Wednesday, February 26, 2020
Stem Cell Science Case Study Example | Topics and Well Written Essays - 250 words
Stem Cell Science - Case Study Example While many teams carry on to improve and develop the role played by bone marrow and cord blood stem cells in their frontline uses in blood and immune ailments, several others are considering to increase the uses of the different types of stem cells for instance, embryonic stem cell that can be used in the curing of diabetes. On the 16th April 2009, Dr. Carlos EB Couri and associates from the College of Sà £o Paulo carried out an experiment to show how stem cell transplants can aid patients with diabetes. The study involved 23 patients with newly diagnosed type 1 diabetes, a medical condition in which the human immune structure quickly destroys the insulin-producing cells in the pancreas. The stem cell transplants seemingly work by rearranging the immune scheme so that the body halts attacking the pancreas. The study used follow-up figures on 16 patients who were initially transplanted with stem cells in an experiment that was earlier conducted and published in 2007, and then joined it with eight more recruits who joined the study up to 2008. The scientists had follow-up data for at least seven and 58 months on all the 23 patients who received the transplant. In the findings, they established that 20 patients with no prior ketoacidosis and had no use of corticosteroids throughout the preparative routinebecame free of insulin injections. Twelve patients continued to be insulin-free for a mean period of about 30 months, despite eight patients reverted and restarted insulin use however at a lower dose. Wainwright, S., Williams, C., Michael, M., Farsides, B., & Cribb, A. (2006). From bench to bedside? Biomedical scientistsââ¬â¢ expectations of stem cell science as a future of therapy for diabetes. Social Science & Medicine , 63,
Monday, February 10, 2020
Network Security Ph.D. Essay Example | Topics and Well Written Essays - 8500 words
Network Security Ph.D. - Essay Example The weekly assignment, which covered various security-related topics, necessitated that we, as students, research the assigned topics, engaged with the material and, importantly, explore the multi-dimensional nature of network security. Added to that, weekly feedback on assignments offered us a clear indication of the topics which we could handle well and those which we could not. Following a review of the weekly assignments and the identification of the topics which I could write a good extended research on, I decided that threat identification and confrontation was an interesting topic. It was, however, too general and accordingly, I sought the advice of our Chief information Security Officer who directed me towards state of the art threat identification and mitigation technologies as a possible topic. The primary aim of this research is the examination of the technologies currently employed for the detection of a worm attack and its subsequent negation. Through this examination, the research will illustrate that by taking existing honeypot technologies and using them to populate unused IP space on a network, a honeywall could use these honeypots as sensors to detect and respond to unauthorized traffic. In order to respond to the research question, an in-depth investigative exploration of the network attacks and the technologies for dealing with them was conducted. The research was limited to secondary data and all sources were checked for credibility. Part II: Background 2.0 Introduction An understanding of the nature and types of attacks seen on the network is established first. Following the classification of attacks, a profile of an attacker is presented to provide a more substantial example of network intrusions. A discussion of firewalls, intrusion detection, and honeypots is provided to complete the background information. 2.1 Network Activity Lyle (1997) posits that most attacks fall within one of three main categories: attacks on integrity, attacks on confidentiality or attacks on availability. The act of maintaining the integrity of a network is the act of preventing authorized users of the system from making changes beyond their authority, and to prevent unauthorized persons from making changes at all. If the integrity of a
Subscribe to:
Posts (Atom)