touch either of these while cutting, or moving to place in test tubes or in jars. It could have been very easy to accidentally touch it, thus messing up the experiment. Another way these errors could have occurred could have been down to making the amino acid drop too big, due to not waiting until it is dry enough to put another drop on. This would have meant that when put in the solvent, the dot would have been emerged in it, and made our results inaccurate. Another way an error could have occurred could be not making the dots as concentrated as they should have been, not counting enough drops of the amino acid onto the paper or TLC. This would have changed our results. Another way would be if when put in the solvent the test tube or jar moved, and splashed the paper or TLC, making the solvent front longer then it should have been, so our calculations would be inaccurate. Another way could be putting too much TLC or Paper solvent into the jar or test tube, thus emerging the dot, making more inaccuracies. If the paper chromatography had been touching the side of the test tube while the solvent was working its way up, then this would have made our results inaccurate as well. All of these errors would make our results inaccurate and less reliable. One way of making our results more accurate would be to get rid of all these errors, which is very difficult as there are so many errors that could be made during this experiment. If I were to do this experiment again, I would start by wearing some rubber gloves, so that if I did touch the paper it would not matter as much. The second thing I would change would to be more accurate when putting the dots on the paper or TLC, making sure that they are dry properly, and that they do not spread too far. Another improvement I would make would be to make sure the paper was not touching the side of the tube, to not move the tube once the paper is in, and to make sure I draw my lines as accurate as I can. Also when I measure them, I will be more precise so that my results will be a lot more accurate then they were this time round.

Thursday, January 23, 2020

Internet Essay - Online Anonymity and Cyberspace Crime -- Exploratory

Online Anonymity and Cyberspace Crime The 90's internet boom gave rise to new ways of writing in through access to cyberspace. What used to be printed or handwritten on physical surfaces such as paper, cardboard, or bulletin boards has changed to 0's and 1's, bits and bytes of digitized information that can be displayed thru the projections of computer screens. Moreover, the internet has made the process of publishing one's works, writing letters, or chatting with one another much easier and convenient for everyone around the globe. The internet became a universal tool, giving much freedom and flexibility to the users; it gave them opportunity to deliver their thoughts with little or no restrictions. Since it's impossible to regulate all cyber-activities, internet users are often unrestricted by the normal laws or authorities that would set boundaries around the various online transactions. More importantly, the fact that a net user can take on different identities in cyberspace brings about several ethical and social is sues. These anonymous and unrestrictive characteristics of cyberspace often permite abusive users to easily involve themselves in serious cybercrimes such as cyberstalking, cyber-rape, and cyber-harassment through chatting services, emails, cyber communities, and other online communication. In the real world, most encounters in everyone's daily lives are anonymous ones. Chatting with a person beside you in a cafà © or talking to an assistant while shopping for a pair of pants- these are interactions between two unknown persons; however, these contacts do not affect our lives the way some of the anonymous interactions in the cyberspace does so. Chat rooms, net forums, and even the spam mails most people get u... ...sity. 10 Apr. 2004 . Diener, E., Fraser, S.C., Beaman, A. L. & Kelem, R. T. (1976). Effects of deindividuating variables on stealing by Halloween trick-or-treaters. Journal of Personality and Social Psychology 33:178- 183. Haley, Jacqueline. "Anonymity of Cyberstalkers: The Cyber-Watchdog's Tough Collar." Georgia State University College of Law May 2001. Kabay, M. E. "Anonymity and Pseudonymity in Cyberspace: Deindividuation, Incivility and Lawlessness Versus Freedom and Privacy." Conference of European Institute for Computer Anti-virus Research 8 Mar. 1998. Post, David G. "Knock Knock Who's There?" Information Week Megazine Dec. 1995. Rowland, Diane. "Anonymity, Privacy, and Cyberspace." 15th BILETA conference 14 Apr. 2000. Springer, Claudia. Electronic Eros: Bodies and Desire in the Postindustrial Age. Texas: University of Texas Press, 1996. Internet Essay - Online Anonymity and Cyberspace Crime -- Exploratory Online Anonymity and Cyberspace Crime The 90's internet boom gave rise to new ways of writing in through access to cyberspace. What used to be printed or handwritten on physical surfaces such as paper, cardboard, or bulletin boards has changed to 0's and 1's, bits and bytes of digitized information that can be displayed thru the projections of computer screens. Moreover, the internet has made the process of publishing one's works, writing letters, or chatting with one another much easier and convenient for everyone around the globe. The internet became a universal tool, giving much freedom and flexibility to the users; it gave them opportunity to deliver their thoughts with little or no restrictions. Since it's impossible to regulate all cyber-activities, internet users are often unrestricted by the normal laws or authorities that would set boundaries around the various online transactions. More importantly, the fact that a net user can take on different identities in cyberspace brings about several ethical and social is sues. These anonymous and unrestrictive characteristics of cyberspace often permite abusive users to easily involve themselves in serious cybercrimes such as cyberstalking, cyber-rape, and cyber-harassment through chatting services, emails, cyber communities, and other online communication. In the real world, most encounters in everyone's daily lives are anonymous ones. Chatting with a person beside you in a cafà © or talking to an assistant while shopping for a pair of pants- these are interactions between two unknown persons; however, these contacts do not affect our lives the way some of the anonymous interactions in the cyberspace does so. Chat rooms, net forums, and even the spam mails most people get u... ...sity. 10 Apr. 2004 . Diener, E., Fraser, S.C., Beaman, A. L. & Kelem, R. T. (1976). Effects of deindividuating variables on stealing by Halloween trick-or-treaters. Journal of Personality and Social Psychology 33:178- 183. Haley, Jacqueline. "Anonymity of Cyberstalkers: The Cyber-Watchdog's Tough Collar." Georgia State University College of Law May 2001. Kabay, M. E. "Anonymity and Pseudonymity in Cyberspace: Deindividuation, Incivility and Lawlessness Versus Freedom and Privacy." Conference of European Institute for Computer Anti-virus Research 8 Mar. 1998. Post, David G. "Knock Knock Who's There?" Information Week Megazine Dec. 1995. Rowland, Diane. "Anonymity, Privacy, and Cyberspace." 15th BILETA conference 14 Apr. 2000. Springer, Claudia. Electronic Eros: Bodies and Desire in the Postindustrial Age. Texas: University of Texas Press, 1996.

Wednesday, January 15, 2020

Identify how you would beta test a multimedia project for delivery Essay

Beta testing is a test for a computer product prior to commercial release may it be an application software, an operating system or a multimedia product. It is a stage where in the product is put into a larger community after a rigorous in house test. To some, it is also a way of knowing how well the community responds to the product. Beta testing is the last stage of testing, the last possibility to correct errors that would render a product priceless to customers. And because of this, beta testing of multimedia products is in essence a difficult task. PURPOSE The purpose of this document is to present a strategy to beta test a multimedia product. It presents possible alternatives that would yield the best result. BETA TESTING STRATEGY In the past, beta testing is used to be a secret. Beta testing is given to a group carefully selected by the company who owns the product to be tested. The fear that finding a considerable amount of bug might diminish customer interest was the old belief. Now, the perspective has changed. Beta testing is already considered an important marketing tool (Nelson & O’Connor, 2004). It increases the popularity of the multimedia product. The best strategy therefore is to make it available for free in the beta testing phase. The first step is to advertise the beta software and provide links to beta version download. Then provide a feedback center for them to comment on observable bugs. Providing the beta version free has many advantages. First, it is very cost effective because you do not have to spend money for hiring a group of people to beta test the software. You may have to spend a certain amount to accelerate interest by providing rewards to people with most important bugs found or by advertising the beta download locations, but these are small compared to hiring an entire group. Second, it is the best way to reach the most number of beta testers. The number of beta testers is directly proportional to how effective the beta testing would be. Third, providing it for free is a way of advertising the software to gain more users. The finding of bugs is just one part of beta testing, there should also be a way for users to provide suggestions. Suggestions are very important to make the multimedia product more acceptable to the market. The suggestions and reported bugs should be monitored on daily basis. Suggestions should be evaluated of whether there is a plan to include it or not. Reported bugs should also be evaluated of whether it is connected to some other bugs or it is really a bug. Then an update release should be available on a periodic basis, for example a monthly update until the reported bugs are already tolerable or it is already completely bug free. The end result of this methodology should produce a very robust multimedia product. If the multimedia product gains public acceptance, the number of users who will beta test this product would also be many. This will give the developer an early view of whether the multimedia product would become profitable. Although there are some possible drawbacks, the beta software should also be given some licensing limitations to prevent users from simply using the beta version instead of the final version. An example would be a pop-up of the reminder to purchase license when the beta period expires. CONCLUSION Multimedia products undergo beta testing to ensure good quality. The best approach in beta testing is to make it free and available for public download at the beta version stage. This would increase its popularity and the cost of beta testing would be minimal. References Nelson, T. and O’Connor, M. (2004). Beta Software: Get In the Development Process. Retrieved from the PC Today website: http://www. pctoday. com/Editorial/article. asp? article=articles/2004/t0205/20t05/20t05. asp&guid= , on January 24, 2007

Tuesday, January 7, 2020

PEGASIS Research Papers - 1103 Words

S. Lindsey et al. [6] in this thesis, proposed PEGASIS (Power effective assembling in sensor data networks), a covetous chain protocol which settle the data-gathering issue of the WSNs. The primary concern is for every node to get from and transmit to close neighbors and alternate being the pioneer for transmission to the base station. S. Yi, et al [7] in this thesis, proposed PEGASIS (Power- efficient gathering in sensor data networks), a greedy protocol for expanding the network lifetime of the WSNs. Clustering protocols enable sensor nodes to lessen data packets by data aggregation on WSN. A. Manjeshwar et al [8] in this thesis, proposed TEEN (Threshold sensitive energy effective sensor network protocol) which is the principal†¦show more content†¦O. Younis et al [11] in this theory, depicted HEED (Hybrid vitality proficient appropriated clustering protocol) in which provisional cluster heads are haphazardly chosen in light of their leftover vitality. In this manner, HEED cant guarantee optimal head selection as far as energy, since it utilizes the auxiliary parameter to take care of the issues. Z. A. Eu, et al [12] in this thesis, proposed HEEP (Powered by encompassing energy harvesting) and enhanced network execution utilizing routing algorithm and enhances hand-off node position conspire for WSNs. M. Younis, et al [13] in this proposal, exhibited an approach for vitality mindful and setting mindful routing protocol of data. The researchers for the most part centered around the modification of topology and the routing component. Data is routed through numerous hops in order to preserve transmission energy. T. Camilo et al [14] in this thesis, proposed EEABR (Energy efficient ant based routing) which depends on the Ant Colony Optimization heuristic. At first the forward ants are sent to no particular destination node, which implies that sensor nodes must speak with each other and the routing tables of each node must contain the distinguishing proof of all the sensor nodes in the area and the correspondent levels of pheromone trail. A. Chakraborty, et al [16] in this thesis, proposed an Optimized Lifetime Enhancement Scheme which shows increasedShow MoreRelatedRevised Multi Chain Pegasis For Wireless Sensor Networks2150 Words   |  9 PagesRevised Multi-chain PEGASIS for Wireless Sensor Networks Deepak Sethi1, Partha Pratim Bhattacharya2 1,2 Faculty of Engineering and Technology, Mody University of Science Technology, Laxmangarh, Sikar Rajasthan, India- 332311 1deepaksethi@live.in 2hereispartha@gmail.com Abstract: In wireless sensor network, sensor nodes have limited power back-up. So, the main issue is to increase the network lifetime. The multi-chain concept in PEGASIS and sink mobility increases the network lifetime in wirelessRead MoreNetwork Product Development Company : Security Issue1280 Words   |  6 Pagesand technologies for the similar environment can flawlessly integrate classical networks with network devices. In this paper, I am going to provide systematic details of data mining, analysis and outlier analysis. The new analytic application will be also consider after successful delivery of required result. This literature review also provides a different perspective of Research topic’s Journal. The objective of this literature review will be providing services to IoT based business. These servicesRead MoreAnalysis Of Wireless Sensor Network Routing Protocols2279 Words   |  10 Pagesshalabhgreat1@gmail.com Dipesh Rai Computer Engineering Department IMS Engineering College Ghaziabad, India dipeshrai111@gmail.com Shashank Dixit Computer Engineering Department IMS Engineering College Ghaziabad, India shiva.imsec@gmail.com Abstract—this paper attempts to describe a literature review of Wireless Sensor Network routing protocols. A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions and to cooperatively pass theirRead MoreA Picatrix Miscellany52019 Words   |  209 Pagessystem is taken as purely sidereal, then it cannot be fixed to any particular point and will shift gradually every year; if the marker stars are used, precessional slippage means that the star that is currently closest to 0 ° Aries is Scheat (Beta Pegasi; which will reach the exact longitude of the Spring Equinox in 2045), one of the markers of Al Fargh al Mukdin, the First Water Spout. An example of the confusing situation, based on one of the clearer and better known stars, Alpha Tauri (Aldebaran)