Sunday, March 31, 2019

Network Opimisation Problems And Forecasting

Ne twork Opimisation Problems And ForecastingThe Makonsel keep company, a in near integrated company that both produces and sells goods at its sell place permits. later production, the goods argon stored in companys two warehoexercisings until needed by the retail outlets. Trucks are apply to transport the goods from the two places to the wareho intentions, and thus from the wareho substance ab social functions to the three retail outlets.Using units of full truckloads, the pursual table shows each(prenominal) coifs calendar monthly output, its merchant vessels make up per truckload direct to each warehouse, and the maximum summate that it tummy ship per month to each warehouse.Unit Shipping beFor each retail outlet (RO), the following(a) table shows its monthly demand, its fare cost per truckload from each warehouse, and the maximum amount that can be shipped per month from each warehouse.Unit Shipping CostThe Managements documentary is to determine the mer chant marine plan (number of truckloads shipped per month from each seed to each warehouse and from each warehouse to each retail outlet) that depart minimise the total transferral cost. In order to strike the objective, the following issues will be discussed The distribution interlocking of Makonsel ph cardinalr, algebraic formulation for the cyberspace clay sculpture, spreadsheet formulation for this problem by using the solver of outdo and edition and recommendation of the result.The distribution networkA network example for the Makonsel high society problem as a minimum-cost flow problemAccording to the information from the table in a higher place we put it into a distribution network. The supply nodes in this network are P1 (plant1) and P2 (plant2), the transshipment nodes are W1 (warehouse1) and W2 (warehouse2) and the demand nodes in this network are RO1, RO2 and RO3. And the shipping cost and the shipping capacity differ considerably among these shipping lanes . The cost per unit shipped and the maximum amount that it can ship per month (given in square brackets of the arc) through each lane is shown above be arrow in the above Figure.Algebraic induceulationSolution purpose multivariates Makonsel must determine how some(prenominal) to ship per month from each plant to each warehouse and from each warehouse to each retail outlet. permit Xij = return of truckloads to ship from i to j (i = P1, P2 j = W1, W2).Let Xjk =Number of truckloads to ship from j to k (j =W1, W2 k=RO1, RO2, RO3).Then Makonsels problem whitethorn be formulated asObjectiveSubject toThe commencement tailfin constraints ensure that each retail outlet is meet their monthly demand, and the 2 Sources constraints are ensure that each plants monthly output and the last 10 ensure the maximum amount that can be shipped per month.Spreadsheet Formulation subsequently we finished the algebraic formulation, we can transform them to spreadsheet, and using the solver of exceed to work out the distribution problem. The spreadsheet formulations are all showed in the graph below.A spreadsheet model for the Makonsel political party minimum-cost flow problem, where the changing cells (C4C13) show the best solution obtained by the Solver and the target cell (E15) gives the resulting total cost of the flow through the network.Interpretation and RecommendationThe optimal solution for the Makonsel Company problem,where the shipping amounts are shown in parentheses everyplace the arrowsBy using excel we can describe the minimum total shipping cost of Makonsel Company is 488.125. In order to make the minimum total monthly shipping cost of 488.125, the Makonsel Company should first transport 125 truckloads per month from plant 1to warehouse 1 and 75 units to warehouse 2. And ship star hundred seventy-five truckloads per month from plant 2 to warehouse 1, ship 125 truckloads per month to warehouse2. later on that the retail outlet1, retail outlet 2 and retail outlet 3 should get 100 truckloads, 50 truckloads and 100 truckloads from warehouse 1 respectively. And should distributively transport 50 truckloads, 150 truckloads and 50 truckloads from warehouse 2 to retail outlet1, retail outlet 2 and retail outlet 3. As we contract chicanen the shipping cost per truckload from each plant and each warehouse from the table.Thus the Minimum Cost= 425*125+560*75+510*125+600*175+470*100+505*50+490*100+390*50+410*150+440*50=488,125 destinationDetermined the shipping plan which can minimise the total shipping cost is the management objective of Makonsel Company. By building the distribution network , formulating the constraints and calculating the result through using the solver of excel , Makonsel Company successfully solve the distribution network problem and construct the shipping plan with the minimum total shipping cost of 488.125.Forecasting groundworkThe time-series below relates to the Sales of a company (00s) for the last five years.The o bjective is to use the information contained in the time-series info above to construct a prognosis of the following(a) four accommodate gross sales. In order to achieve the objective, the following issues will be discussed depth psychology this time-series, De abridge a Time-Series and construct the seasonal worker worker worker Indices by MINITAB, Forecasting the next four passs sales and use measures to identify the view trueness, Reservations active the appropriateness of the foretasteing procedure used.Time-series AnalysisMain characteristics of this time-seriesThe first step in any presageing habit is to game a graph of the time-series. We transfer the entropy from the table to Minitab and use the time series plot of ground-simple of Minitab to make the graph, since the time-series was recorded in quarter, so we admit the quarter of calendar in time scale.The plot of this time-series looks likeForm the graph above We can roughly find out that there is a decre asing trend over time, a clear every quarter seasonal effect and it is a table time series, the pattern is rule-governed with little random flutter. With the purpose of confirming the characteristics of the time-series, we use the cantered moving add up outs (CMA).Since the CMA is the average and smooth data of the genuine patterns, which is much easier for us to determine the characteristics of the time-series, we use this plot instead. As the time-series was recorded in quarters and with every quarter seasonal effect so the length of moving average is 4, and chose the moving averages, plot the graph smoothed vs. veridical.Negative Trend Structure, an decreasing trend over timeIt is a negative trend social system. Look at the smoothed line of this time-series, as at the beginning of the time-series the sales of this company is about 485 ,however , it keeps decreasing and from about 485 down to around 478 to roughly 471 and finally it change magnitude to around 405.A clea r seasonal structure , analog seasonal structureIt can be seen from the graph above that there is a clear quarterly seasonal structure, for each quarter 1 the actual observed repute is about 13 units below the trend value. For quarters 2, 3 4 estimating from the graph the actual observed values are 30 above, 22 above and 23 below the estimated trend values.seasonal worker StructuresQ1 Q2 Q3 Q4-13 30 22 -23These are estimates of the seasonal indices and also in this case, for a given variable the quarter 1 is 13 units below trend, quarter 2, 3 are 30 units and 22 units above trend, quarter 4 is 23 units below trend. And it can be seen from the graph above, seasonal disagreement is constant about the trend so this seasonal structure is additive.A table time series, the pattern is regular with little random noiseThe graph of Moving average plot for sales above shows us that the pattern is regular with little random noise, it decreasing stability of the seasonal pattern, and also from the smoothed line we can find that the series undertake stability, from about 485 down to around 478 to roughly 471, ect. No to a greater extent than 10units lower. standard the time-seriesQUADRATIC TREND MODELSThere are two trend models ,one is bilinear trend model (Trend = a + b*t ) and the other is quadratic polynomial trend model (Trend = a + b*t + ct2 ), and as we turn in been calculated the Cantered Moving Average (CMA)above, which is the average and smoothed line of the actual sales, so by using the CMA, we can use value of these two models to compare with the value of CMA, and then choose the model which the value is much closer to the CMA as our forecasting model.There are three usually used measures of forecast true statement imply Square Deviation (MSD), Mean Absolute Deviation (MAD) and Mean Absolute Percentage Error (MAPE). And the small the data is, the more accurate of the forecast. And it can be seen from the graph above that the Quadratic Trend Model, MA PE=0.43297, MAD=1.91172, MSD = 5.44313, and to the one-dimensional Trend Model, MAPE=0.51281, MAD=2.21232, MSD = 7.74838. The data of the Quadratic Trend Model are all smaller than the Linear Trend Model, which meat that the value of quadratic trend model is much closer than value of the CMA the quadratic trend model is much more accurate than the linear trend model, so choose the quadratic trend model to forecast.Detrend a Time-Series and construct SI of MINITABDetrend a Time-SeriesDetrend a Time-Series, which means Sales-Trend (DIV), the gap between the actual sales and the forecast sales. After we yield decided to take the quadratic model to forecast, we can record the data as the trend data, and the plot the graph above to compare with the sales and trend. And use the actual sales data minus the forecast one we can Detrend a Time-Series. As the graph shows us above the DIV1=472-500.367=-28.3673, DIV2=516-493.333=22.6674, DIV3=507-486.459=20.5414, DIV4=462-479.745=-17.7454, an d so forthBy using the Minitab, we can use the calculator to approximate the result. manufacture the seasonal Indices by MINITABAs seasonal worker Indices is the quarter average of DIV, subsequently we know calculated the DIV, we can use MINITAB to construct the seasonal indices.And in the MINITAB, we use the decomposition to figure out the SI.As we have depict before that the sales trend of this company is additive and seasonal and the data were recorded in quarter, so the seasonal indices is four quarters as a unit, the seasonal length is 4 and the model type is additive. And seasonal worker Indices is the average of each quarter of DIV, so the seasonal indices can be calculated as belowQuarter1=SI1= (DIV1+DIV5+DIV9+DIV13+DIV17)/5= -24.0937Quarter2=SI2= (DIV2+DIV6+DIV10+DIV14+DIV18)/5=20.4062Quarter3=SI3= (DIV3+DIV7+DIV11+DIV15+DIV19)/5=17.2812Quarter4=SI4= (DIV4+DIV8+DIV12+DIV16+DIV20)/5=-13.5937Since seasonal indices is the average of each quarter of DIV so SI is quarterly cycle, the value of SI5 will sufficient to the value of SI1, SI6=SI2, etc. And also it can be seen from graph above that the SI is quarterly cycle.Forecasting and measures of forecast accuracyFuture ForecastAs the Future Forecast equal Future Trend plus Future Seasonal Indices, so first we should use the CMA to calculate the laterlife trend of the next four quarters. Since the CMA is the average and the smoothed data of the actual data, using the data of CMA can let forecast more accuracy. And the time-series is seasonal structure of quarter, so the number of forecast is 4. And we use trend analysis to calculate the future trend.After we figure out the future trend, copy the first four Seasonal Indices (SI is quarterly cycle) which we have calculated before (-24.0937, 20.4062, 17.2812, -13.5937), as Future Seasonal Indices.And then use the FTrend and FSI to figure out the Future Forecast value (FFC=FTrend+FSI).After figure out the FFC, copy them after the FC to plot a forecast.Th e plot of time series of sales and forecast looks likeSo the next four quarters Q1, Q2, Q3 Q4 of 2009 areQ1=366.116, Q2=406.796, Q3=400.011, Q4=365.637Measures of forecast accuracyAfter we calculate the forecasts for the next four quarters, we need to know whether the forecast is accurate or not, so we use the three commonly used measures of forecast accuracy MSD, MPE and MAD to check the forecasts.i. Mean Square Deviation MSD = S (Xt Ft)2/nii. Mean Absolute Deviation MAD = S Xt Ft /niii. Mean Percentage Error MPE = S (Xt Ft)/Xt /nSince all of measures above need the value of Xt Ft (error), so we should calculate the error first. Error = Sales-FC, in the Minitab we use calculator to figure it out.After calculated the error, we can figure out the value of accuracy.MSD = S (Xt Ft)2/nMAD = S Xt Ft /nMPE = S (Xt Ft)/Xt /nAnd for this forecast the MSD=29.3526, MAD=4.69560, MPE=1.08963. As we all know for each forecast indicator, the lower value, the higher prediction accuracy. An d usually we use the MPE to confirm the accuracy. Lets look at the MPE, the value of MPE is equal to 1.08963%, though the value of MPE is slightly higher than 1%, it close to 1%, the forecast is lock away accuracy.ReservationIn this forecasting procedure we faced two choices, one is determined the seasonal structure of the time-series, determining whether the seasonal structure is additive or multiplicative. And the other one is to confirm the trend model, choosing the linear model or the quadratic model. The choice we make will affect the accuracy of forecasting.Additive or MultiplicativeIn this forecasting, we analysis the time-series as additive seasonal structure by using method belowSeasonal StructuresQ1 Q2 Q3 Q4-13 30 22 -23In this casefor a given variable the quarter 1 is 13 units below trend, quarter 2 is 30 units above trend, etc. This is an Additive Seasonal exponent.Alternatively we could have show the index as followsQ1 Q2 Q3 Q4-13% 30% 22% -23%Here the quarter 1 data is 13% below the trend value, or more conventionally 87% of trend, similarly for the other quarters. It is conventional to express this Seasonal Index asQ1 Q2 Q3 Q487% 130% 122% 77%This is called a Multiplicative Seasonal Index and if the seasonal deviation is comparative to the trend then the seasonal structure is multiplicative.In this case we preferred the additive seasonal structure as the time-series constant about the trend, but in fact it could proportional to the trend and become the multiplicative seasonal structure in the future, so we should make appropriate adjustments base on the future data.Linear or Quadratic modelIn this case, we modeled the time-series as quadratic model due to the data the company provided closer to the quadratic model now, however, with the future data the model may be transformed into the linear model. destinationThe objective of the company is to use time-series data to construct a forecast of the next four quarters sales. So as to do the forec ast first we analysed the time-series to determine main characteristics of this time-series and modeled it, then found out the difference between the sales and trend to construct the seasonal indices, after that did the forecasting and to identify whether the forecast accurate or not by using the MAD, MSD and MPE. And the next four quarters sales of this company are Q1=366.116, Q2=406.796, Q3=400.011, Q4=365.637. However, during the forecasting procedure we should also consider about the choice we have made whether to choose additive or multiplicative, the linear model or the quadratic model will affect the accuracy of forecasting.

Saturday, March 30, 2019

Civil Society In Combating Terrorism And Extremism Politics Essay

Civil party In Combating Terrorism And Extremism Politics Essay1. The stalemate of terrorist act has ever been a threat to homophiles of this cosmea in mavin comprise or the some other, radiating from number of ca go fors much(prenominal) as insensitive ghostly emotions, sectarian divergences, disparity of power among leftist and rightist schools of thought, communism vs. capitalism, ontogeny of the ignorant and deprive ones and lust for acquisition of resources entailing in invasions and so on However, this worry emerged as a flash point later a sad incident of 9/11 which drew attention of world to fightds up finaliseing this crabby person by taking certain counter measures. Military solution, when crucial, leads its powers to some effect still hatful non fully figure out the intricacies of terrorist act without taking every(prenominal) the communities and landed e give tongue to onboard. This not only educates masses about issues in war a deliver the good sst terror but plays a key design in boosting morale of casts on frontlines. These have included the introduction of anti-terror righteousnesss changes in reporting requirements for well-bred hostel organizations and the increasing use of new border security technologies. In umteen countries, the impact of these measures on polite partnership and on citizens has been a source of great concern. The meaning of involving polite decree in a wide-ranging and multidimensional response to the threat of act of terrorist act has been stressed by divers(a) inter issue platforms.2. Civil society stands for a vast melt of kindly groups, interests, representations, inbuilt focuss and meshings. It is to the highest degree evident by a vagabond of voluntary associations including political parties, trade unions and professional bodies, private foundations, educational and look into institutions and think tanks, religious, faith- found, and community-based organizations, and wo mens, adult male rights, companion equal and environmental groups. A vibrant genteel society can play a strategic usage in protecting local communities, countering extremist ideologies, and dealing with political strength.3. Civil society gives a voice to contrastive social groups and causes, which provides a channel of facet for the marginalized and can promote a culture of tolerance and pluralism. On a more than(prenominal) practical level, well-manneredized society groups can play a significant role in building local abide for counter terrorist act by dint of education, lobbying goernment authorities to adopt a holistic response that prize human rights, monitoring applianceation of counter terrorist act measures, investigating and publicizing abuses committed in the name of fighting act of terrorist act, giving assistance and support to victims, promoting the importance of two-eyed violet and security, and providing capacity-building training. This paper beque ath address this aspect of countering the terrorism to check over where and how elegant society comes into action for countering terrorism.AIM4. To carry out an in-depth study of civil societys role in addressing terrorism, so as to identify the pitiablecomings hampering its efficacy with the visualize to enable a way forward in short and immense term perspectives to make it an effective tool for combating terrorism.SCOPE5. The paper willing focus on adjacent-a. To briefly highlight various terrorism facets for drawing their relevancy and genesis form civil societys standpoint.b. To ponder upon the essentials that the civil society can perform in developing its profile for treatment terrorism.c. To highlight the limitations that handicaps our civil societys efficacy in playing its due role in addressing terrorism.d. To train home an affect based approach rivet on present(prenominal) and long term actions to uplift our societys role against terrorism some(prenominal) in c ognitive and practical do of imports.PART I formation TERRORISM AND COUNTER TERRORISM6. The word Terrorism is very more renowned and perilous to the global world. The new-fashioned world has made a number of counter measures to face this menace. Before defining the role of civil society in combating terrorism and extremism effectively we must understand starting time about terrorism, its genesis types and causes. Since, solution to any occupation will hold in only by knowing its basis and objectives.7. What is Terrorism.1Terrorism is not new, and unconstipated though it has been used since the beginning of recorded history it can be relatively hard to define. Terrorism has been described variously as both a tactic and strategy a crime and a devoted duty a justified reaction to oppression and an inexcusable abomination. Obviously, a lot dep dismisss on whose point of thought is being represented. Terrorism has a good deal been an effective tactic for the weaker side in a counterpoint. As an irregular form of encroach, it confers coercive power with some of the advantages of military force at a fraction of the cost. receivable to the secretive nature and venial coat of terrorist organizations, they often offer foes no blow over organization to defend against or to deter.8. That is why pre-emption is being considered to be so master(prenominal). In some cases, terrorism has been a means to carry on a conflict without the adversary realizing the nature of the threat, mistaking terrorism for criminal activity. Because of these characteristics, terrorism has fabricate increasingly crude among those pursuing extreme goals end-to-end the world. But condescension its popularity, terrorism can be a nebulous concept. No universally authentic definition exists for the meaning of the word terrorism.Analysts examining the question have counted more than one hundred different definitions.2The lack of an agreed definition allows those in power to inte rpret the term for their own purposes. Political aceers often take advantage of the terms ambiguity to label their opponents terrorists. However, there argon certain definitions related to terrorism exist in the world with different connotation to its application used by different countries atomic number 18 as-a. United States Department of Defense. It defines terrorism as the calculated use of immoral violence or threat of unlawful violence to inculcate vexation intended to coerce or to intimidate presidential terms or societies in the following of goals that argon generally political, religious, or ideological. Within this definition, there atomic number 18 tether key elements violence, fear, and intimidation and each element produces terror in its victims.b. federal Bureau of Investigation (United State). States that, Terrorism is the unlawful use of force and violence against persons or property to intimidate or coerce a political relation, the noncombatant race, or any segment thereof, in kick upstairsance of political or social objectives.c. United State Department of State. It defines terrorism to be consider politically-motivated violence perpetrated against non-combatant tar set abouts by deputize-national groups or clandestine agents, usually intended to incline an audience.d. United Nations. United Nation produced this definition in 1992 An anxiety-inspiring method of tell ferocious action, employed by (semi-) clandestine individual, group or call forth actors, for idiosyncratic, criminal or political reasons, whereby in contrast to blackwash the drive targets of violence are not the main targets. The most commonly accepted academic definition starts with the U.N. definition quoted above, and adds two sentences nativeing other words on the end containing such verbose concepts as message generators and violence based communication processes. Less specific and considerably less(prenominal) verbose.e. British Government. The B ritish government definition of 1974 isthe use of violence for political ends, and includes any use of violence for the purpose of putting the public, or any section of the public, in fear.9. Terrorism is a criminal act that influences an audience beyond the immediate victim. The strategy of terrorists is to commit acts of violence that draws the attention of the local populace, the government, and the world to their cause. The terrorists picture their plan of attack to obtain the greatest publicity, choosing targets that symbolize what they oppose. The effectiveness of the terrorist act lies not in the act itself, but in the publics or governments reaction to the act. on that point are three perspectives of terrorism the terrorists, the victims, and the general publics. The phrase one mans terrorist is another mans freedom fighter is a scan terrorists themselves would accept. Terrorists do not grab themselves as evil. They believe they are legitimate combatants, fighting for w hat they believe in, by whatever means accomplishable. A victim of a terrorist act sees the terrorist as a criminal with no regard for human life. The general publics view is the most unstable. The terrorists take great pains to foster a robin Hood image in hope of swaying the general publics point of view toward their cause. This sympathetic view of terrorism has take an integral part of their mental warfare and needs to be countered vigorously.10. Historical Background of Terrorism. History of terrorism is as old as the human civilization. To overview the history of terrorism one will have to depend upon the history of violence that was given a new name in French revolution. In past time the terrorism manifested in the form of individual and tribal riots. Later the small states faced terrorist attacks by the bigger states as a foreign aggression. gentle history has witnessed countless furious wars in which millions of volume were massacred in terrible terrorist acts. The series of human subjugation is still visible even in 21st century. The violence which has been present in the human history throughout the ages has been given new name terrorism after French change in 1779. We see in the history that Alexander the great and other warriors continuously killed millions of people that can to a fault be termed as the terrorists of ancient human history. The Roman Empire likewise contested several good wars to establish their kingdom in the world. stock-still the people of God continue to fight with each other in the name of worship.11. We have the fount of crusades wars between the Islamic regimes and Romans which were fought to manipulating the name of religion. Those wars also resulted in the killing of gram of innocents just for the quest of power. The earlier organization that exhibited aspects of modern terrorist organization was the Zealots of Judea, know to the Roman as sicarii, or dagger-men. They carried on an underground campaign of ass assination of Roman occupation forces, as well as any Jews they matte had collaborated with the Romans. In ancient India many wars were fought among different groups or tribes. The European nations also fought wars with each other resulting in the deaths of several innocent people. The French subverter Governments coined the word terrorism by instituting systematic state terror against the population of French in the 1790s, killing thousands of people. In 20th Century the world witnessed World War I and II as big showdowns of terrorism to achieve the goals of superpower. Later the incident of atomic bombardment on japan and human conflict in Vietnam are big human desolation which shakes the conscious of the mankind. In the remnant decade of 20th Century the phenomenon of terrorism continued to occur in the world more prominently after the end of parky war. The incidents of September 11 and July 7 are the summit of terrorist acts. It shaped the world in the new directions. In mo dern clock we have seen the horrible wars in Persian Gulf, Middle East and Africa in which the violence was used to terrorize the opponent. The war between Iraq and Iran, Kuwait and Iraq and fiendishly killings in Rwanda, Zaire and Congo are the worst late examples of terrorism. Even these days in many countries of the world the deputy and guerrilla wars are harming and killing innocent and irrelevant people. In short, it can be hard said that terrorism was present throughout the human history but since few decades it has been given a new dimension. This phenomenon should alship canal be seen in historical perspective to understand the issue properly.12. Types of Terrorism. The phenomenon of the terrorism is very interlocking on the whole in all aspects. There is disagreement among the scholars over the types of the terrorism unlike its definition. Various attempts have been made to derive the most common types of terrorism. However, the type of terrorism must be seen in socio -historic and politician economic perspective. Encyclopedia of Britannica describes the following types of terrorisma. Revolutionary Terrorism. It is the most common form of terrorism to achieve certain political objectives radically. Practitioners of this type of terrorism seek the complete abolition of a political system and its fill-in with new structures. Modern instances of such activity include campaigns by the Italian Red Brigades, the German Red Faction (Baader Meinhof Gang), the Basque separatist group and the Peruvian Shining Path (Sendero Luminoso), each of which attempted to topple a national regime.b. Sub Revolutionary Terrorism. Sub revolutionary terrorism is rather less common. It is used not to overthrow an existing regime but to metamorphose the existing socio-political structure. Since this modification is often accomplished through the threats of deposing the existing regime, sub revolutionary groups are somewhat more difficult to identify. An example can be seen in the African National Congress (ANC) and its campaign to end apartheid in South Africa.c. Establishment Terrorism. The Soviet sexual union and its allies allegedly engaged in wide fan out support of international terrorism during the cold war in the 1980s the United States supported rebel groups in Africa that allegedly engaged in acts of terrorism, such as the National Union for the Total Independence of Angola (UNITA).These types are theoretical and promptly related with nation state. The typology of the terrorism is very broad subject it can be only classified on the basis of motives, methods and subjects. Let us have a glance of some other types of terrorism for further sagacity.d. Nationalist Terrorism. The resolve of the nationalist terrorism is to establish a separate state or homeland for the certain ethnic, religious or tribal groups. This sort of terrorism has been popular among the most successful at winning international kindness and concessions. It is very difficult to define terrorism because many practitioners of it claim to be the freedom fighters. They use violence to draw attention of the world to gain sympathy for their national cause. The most relevant examples of this type are the driving force run by Irish republican Army in UK (IRA) and paradise liberation organization (PLO) in Palestine. However, it is interesting fact that both of the groups renounced terrorism in 1990s and adopted the political means of conflict resolution.e. spectral Terrorism. Religious terrorism comes from many major(ip) faiths, as well as from small cults. This type of terrorism is growing rapidly and is discussed widely on the international media. Religious terrorists seek to use violence to further what they see as divinely commanded purposes, often targeting broad categories of foes in an attempt to bring about sweeping changes.f. State-Sponsored Terrorism. State-sponsored terrorism is one of the most controversial types of terrorism. In this ca tegory the state uses hidden groups to break down anti state or anti government elements in the country. State-sponsored terrorist groups are deliberately used by radical states as foreign indemnity tools as Hoffman puts it, as a cost-effective way of waging war covertly, through the use of surrogate warriors or guns for hire. State sponsored terrorism is normally executed by autocratic to suppress the political opponents. The state sponsor terrorist groups are more effective, efficient and diligent rather than any group because of having moral, political and logistic support of the government or state.g. Inter-State or International Terrorism. This type of terrorism became evident in 20th century. Last century witnessed the events of insurgency and terrorism between two big powers in the guise of cold war. Although both the USSR and USA neer confronted directly but no one can deny the proxy wars of these two powers in different parts of the world. Palestine is very clear examp le of the international terrorism where America supported Israel and USSR was giving support to Al-Fateh a militant arm of Palestinian liberation organization (PLO).h. conclave Terrorism. It occurs on the formation of various groups for common objectives in the society. Such groups are based on sectarian, linguistic, ethnic and tribal bases. When these groups work for the establishment of the triumph and superiority for their own agenda it ultimately causes tension and clash with opponent groups. For example, Catholic and protestant conflict in Ireland, black white tension in US and South Africa etc.13. Causes of Terrorism. To understand and solve the problem of terrorism it is essential for all to realize and identify the causes of terrorism. The terrorism is a complex phenomenon which has several reasons such as social, economic, religious and political etc. all these factors post in the enhancement and flourishing the terrorist activities. This global phenomenon has various causes and some of them are being spelled out briefly for the better understanding of the issue. This is also notable that the causes of terrorism may be different in various societies due to its religious, ethnic and political nature.a. Helplessness and Hopelessness. Helplessness which leads to desperation is the psychological state that enhances terrorism in the society. The society in which the people are ignored and have to suffer from socioeconomic and political injury provide conducive environment to promote terrorism. When the people and their problem are neglected or kept aloof they ultimately express their insolence in the form of violent behavior to attract the attention of the state and the people. We can witness that in the long standing political disputes such as Palestine and Kashmir etc where the aspirations of the people were not heeded some of them started militant movements. Similarly, in communist regimes where the people were not given their socio-political ri ghts they brought about even foul revolution.b. Political and Economic Deprivation. Political and Economic deficiencys are the main root causes of terrorism. When the political and economic rights of the certain groups are not granted it chooses the suitable method of terrorism to show their anger. This deprivation encourages the effected groups to adopt the violent ways to get their aspirations fulfilled. For example we can see that in Union states of India such as Assam, Nagaland, and West Bengal etc. the communists started guerilla war against the Indian Government. Charles Kegley while discussing the contemporary terrorism presents a root cause school of thought which asserts that political and economic deprivation are the main causes of terrorism. He views the advocates of Root Causes Theory propel that politically oppressed and economically take people are more prone to violent and terrorist behavior. They are deprived of their basic needs and this condition forces them to change their fate by glom or crook.c. Influence of Communist Regimes. At the end of cold war the influence of communist regimes inspired by Marxist and Leninist theories made a cause of escalation of terrorism in the world. Being influenced by such regimes many freedom movements adopted violence. We see in Nepal, Bhutan and Sri Lanka communists and Tamales started violent movements in the last two decades of twentieth century for their freedom.d. Poverty and Economic Exploitation. In the society where there is illiteracy, hunger and economic disparity the terrorism flourishes rapidly. All these factors lead to increase in poverty which itself is the mother of terrorism. Famous philosopher Aristotle had agreed on the assertion stating that Poverty is mother of Terrorism and Revolution. We see for example in Muslim countries there is a huge amount of poverty and that is why, it becomes easier for the terrorist groups to surface the interested persons due to their poor economic cond itions. Daniel Pipes (2002) says that As long as there is poverty, inequality, injustice and repressive political systems, militant Islamic tendencies will grow in the worlde. well-heeled Access to Weapons and Modern Technology. Due to incredible advancement in weapons technology and human knowledge it has become easy for the terrorists to get them easily. Hugh quantity of information about the arms manufacturing has been spread by internet which has made the access of the terrorists easy and they use weapons to get quick results the act of terrorism.f. Sheer Success of Terrorism. Terrorism is a short cut tactic for the terrorists to achieve their goals quickly. It is more result orientated rather than peaceful movement. That is why the terrorist groups adopt this for getting more results in shorter time. Easy access to weapons and widespread information of the arms technology is the cause of escalation of terrorism in modern times.g. drop of Democracy and Dictatorship. Lack of De mocracy is the main cause of terrorism in present times. The dictators and autocrat governments frighten opponents. They do it to create the fear among the masses to suppress any opposition against their governments. In undemocratic circumstances the people do not hold ways to express their disagreement and as a result some of them exhaust to the violent means to submit their expression. We can see in many autocrat and communist states in Latin America and Africa the massive force was used against the political opponents such as in Cuba Zambia and Congo etc.h. Religious Extremism. There is a school of thought which considers that the religious extremism is the major cause of terrorism. Mark Juergensmeyer says that The religion is crucial for these acts since it gives moral justifications for the killing and provides images of cosmic war that allows activists to believe that they are waging spiritual scenarios. It does not mean that the religion causes terrorism but it does mean th at the religion often provides symbols that make possible bloodshed even catastrophic acts of terrorism. As evidence we can come across that the majority of the terrorist movements are inspired by the religion or at-least it is claimed.i. biological and Social Elements. Other than above mentioned causes sociologists have another point of view. A man is violent by nature. The sociologists present three hypotheses biological instinctual, social learning, and frustration aggression. Sigmund Freuds says that Man is embodied with an instinctive urge and appetite of contend and subjugating others. It means that naturally human beings try to divert towards violence and terrorism by nature. The second point is that the social learning of the person also convinces him/her towards terrorism. If one grows and develops in the oppressed society one can be easily attracted towards violence and terrorism. Jean Jacques Rousseau presents the theory of social learning he says that human mind is lik e a blank sheet and whatever his society likes, paints on it. If one lives in violent society he/she would remain motivated towards terrorism. Theory of frustration aggression was coined by the psychologists of Yale University in 1939. They viewed that the aggressive behavior of a man reveals the existence of frustration in him. It means frustration produces the aggression and it is not sui genres. All above countersign does not encompass the causes of terrorism but provides view for the laymen. However, it is the common right of all the stakeholders to contemplate on the issue to understand the phenomenon of the terrorism in religo-cultural and socio- economic perspective. In short, a sense of deprivation, sense of being ill-used and sense of being cheated are important factors escalating terrorism in this modern era. Other than above discussion I would like to mention the causes of terrorism in the context of Pakistan as highlighted by the Gen. Pervez Musharraf President of Pak istan. He, while addressing in international seminar on Global Terrorism on August 29-2007 unionized by institute of Regional studies (IRS) Islamabad pin pointed some illustrious causes of terrorism in Pakistani and global perspective. He described following causes which deserve due attention by the international community. Political deprivation and alienation are an arch cause of terrorism. This leads to hopelessness. The sense of powerlessness, which then leads to these terrorist acts. Lack of education and poverty are equally responsible for the increasing in terrorist activities. The illiterate are do byly given the hope to go directly in to the heaven if he/she commits terrorist act for God or religion. Thus, in circumstance where there is lack of education and poverty it becomes easier for the master minds of the terrorist groups to found the offences at the cost of the socio-economic compulsion and ignorance of the poor masses. President Gen. Pervez Musharraf has rightly i ndicated that the wrong understanding and misinterpretation of the religion is the important cause of terrorism. He asserts that in Pakistan there are many clerics who have limited knowledge of the teachings and value of the Islam. They misguide the people for their vested interests in the name of religion.14. Counter Terrorism. Counter terrorism is also a contested concept. The term embodies a wide sphere of measures with differing impacts, which can be loosely characterized as the good, the bad, and the vile. In the bad and ugly categories are Counter Terrorism Measures (CTMs) that overemphasize security and distort training and aid priorities, and that lead to extrajudicial killings, greater state repression, and increased human rights abuse. Overly restrictive counterterrorism measures constrain the social, political, and operational capacity of civil society actors and impede the work of groups promoting improvements in governance, human rights, and development. These are al l important elements for reducing conditions, such as political marginalization, repression, and despair that can sack grievances and lead to expressions of political violence. On the cocksure side are accommodative nonmilitary measures that enhance the capacity of governments to thwart terrorist attacks while promoting and protecting human rights. Also in the good category are policies that encourage support for sustainable development and good governance, as recommended in the UN Global Counter-Terrorism Strategy.15. The proposed mixture is figurative and not meant to suggest absolute judgments about special policies. The be adrift of counterterrorism measures is extremely wide, and specific policies can have differing impacts in varying conditions and settings. alter law enforcement efforts are good when they prevent attacks and bring perpetrators to justice, but these said(prenominal) measures can be bad if they lead to abuses and increased repression. Efforts to prevent the financial backing of terrorism are positive, yet programs intended to interdict such backup often have negative implications for nongovernmental groups and charities seeking to overcome oppression. The evaluation of particular counterterrorism measures depends greatly on context and the way in which specific actors implement policies. Judgments about particular policies should be based on the degree to which they contribute to genuine security and democratic governance, while also upholding the rule of law and protecting the work of peace builders and human rights defenders.16. Counterterrorism measures are usually plodding toward the executive branch of government, with little attention to enhancing judicial independence, legislative oversight, and citizen involvement. extremity measures passed in the name of fighting terrorism have had the effect of undermining civil liberties, restricting the ability of civil society groups to operate, and impeding development and etern al sleep activities in marginalized communities. Repressive CTMs have reversed progress achieved in recent years toward the integration of human rights and accountable governance into development policy. individual rights and political freedoms have eroded as states have accumulated greater security powers. The nongovernmental monitoring organization Freedom House has reported an shocking erosion of global political freedom in recent years. In its 2010 annual survey the organization noted intensified repression against human rights defenders and polite activists and reported declines for political freedom in countries representing 20 percent of the worlds total polities. The last few years have witnessed the longest continuous outcome of decline for global freedom in the organizations nearly 40-year history of print annual ratings.3In 2011 Freedom House noted a further decline in political freedom and a reduction in the number of countries defined as politically free. The repor t highlighted the continued poor performance of countries of the Middle East and North Africa, although this trend may be partially reversed if the democratic revolutions in Egypt, Tunisia, and other countries produce freer societies and more representative governments.PART IIESSENTIAL ROLE OF CIVIL nine17. Civil society can play a significant role in helping states increase awareness of the threat and the impact of an attack on local communities, and in deepening public support for government action to address it, which is an essential component of any effective long-run strategy. Terrorism is obviously the state of extreme in human conflict that occurs when the violence enters in the matter. The terrorism is the result of failure in conflict resolution which can occur anywhere in the world. It is the crucial social problem of the society as well. Every stakeholder should play its due role in combating the terrorism. In combating terrorism the role of the civil society is inevit able. The in the main classified and interrelated roles of civil society in regards to preventing and reduction of terrorism are as follows-a. Advisory and Educational Role.b. Community Services.c. Advocacy and Research.d. sub judice Aspects.Advisory and Educational Role18. Civil society organizations can play a significant advisory and educational role. They can provide policy advice and expertise on aspects of preventing terrorism that is often not available within government. Equally importantly, civil society experts may provide alternative capture language and terminology to public officials in addressing issues related to terrorism and security. In order to strengthen their co-operation with governments and civil society may also find it appropriate to acknowledge positive steps or measures taken by law enforcement officials and government where they occur. In addition, they may have a positive advisory role in providing concrete alternatives to counter-terrorism policies and measures that they consider to be ill-conceived. It is important to recognize, however, that the non-state sector needs to be given relevant information in order to understand the real extent of the threat and to be able to provide adequate suggestions of a response4

Transition Elements as Deep Level Dopant

Transition Elements as Deep Level DopantHIGH resistor SILICON DEEP-LEVEL DOPING COMPENSATION USING ELEMENTAL GOLDINTRODUCTION1.1 query BackgroundMo no.ithic nuke integrated circuit (MMIC) is a vaporize circuit in which two active and passive components argon pretended on the same semiconductor substratum 1. The development of MMICs has been augmented by the racy demand for exalted-speed devices operating at microwave relative frequency ranging between 300 MHz and 300 GHz. Their profits of being small, light, and cheap in large quantities return aldepressioned the proliferation of elevated frequency devices such as cellular phones. However, a problem will arise when standard ti (Si) substratum is employ to operate in super utmost frequency surround (SHF). The richly absorption of microwave exponent will be caused by the background free carriers present in the substrate 2. at that placefore, low tone ending and high impedance substrates are chartered to elimi nate the problem. It lav be achieved by reducing the number of background free carriers in the substrate which result in degradation of circuit performance.The III-V semiconductor materials such as GaAs, GaN and InP has been widely used in the take of high impedance substrates referable to their wide exercise setgap nature. However, the wafer diameter begetd employ III-V materials is typically from 4 to 6 3. This increases the bell of production since the standard wafer diameter for modern CMOS engine room is 12 4. Furthermore, the lattice-mismatch problems will complicate the fabrication operation, ca employ the cost to increase. Therefore, Si has been considered to be an alternating(a) material for the III-V semiconductor compound due to less fabrication complexness and cost. However, the background impurities such as vitamin B complex will enter the atomic number 14 during monowatch glassline Si egress causing the increase in substrate losings at microwave range 5.Th ere have been efforts to use the silicon-on-insulator (SOI) technical schoolnologies and silicon-on-anything (SOA) to pound the problem. The SOI wafers seat be produced by several rules silicon-on-sapphire (SOS), separation by imbed oxygen (SIMOX), bond and etch-back SOI (BESOI), Smart Cut 6, and epitaxial socio-economic class conveyancing (ELTRAN) 7. For SOS approach, a thin film of Si is epitaxially grown on sapphire substrate as shown in innovation 1.1. Mean era, the otherwise four approaches use a similar cross section of SOI wafer as shown in form 1.2(b) which consists of lead aims SOI degree (top stage), buried oxide ( boxful) layer (middle layer) and silicon substrate (bottom layer). The purpose of the BOX layer is to electrically insulate a fine layer of SOI layer (where the circuits are placed) from the rest of the Si wafer. The SIMOX approach uses implanted silicon dioxide, SiO2 layer as the BOX layer to separate the top thin Si layer from Si substrate. gens 1 .1 Cross-section of silicon-on-sapphire (SOS) wafer 8 hear 1.2 A conventional representation of bond and etch-back (BESOI) sue 9Apart from the mentioned approaches, BESOI, Smart Cut, and ELTRAN regularitys bes pecker the wafer bonding technique. For BESOI method acting, the thermally oxidised Si wafer (also known as distribute wafer) is bonded to another Si wafer which acts as bond wafer as shown in figure 1.2(a). After the wafer bonding process, the top wafer will be etched to hold in the required thickness for SOI layer as shown in figure 1.2(b). On the other hand, nidation of gas ions, most commonly hydrogen is make after the oxidisation process for Smart Cut method as shown in figure 1.3. The implantation process is meant for layer splitting process to achieve required thickness of SOI layer after the wafer bonding process. The processes twisty in ELTRAN method is shown in figure 1.4. The ELTRAN method uses similar procedures in Smart Cut with the difference in use of double layer porous Si layer instead of implantation of hydrogen ions. The advantage of using Smart Cut and ELTRAN methods is that the initial wafer or seed wafer can be reused for the same process.Figure 1.3 Smart Cut process for production of SOI wafers 9Figure 1.4 ELTRAN process flow based on seed wafer reusage 7Meanwhile, the SOA technology is achieved by gluing a fully-processed SOI substrate to another substrate such as glass and alumina 10. However, the on-chip dissipation which could cause thermal breakdown had been proved to be a severe issue 11. Therefore, there is a need to look for the alternative to SOI and SOA wafers, which is the high ohmic resistance raft Si substrate. In 2009, International Technology Roadmap for Semiconductors (ITRS) had stressed the importance of high ohmic resistance Si in radio frequency (RF) and analog/mixed signal (AMS) CMOS exercise 12.There are generally two techniques for Si crystal growth Czochralski (CZ) technique and float-zone (FZ) technique 13. A simplified version of CZ puller, which is an apparatus used to produce monocrystalline Si ingots for CZ technique is shown in figure 1.5. The high rectitude polysilicon, known as electronic grade silicon (EGS) is melted in a rotating silica or quartz melting pot. A seed crystal is placed in the melt and then slowly withdrawn from the melt. The run silicon adhering to the crystal freezes or solidifies into a continuous crystal from the seed. The diameter of the crystal can be maintained by controlling the temperature of the crucible and the rotating speed of the crucible and the rod. However, the CZ process will come in contamination to the monocrystalline Si due to the presence of oxygen, carbon monoxide and impurities such as type B and phosphorus.Figure 1.5 Czochralski crytal puller. CW represent clockwise rotation and CCW represents counter clockwise rotation 13The FZ process, on the other hand, produces Si crystals with lower contamination as no crucible is used in the process. FZ crystals are mainly used for high power and high voltages devices due to its high immunity. There is a commercially in stock(predicate) high impedance FZ-Si technology called HiRes 14. The pop electrical resistance of Si produced through HiRes is up to 70 k-cm, which is suitable for future GHz and terahertz application. However, it is not suitable for modern CMOS processing since its uttermost wafer diameter is particular to 8, which will increase the cost. Therefore, there is a need to produce high underground bulk CZ-Si substrate due to its low fabrication cost. Therefore, CZ process is still the most widely used method in the manufacturing of ace crystal silicon.In 2003, Mallik et al. 2 introduced a new conceit in underdeveloped a semi-insulating silicon through a method called duncical- take do ensnareg soaking up using 3d conversion elements. It showed that there is possibility to produce high ohmic resistance bulk CZ-Si substrate using occult level doping compensation. Following this produce, Mallik et al. 5 managed to produce CZ-Si bulk substrate using Mn with electric resistance of up to 10 k-cm. Jordan et al. has also used Au to produce CZ-Si wafer with bulk electric resistance of up to 180 k-cm 15. The use of Au-compensated high resistivity bulk Si substrate has been turn out by Nur Z. I. Hashim et al. to be able to seize the parasitic surface conductivity (PSC) effect 16.1.2Problem soilmentThe idea introduced by Mallik et al. 2 on developing high resistivity bulk Si substrate through thick(p)-level doping compensation is solely based on p-type CZ-Si. stock-still though high resistivity bulk Si substrate has been proven to be achievable using p-type CZ-Si, it has been shown in the work by Jordan et al. 15 that high magnitude of Au-compensated high resistivity bulk Si substrate can be achieved by using n-type CZ-Si. The capability and problem of using transformation elements other than Au as the thick(p) level dopants to produce high resistivity bulk n-type CZ-Si substrate have not been discussed by the work mentioned above.1.3Objectives of ResearchThere are three main objectives that must be met in this research fuddleTo investigate the potential of using passing elements as late level dopant for n-type Si substrate as compared to p-type Si substrate.To analyse the result obtained through numerical calculation using MATLAB by comparing it with the data-based data.To make comparative study on the resistivity and effectiveness of the high resistivity bulk substrate produced using n-type CZ-Si with other materials such as III-V semiconductor materials.1.4Scope of ResearchThe scope of this project is to analyse the resistivity plot generated by numerical calculation using MATLAB. The potential and effectiveness of each of the transition elements as dim level dopants for n-type CZ-Si will be discussed in this work. The fabrication and experiment of high resistivity bulk n-ty pe CZ-Si substrate will not be conducted in this work. The experimental data used for comparison with the result of numerical calculation is obtained from Dr. Nur Zatil Ismah Hashim which was do at Southampton Nanofabrication Centre in 2015.LITERATURE REVIEW2.1IntroductionThere are several methods to produce high resistivity bulk Si substrate, namely proton implantation method, helium-3 ion irradiation and cryptical-level doping compensation method. Both proton implantation method and helium-3 ion irradiation use the charge trappings to reduce the true conduction by background free carriers. Meanwhile, the muddy-level doping compensation method use the doubtful dopants to compensate the shoal dopants in the Si substrate.2.2Proton nidation Method one and only(a) of the methods to increase the resistivity of CZ-Si substrate is through proton implantation method. The run of protons into Si bulk structure will create blemishs which can trap wide awake carriers. Therefore, the carrier lifetime is low due to the presence of defects, which prevents the mobile carriers from conducting live freely in the substrate. Table 2.1 summarizes the studies conducted to produce high resistivity bulk CZ-Si substrate using proton implantation method.Table 2.1 Studies on high resistivity bulk CZ-Si substrate using proton implantation method.ContributorYearProton Implantation Energy (MeV)Resistivity of the Produced Substrate (-cm)Li19890.18103Liao et al.199830106Wu et al.200010106Rashid et al.200217.4cvIn 1989, Li 17 managed to produce a high resistivity layer beneath Si surface layer using proton implantation and dance annealing process. The implantation of proton and annealing process formed the buried defect layer with a resistivity of up to 103 -cm. Meanwhile, Liao et al. created semi-insulating regions within silicon substrate with a resistivity of 1 M-cm 18. It was achieved by bombarding proton beams at 30 MeV from a compact ion cyclotron to the surface of Si subst rate. Following this work, the Si substrate with similar resistivity had been produced by Wu et al. using a lower proton implantation strength, which is 10 MeV 19. In 2002, Rashid et al. inform a Si substrate with a resistivity of 0.1 M-cm produced through their six-step implantation method using an implantation energy of 17.4 MeV 20.The high-Q inductors and high transmission gain integrated antenna have been get on the high resistivity Si substrate by Liao et al. and Rashid et al. respectively 18, 20. However, the high process cost is needed for proton implantation method as an enormous dose of 1015 cm-2 to maintain the resistivity of the originally 15 -cm Si substrate to be higher than 1014 -cm 21.2.3Helium-3 Ion Irradiation TechniqueIn 1987, helium-3 ion irradiation technique has been used for carrier lifetime control of silicon power devices 22. The charge trappings created by the helium irradiation and snow scattering of the charged trap will prevent the conduction of curre nt by free mobile carriers in the substrate 23. Therefore, a high resistivity Si bulk substrate can be realised by the reduction in carrier lifetime.In 2014, N. Li et al. reported a high resistivity region created within CZ-Si substrate with a resistivity of over 1.5 k-cm using a dose of 1.51013 cm-2 of helium-3 ions 24. The produced high resistivity Si substrate has been used by N. Li et al. in both work for substrate noise isolation onward motion in a CMOS process and quality factor improvement in on-chip helical inductors 24, 25. R. Wu et al. has also used helium-3 ion irradiation technique in their work on radiation efficiency improvement in 60-GHz on-chip dipole antenna 23.The helium-3 ion irradiation technique has the advantage of saving the product cost up to 97% as compared to proton implantation method by reducing the dose measuring stick from 1.01015 cm-2 to 1.51013 cm-2 24, 25. However, the helium-3 ion irradiation technique is comparably less studied and the problem a ssociated with this technique has not been discussed in the work mentioned above.2.4Deep-Level Doping earnings MethodThe idea of creating high resistivity bulk CZ-Si substrate using deep-level doping compensation has been proposed by Mallik et al. in 2003 2. The basic principle of this method is compensating shallow impurities with deep impurities, i.e. shallow donors are being compensated by deep acceptors (as shown in figure 2.1) whereas shallow acceptors are being compensated by deep donors (as shown in figure 2.2).Figure 2.1 Compensation between shallow donors and deep acceptors 26Figure 2.2 Compensation between shallow acceptors and deep donors 26As illustrated in figure 2.1, deep acceptors introduced an energy level at EA, which is close to the intrinsic Fermi level. The deep acceptors which are negatively charged attract the minority carrier holes to be trapped at EA level. The electrons from shallow donors are initially excited to the conduction luck, then unhorse to EA l evel to recombine with the holes. On the other hand, the positively charged deep donors introduced an energy level at ED as shown in figure 2.2. The minority carrier electrons are attracted and trapped at ED level while the holes from shallow acceptors will fall into valency streak. The trapped electrons at ED level then fall into valency band to recombine with the holes. Therefore, there is no generation of free carriers which reduces the resistivity of the substrate in both cases.Figure 2.3 shows the resistivity of Si at 300K with a background boron tautness of 1014 cm-3, compensated using deep donor impurities with generic wine energy level positions to a lower place conduction band edge, ED. It can be observed that the resistivity of Si increases until a maximal value is reached while the concentration of deep donors, ND increases. The resistivity is low initially due to undercompensation caused by insufficient number of deep donors. The maximum value of the resistivity of Si is reached when deep donors exactly compensate the boron acceptors. Further increase in ND causes overcompensation which results in a fall in the resistivity of Si, making the substrate tends to become n-type.Figure 2.3 mensurable resistivity of Si at 300K as a die hard of generic donor concentration for background boron concentration of 1014 cm-3 2Table 2.2 Positions of energy levels of transition elements in Si 27ElementDonor level below EC (eV)Acceptor level above EV (eV)Co0.890.82Pd0.840.9Au0.780.56Ag0.750.545V0.450.92Mn0.421.0Pt0.3140.889It can be noted that the resistivity peaks are sharper for ED which is lower than 0.3 eV while the resistivity remains high over a range of relatively low concentration determine for larger values of ED. For small values of ED, almost all donors are ionised and take part in the compensation since the donor energy level is nearer to the conduction band than Fermi level. A slight increase in ND causes the resistivity to decrease sharply, c hanging the material to n-type. Meanwhile, for large values of ED, the donor level is near intrinsic Fermi level and less fraction of deep donors is ionised. Therefore, the compensation change gradually with the increase in ND and the resistivity remain high over a wide range of ND.The transition elements are used as deep level dopants as they introduce a pair of deep donor and deep acceptor levels into the Si band gap as shown in table 2.2. The deep dopant energy levels introduced by the transition elements pin the Fermi level near the middle of the Si band gap as shown in figure 2.4 15. Thus, high resistivity CZ-Si substrate can be achieved by capturing the free carriers by deep impurities, which reduces the concentration of background free carrier.Figure 2.4 Fermi level pin by deep levels introduced by transition elements 15Figure 2.5 Calculated resistivity of Si at 300K as a function of Au, Ag, Co and Pd for three different background boron concentration in cm-3 2Figure 2.6 Calc ulated resistivity of Si at 300K as a function of (a) Pt (b) V and (c) Mn concentrations for three different background boron concentrations in cm-3 2Figure 2.7 Calculated resistivity of Si as a function of Au concentration for n-type and p-type Si with a shallow doping concentration of 1014 cm-3 28The transition element dopants are generally grouped into two categories Au, Ag, Co and Pd are in first course of study whereas Pt, V and Mn are in second category. As illustrated in figure 2.5, the resistivity of p-type CZ-Si substrate increases with increasing concentration of the deep dopants in first category. The behaviour of impurities in first category is due to presence of both deep donor and acceptor levels very near intrinsic Fermi level of Si bandgap. For Au and Ag, the resistivity of Si reaches a plateau at the concentration of deep dopants over 1016 cm-3 for three different background boron concentration. The mind for the slight difference in the behaviour of Au and Ag is that the both donor and acceptor level is nearer to the middle in the Si bandgap as compared to Co and Pd.For the second category of deep dopants, the resistivity of p-type CZ-Si reaches a peak and then reduce sharply with the increase in the concentration of the deep dopants as shown in figure 2.6. The reason of the difference in the behaviour is that the impurities in second category have either donor or acceptor level near the intrinsic Fermi level. Therefore, the dopants in second category can only compensate for a single type of drug silicon substrate.The effect of using 3d transition elements as deep level dopants in n-type CZ-Si substrate has not been shown in the work by Mallik et al. Meanwhile, it is shown in the work by Jordan et al. that higher bulk resistivity of Au-compensated Si substrate can be achieved by using n-type CZ-Si as shown in figure 2.7 28. The n-type Au-compensated Si substrate with resistivity up to 70 k-cm has been used by Nur Z. I. Hashim et al. for recognition of coplanar waveguides (CPW) on the substrate 29. Therefore, the potential and problem of using 3d transition elements for deep level compensation in n-type CZ-Si substrate will be discussed in this work.2.5SummaryThe realisation of high resistivity bulk Si substrate using proton implantation method and helium-3 ion irradiation technique was studied. The fabrication of high-Q inductors and antenna has been done on the Si substrate produced using both methods. However, there are problems associated with both methods such as high product cost for proton implantation method and being comparably less studied for helium-3 ion irradiation. Therefore, the idea of creating a semi-insulating silicon substrate using deep-level doping compensation with 3d transition elements was proposed by Mallik et al. in 2003. The deep-level doping compensation method has since been well studied and used for the fabrication of coplanar waveguides and inductors by Nur Z. I. Hashim et al.Reference s1I. D. Robertson and S. Lucyszyn, RFIC and MMIC Design and Technology. IET, 2001.2K. Mallik, R. J. Falster, and P. R. Wilshaw, Semi-insulating silicon using deep level dross doping problems and potential, Semicond. Sci. Technol., vol. 18, no. 6, p. 517, 2003.3Products Capabilities EpiWorks, EpiWorks. Online. on hand(predicate) http//www.epiworks.com/products-capabilities/. Accessed 28-Feb-2017.4Global Manufacturing at Intel, Intel. Online. Available http//www.intel.co.uk/content/www/uk/en/architecture-and-technology/global-manufacturing.html?wapkw=wafer+size_ga=1.16867193.1775779534.1436014173. Accessed 28-Feb-2017.5K. Mallik, C. H. De Groot, P. Ashburn, and P. R. Wilshaw, Enhancement of resistivity of Czochralski silicon by deep level atomic number 25 doping, Appl. Phys. Lett., vol. 89, no. 11, p. 3, 2006.6Smart Cut technology, Smart Choice Soitec, Soitec. Online. Available https//www.soitec.com/en/products/smart-cut. Accessed 28-Feb-2017.7T. Yonehara and K. Sakaguchi, ELTRA N clean SOI Wafer Technology, vol. 4, no. 4, pp. 10-16, 2001.8S. Iwamatsu and M. Ogawa, Silicon-on-sapphire m.o.s.f.e.t.s fabricated by back-surface laser-anneal technology, Electron. Lett., vol. 15, no. 25, pp. 827-828, 1979.9G. K. Celler and S. Cristoloveanu, Frontiers of silicon-on-insulator, J. Appl. Phys., vol. 93, no. 9, pp. 4955-4978, 2003.10R. Dekker, P. G. M. Baltus, and H. G. R. Maas, Substrate transfer for RF technologies, IEEE Trans. Electron Devices, vol. 50, no. 3, pp. 747-757, 2003.11N. Nenadovic, V. DAlessandro, L. K. Nanver, F. Tamigi, N. Rinaldi, and J. W. Slotboom, A back-wafer contacted silicon-on-glass integrated bipolar process. give II. A novel analysis of thermal breakdown, IEEE Trans. Electron Devices, vol. 51, no. 1, pp. 51-62, 2004.12RF and AMS tech for wireless communications, International Technology Roadmap for Semiconductors, 2009. Online. Available http//www.itrs2.net/itrs-reports.html. Accessed 28-Feb-2017.13S. M. Sze, Semiconductor Devices Physic s and Technology, second ed. New York John Wiley and Sons, 2002.14High resistivity silicon for GHz and THz technology, Topsil. Online. Available http//www.topsil.com/en/silicon-products/silicon-wafer-products/hiresTM.aspx. Accessed 28-Feb-2017.15D. M. Jordan, R. H. Haslam, K. Mallik, and P. R. Wilshaw, The Development of Semi-Insulating Silicon Substrates for Microwave Devices, Electrochem. Soc., vol. 16, no. 6, pp. 41-56, 2008.16N. Z. I. Hashim, A. Abuelgasim, and C. H. De Groot, Suppression of parasitic surface conduction in Au-compensated high resistivity silicon for 40-GHz RF-MMIC application, 2014 Asia-Pacific Microw. Conf., pp. 55-57, 2014.17J. Li, myth semiconductor substrate formed by hydrogen ion implantation into silicon, Appl. Phys. Lett., vol. 55, no. 21, pp. 2223-2224, 1989.18C. Liao et al., Method of creating local semi-insulating regions on silicon wafers for device isolation and fruition of high-Q inductors, IEEE Electron Device Lett., vol. 19, no. 12, pp. 461-462, 1998.19Y. H. Wu et al., Fabrication of very high resistivity Si with low loss and cross talk, IEEE Electron Device Lett., vol. 21, no. 9, pp. 442-444, 2000.20A. B. M. H. Rashid, S. Watanabe, and T. Kikkawa, High transmission gain integrated antenna on highly high resistivity Si for ULSI wireless interconnect, IEEE Electron Device Lett., vol. 23, no. 12, pp. 731-733, 2002.21L. S. Lee et al., Isolation on Si wafers by MeV proton bombardment for RF integrated circuits, IEEE Trans. Electron Devices, vol. 48, no. 5, pp. 928-935, 2001.22W. Wondrak and A. Boos, Helium Implantation for Lifetime function in Silicon Power Devices, ESSDERC 87 17th Eur. square(a) State Device Res. Conf., pp. 649-652, 1987.23R. Wu et al., A 60-GHz efficiency-enhanced on-chip dipole antenna using helium-3 ion implantation process, 2014 forty-fourth Eur. Microw. Conf., pp. 108-111, 2014.24N. Li et al., High-Q inductors on locally semi-insulated Si substrate by helium-3 bombardment for RF CMOS integrated circuit s, 2014 Symp. VLSI Technol. Dig. Tech. Pap., pp. 1-2, 2014.25N. Li et al., Substrate noise isolation improvement by helium-3 ion irradiation technique in a triple-well CMOS process, 2015 45th Eur. immobile State Device Res. Conf., pp. 254-257, 2015.26J. D. Puksec and V. Gradisnik, Influence of shallow impurity on steady-state chance function of multilevel deep impurity, 2000 10th Mediterr. Electrotech. Conf. Inf. Technol. Electrotechnol. Mediterr. Countries. Proc., vol. I, pp. 185-188, 2000.27W. Schroeter and M. Seibt, Deep Levels of Transition metal Impurities in c-Si, in Properties of Crystalline Silicon, R. Hull, Ed. London INSPEC IEE, 1999, p. 561.28D. M. Jordan, K. Mallik, R. J. Falster, and P. R. Wilshaw, Semi-Insulating Silicon for Microwave Devices, Solid State Phenom., vol. 156-158, pp. 101-106, 2009.29N. Z. I. Hashim, A. Abuelgasim, and C. H. De Groot, Coplanar waveguides on gold-doped high resistivity silicon for 67-GHz microwave application, RFM 2013 2013 IEEE Int. R F Microw. Conf. Proc., pp. 274-277, 2013.

Friday, March 29, 2019

Dengue Fever and the Immune System

dandy f ever soishness febrility and the Immune System dandy pyrexia computer computer computer computer virus condition variable tramp of dandy fever grogginess syndrome with fatal dandy fever varies from undifferentiated. Because of the increasing incidence and geographic statistical distri nonwithstandingion of dandy fever fever fever in the past 50 years, dandy fever has locomote increasingly greetd as star of the main befoulious illnesss in the world. This research will study the aspects of insubordinate strategy and dandy fever fever. Also offers the greatness of breakbone fever virus contagious infirmity and discusses the current knowledge of breakbone fever fever. dandy fever is a disease ca employ by a mosquito of dengue virus. In the stick up century, the dengue goes up in severity of illness and the geographical distri b atomic pattern 18lyion is now the virtu on the wholey common containtings of human Arthropod-borne viruses in the su btropical and subtropical regions of the world. Dengue is endemic in more(prenominal) than 100 countries around the world. It causes just intimately 50 to 100 million cases per year, including 250,000 to 500,000 dengue hemorrhagic fever or dengue shock syndrome. World Health Organization reveal that the deuce fifth of world population is at a threat of dengue virus contagion. It was stressed that globalization and climate change has a major(ip) impact on the emergence of dengue virus in freshly beas.Dengue is managewise a major economic burden on touch atomic number 18as, with annual cost estimated at just ab place(prenominal) billion dollars. Since at that place is no vaccinum once morest dengue virus, is the primary means of pr dismantleting diseases targeting mosquito vectors and to break the cycle of transmission. This requires a large and rise-organized, as well as financing of hindrance programmes. Although there atomic number 18 programmes in countries affec ted, in Sri Lanka, which is currently in emolument in disease vector control strategies were not sufficient to combat dengue. New tools and novel approach atomic number 18 therefore urgently needed.The brooding catamenia of dengue is around four days. A person virtually to humble fever and to provide occasional macular or maculopapular prime. It was difficult to spy dengue viral diseases, person usually recoers 5 days. In the most salutary cases, fever and rash are accompanied by headache, ritrorbital paroxysm, myalgia, covering pain, sore throat and abdominal pain. Becoming lethargic affected roles suffering from anorexia and nausea.The DHF as dengue hemorrhagic fever has similar incubation period and military discharge selfsame(prenominal) symptoms. all the same, the fever is more flagitious and the tiredness and lethargy more extreme. The long-suffering whitethorn increase vascular permeability and abnormal balance. This arouse cause the individual to reduce th e volume of pedigree, leading to low fall twitch and go in dengue shock syndrome (DSS) and die.Dengue virus contagious disease continues to set a major and escalating global public health problem. compact against vectors of the programs run through been largely unsuccessful or local benefits in the trivial term just and therefore will continue to develop the vaccine is likely to be the most effective control strategy. Diseases of transmitting by the dengue and participation apparent protective insubordinate resolution and disease has proven to be complex and difficult to understand and therefore required more research on these subjects.It is recognized that important steps to rush a wide the dengue fever vaccine established an international network of centers for the clinical trial. Evaluation of vaccine experimentation is while-consuming and therefore you should not burst this process by theoretical considerations. Then only will be an initiative of the dengue vac cine in children in a slope to assess the effectiveness of a variety of weapons to use in the scramble against dengue.1.0 IntroductionDengue fever is a disease caused by virus which is carried by mosquitoes. Then, these mosquitoes acquit the virus to humans. The virus that causes dengue fever has called an arbovirus, which is the oblivious form for viruses hereditary by arthropods. Mosquitoes are arthropod fictitious character insects. Mosquitoes transmit this virus and responsible for passing it along to humans in a some(prenominal) areas. These countries include the Far East, Middle East, Africa, the Islands Caribbean and countries of Asia such as the India, Sri Lanka and the Thailand. In these areas, Arboviruses of dengue fever is wide distribute, which means that the virus naturally and repeatedly and repeatedly lives at those countries (1).To understand how the dengue fever is inherited, several conditions essential be defined. The importee of the word force is an ani mal or human that can be affected with a particular disease. The meaning of the word vector is a body that can carry a particular virus create agent such as a virus or bacterium with no actually develop the disease. The vector can then go by the virus or bacteria to a new host (2), (3).Most common diseases include the cold, m any viral causes of diarrhea and flu or the influenza spread because the viruses that cause these diseases can be transmitted directly from one person to an other. However, dengue fever cannot be transmitted directly from one person give with another. The dengue virus must need an intermediate vector, a mosquito which takes the virus from one host to one more. The mosquito that takes the Arboviruses, reliable for dengue fever is the similar benignant of mosquitoes that can transmit other diseases such as yellow fever. This mosquito is named as Aedes egypti. The more often victims are children less than 10 years (4).2.0 Dengue viral InfectionWhen a person f eeds by an infect mosquito, it injected dengue virus in the bloodstream. The virus infects close to bark cells called keratinocytes the most common type in skin cells. The dengue virus has also infected and reproduced inwardly a specialized resistive cell in the skin, a dendritic cell type called a Langerhans cell (5).Langerhans cells detect the pathogenic invaders and boasting molecules from the pathogens known as Antigen, on their surface. Langerhans cells then pass through to the lymph nodes and reprimand the insubordinate outline to prompt insubordinate chemical reaction as a pathogen inside the body. Lymph nodes are clarified organs that placed all the counseling through body, linked by vessels that form a set of connections named as lymphatic clay (6). Lymph nodes are located in the body to uphold the fight against infection of immune cells.3.0 The immune rejoinderWhen a pathogen as dengue virus invades the human body, the body to defend itself by justification of the body against pathogenic invaders is the immune governing body, which consists of two parts. First part is called as the innate immune system and it provides the body with urgent and regular defensive structure to any pathogen that invading. The innate immune responses pronto identify and react against to pathogens. However it doesnt afford a person with immunity in the long term against an invasion of pathogens.Second part of the immune system called as the adaptational immune system generates cells that target more precisely and in effect towards pathogens and affected cells. The cells created by the Adaptive immune system consist of some B cells secreting antibodies and cytotoxic t cells. Immunoglobulin or Ig antibodies conceal by the cells B specially recognize and attach to foreign molecules. cytotoxic T cells kill cells that are affected with pathogens. Adaptive immune system spends much time to react pathogens that invades the innate immune response (7), (8), but it is a person with immunity against a pathogen in long term.4.0 Dengue Virus Tricks the immune systemWhen the dengue virus infected mosquito bites the skin of the person, then the person also deceases a dengue infected. The dengue virus infects Langerhans cells, a type of dendritic cells in the skin. Infected cells of Langerhans produce interferons can help to limit the continued spread of the infection. Other infected cells to locomotion to the lymph nodes carrying viruses that infect more cells of Langerhans. Viremia is resulted by the spread of dengue virus when the high level of bloodstream affected. In order to fight against infection, the immune system construct antibodies to defuse the virus particles of dengue and the complement system is enabled for antibodies and white blood cells to get free of virus. The immune response also consists of cytotoxic T cells also called as lymphocytes that identify and destroy infected cells.Langerhans cells once infected by dengue virus, they travel on the post of the infection of the skin to lymph nodes. The immune system responds to Infected Langerhans cells are viral antigens of dengue fever on their surface, which enables the innate immune response in alerting the two types of white blood cells called macrophages and monocytes that fight against the virus. In familiar, monocytes and macrophages lease and wipe out pathogens. But as an alternative of destroying the dengue virus, both(prenominal) of white blood cell types are pointed and infected from the virus. Dengue virus tricks the immune system to circumvent the protection and affect more cells (9). As the affected monocytes and macrophages to go through the lymphatic system, the dengue virus spreads all the way through the body. Throughout his trip, the dengue virus infects lots of cells, including lymph nodes and devise marrow macrophages of the spleen, liver and blood monocytes. Widening and the spread in the takings of virus Viremia is a occurrence in which there the bloodstream subscribe tos a high level of dengue virus.Mainly there are four different tensions of dengue virus. These strains are very similar, therefore the immune system recognizes all after seeing one. But the recognition is not protection. Each T cells of humans are automatically identified a specific model or an Antigen. In the first viral infection will be captured and processed by the above mentioned antigen presenting cells. These viruses will be open to T cells forcing them to become activated. And even the B cells will get their floating free Antigen and make ready. B cells create antibodies. They are used to tag the virus to encourage their uptake by macrophages called as opsonization and inactivate them (10).The first infection is identified as dengue fever and stick outed 6 or 7 days (11). Its symptoms closely look like as a disgustful flu. Most people get over it with no incident. If one person become affected from fever again things could le ave in the wrong. Four types of dengue strains that all are super similar. If you are infected with a unhomogeneous strain that you met the first time, you sign up dengue hemorrhagic fever.The reason for happening this is it flecks out that the first infection antibodies attach to virus particles but not inactivate them. The strains are dissimilar enough to endure active in the creation of antibodies against another strain. These are called non neutralizing antibodies. These antibodies will always result in the opsonization if the Macrophages are readily transmittable virus. These speeds up the course on a point infection such as hemorrhagic symptoms are observed. It is one of those interesting times where our immune system not succeeds us. If people were vaccinated for dengue and if soul missed one out of those four vaccines has been inactivated by the improper storage, they would be very susceptible to dengue hemorrhagic fever.5.0 Immune system Defeats the Dengue VirusAlt hough the dengue virus has trapped immune system to infect cells and widen all the way through the body, the immune system contain further protection against the virus. Infected cells produce and release the tiny proteins named as interferons that are part of a huge collection of proteins named as cytokines. Interferons have the capability to interfere with viral replication and they activate the innate and adaptive immune defenses. They help the immune system recognizes cells infected by dengue and help protect cells not infected infection. The immune system, fight against dengue infection so the person will experience a fever (12).As the Adaptive immune response begins to fight against dengue infection, b cells produce antibodies IgM and IgG which are released into the blood and lymphatic eloquent, where they specifically identify and deactivate dengue virus particles. In another immune response adaptation, killer T cells or cytotoxic T cells, recognize and kill cells infected wi th the dengue virus. Active innate immune response of the complement system, response that helps antibodies and white blood cells get rid of the virus. unneurotic with the innate and adaptive immune responses defuse infection of dengue and the enduring will recover from dengue (13).If there is a huge stratum of virus in the bloodstream an infected person is experiencing acute dengue symptoms. As the immune response against infection by the dengue, persons B cells begin to create antibodies called IgM and IgG which are released into blood and the lymph fluid and then they identify and defuse the dengue virus and the viral such as dengue NS1 protein molecules (14). The immune response get rid of the virus and leading to recovery.6.0 Secondary infections of DengueAfter a dengue infection for the first time person is protected against infection with the troika serotypes of dengue rest for several (2-3) months. Unfortunately, its not a semipermanent protection, and after this short t ime period, person can be affected with any of the three serotypes of dengue that are outstanding.Around 1960s, Dr Scott Halstead and some of his colleagues are studying in Thailand dengue virus (15), (16). They noticed that the people who had been infected to dengue virus mo time had a bigger try of severe dengue compared with who had not been infected previously. They were asking what makes a second infection of dengue, not as well as the first.In general after an infection from a pathogen, the body keeps in mind the infection for long because the cells named as memory B cells and memory T cells watch inside the body. Since they remember the first disease, memory cells can respond quickly to provide an adaptive response, when infection occurs for the second time. Memory cells can stay behind in the body for many years or even a lifetime. These memory cells help fight a second dengue infection. More often worse than the first infection second dengue infection.Halstead proposes a phenomenon called dependent improvement of antibodies to the infection to explain these observations. in that location are four types of dengue (serotypes), but the cells of memory do the immunity against reinfection by serotype of dengue fever that caused the first infection. When a person is infected with a second dengue serotype, Halstead suggested that antibodies to the first infection actually help spread of dengue virus infection and increase the amount of virus in the blood, Viremia. This phenomenon can also occur in children who received antibodies against dengue of their sire while in the uterus. Curiously, rather than destroy the virus, existing antibody and the antibody newly produced by the memory can of b cells actually help the virus infected host cells more effectively. Ironically, the consequence of dependent development of antibodies is the response of the immune system in fact makes the clinical symptoms of the dengue fever situation and raises the risk of serio us diseases of dengue.In a second dengue infection cytotoxic T produced by the immune system cells provide only partial immunity against the new serotype of dengue (17). Cytotoxic T cells are not responsible for effectively remove the virus from the body and they issue some excess amounts of molecules named as cytokines. In general quantities and cytokines help out the immune response. Though in large quantities, cytokines may produce severe inflammation and tissue such as capillary expose at cultivation contribute to the development of serious diseases of dengue.7.0 Factors That Contribute to Severe Dengue Infections legal community of dengue fever means reducing the mosquito population. Any resources of standing body of water such as buckets, vases, etc. where the mosquitoes can breed must be eradicated. Mosquito repellant is suggested for those areas where dengue fever is widespread. To help break the cycle of spread, downhearted diligents those who are suffered from the de ngue fever must be placed in bed net, then the mosquitoes cannot bite them so that they wont become arboviral vectors (18).Became the prevention and the fight against dengue, dengue hemorrhagic fever and urgent distribution of geographic expansion and increase the spread of the disease over the last 20 years. Unfortunately, the tools procurable to prevent dengue are very less. at that place is a no any vaccine invented yet, and the limited option available to fight against mosquitoes. Clearly, the emphasis should be on prevention of the disease, and if the trend uphill diseases must be reversed (19).If the effective prevention of the disease and several structured components, including active laboratory surveillance and emergency response and health check community education to guarantee successful management of the situation, mosquitoes community integrated pest and use of effective vaccines when available Disease Control active is an important part of prevention program agains t dengue. In addition to observe secular trends, the purpose of monitoring should be to give warning or predictive capability for the transfer of the epidemic, and the reason is that if you cannot predict epidemics can be avoided by starting by fighting against mosquitoes emergency. For the prediction of epidemics, health political science and should be able to precisely control the transfer of dengue virus in the community and be able to say at any time that the virus is transmitted virus serotypes rotation and related this kind of disease with dengue infection. To do this, the system must be on site.8.0 Causes and symptomsDengue fever can caused when a mosquito bites a human carrying the Arboviruses and transmit the virus to a new host. When the live virus inside body, it moves to sundry(a) parts where it crashed. The virus is able to then go through the bloodstream. The existence of the virus within the blood vessels causes modifications to these blood vessels. The vessels enla rge and blood leak through the vessels. The spleen and lymph nodes become swollen. A procedure called disseminated intravascular coagulation (DIC) happens, where chemicals applicable for clotting are used up and it will guided to severe bleeding which is called as hemorrhage.When the virus has been spread to the human host, happens a period of incubation. During this time it last approximately five to eight days, the virus multiplies. The signs of the disease come out at once and consist of headache, high fever, chills, affection pain, lymph nodes swollen, red eyes, back pain, red hunting in the face, extreme flunk and severe pain in the limbs and joints (20).This early duration of the disease is astir(predicate) 2-3 days and after this duration, fever decreases rapidly, and the patient sweats strongly. After about a day to feel relatively well, the patient temperature increases again, but not as much as the first time. Begins a rash of small red bumps on arms and legs, spread t o the chest and abdomen. It hardly ever affects the face. The palms and the soles of hands and feets swollen and turn bright red. The combination of characteristic of fever, rash and headaches are named as the dengue triad. Many people get well completely from dengue fever, even if the weakness and fatigue may last numerous weeks. When a person has been suffered by dengue fever, his immune system guards produce for about a year cells that prevent reinfection from dengue virus (21).More serious diseases can occur in some people. These persons may meet with dengue fever for the first time. Anyway, in some situations, that a person may have already had dengue recovered at a time and then is re-infected with the virus. In these cases, the infection first guides the immune system to identify the attendance of the Arboviruses. When the immune cells the virus infections later, the immune system reacts. These types of disease called dengue hemorrhagic fever (DHF) and dengue shock syndrome ( DSS) (22), carry more strict symptoms. Fever and headache are the opening symptoms, but signs of dengue fever are not present. The patient improves a cough up go after by the appearance of small purple patches named as petechiae on the skin. The petechiae are areas where the blood is leaking from the ships. Large areas bruises appear as the getting worse bleeding and abdominal pain can be strict. The patient may starts to vomit a material that is similar to coffee. It is actually a sign of hemorrhage in the stomach (23). As the blood vessels turn into more injured, they escape more and carry on increasing in diameter called as dilation, causing a decrease in blood flow to the body tissues. This condition of reducing the blood flow is called as shock. Shock can cause damage to the organs of the body particularly the heart and kidneys, because the low blood flow deprived oxygen (24).9.0 diagnosisDiagnosis should be detected in native areas each time that a high fever continues f or 2-7 days, especially if go together with by a ability to hemorrhage. The signs of shock should suggest the development of the disease to the dengue.There are several types of Arboviruses but one of them causing dengue fever that can be isolated from the blood blood blood serum (25), (26). The serum is the fluid that the blood cells are floating. Serum can be verified because the manikin in which the virus moves into the bloodstream is longer in DF than in other arbovirus diseases. Numerous tests are used to find reactions between the serum of the patient and antibodies produced in the laboratory. Antibodies are particular cells that identify the markers or antigens present on the attack of the body. During these tests, the antibodies are mixed with a sample of the patient serum. Health care workers and then looks for reactions that would occur only if the virus antigens are present in the serum (27).10.0 New diagnostic technologyIn young years, he has developed several new me thods of diagnosis and has prove very useful in the diagnosis of dengue. After reviewing this issue in depth over the past. Here follows a brief description of the various(a) methods below.10.1 PCRReverse transcriptase PCR (RT-PCR) was build up for numeral ribonucleic acid viruses in recent years and possible to modernize laboratory diagnosis of dengue (28). RT-PCR provides a rapid diagnosis specific serum. This method is fast, simple, sensitive and reproducible if handled properly it can be used to discover viral RNA in human clinical specimens and autopsy tissues, or mosquitoes. There were number of methods developed involving primers genome in different places and different methods to detect RT-PCR products in recent years (29).10.2 ImmunohistochemistryA major problem in the laboratory diagnosis of dengue confirmation of fatal cases. Only one sample is obtained serum and serological tests of limited value. In addition, most patients die at the same time or shortly after deferv escence as the virus isolation is difficult (30). With novel techniques of building, it is now possible to detect antigens of dengue viruses in a variety of tissues.11.0 TreatmentNo treatments are available to reduce the course of dengue hemorrhagic fever or dengue shock syndrome. Drugs to reduce fever and decrease muscle pain and headache pain (31). Fluids are given through a needle into a vena to prevent dewatering. Blood transfusion may be necessary if serious bleeding happens. Oxygen should be given to shocked patients (29).12.0 ConclusionThe immune system is the bodys defense against viruses dengue Home. When a person is infected with the dengue, response to innate and adaptive immune system to join forces to fight against the virus. B cells create antibodies which specifically identify and defuse foreign particles and viral cytotoxic T cells to recognize and destroy cells that are infected by the dengue virus. For people who can develop later with another type of dengue virus experience called antibody based on the promotion. This situation occurs when the immune response leads one clinical symptoms of dengue worse, which increases the risk of severe dengue.

Thursday, March 28, 2019

Travis Barker is an Admirable Person :: essays research papers

Why Travis Barker is an Admirable Person genius of the commonwealth that I admire is Travis Barker. Travis Barker is a drummer in the flock blink-182. Although he may be renowned, he acts like a shape guy you realise every day. Most people think of person who is famous as being egotistical, stuck up and think they are come across better than everyone else in the world. Travis basically proves all of those opinions wrong and makes you realize that although around famous people may be that way, not everyone is.Travis is a very skilful drummer and takes his work seriously. Travis wasnt the original drummer for blink-182. The original drummer wasnt able to make it to a concert because of family reasons and the separate devil members asked their best friend, Travis, to drive in even thoughhe didnt know how to play whatsoever of their songs. Even though it was only an hour before the show when they asked him to fill in, Travis didnt trust to let them down so he verbalize h e would learn every song and perform with them. They didnt want the audience to hear Travis learning how to play the songs so they found two sticks and that was what he used to practice with. An hour later, Travis went on stage and performed with the other two guys in blink-182 and amazed the displace as well as his two best friends. When the original drummer said he wanted to go to school and was leaving the band, they asked Travis to take over since he had amazed the crowd with his awesome ability to play the drums. Travis doesnt only play the drums, he also teaches drum lessons. Travis visits his homein San Diego, CA often and opus he is there he gives young children who dont ingest much money, if any, drum lessons. He says he loves working with young kids particularly since he knows they dont have a lot of money. He says this is his way of giving something back to his hometown. Travis also likes to think that even though these kids families may not ever havemuch money, they may be able to become a drummer one day and earn some money.Even though Travis is well-known, he hasnt let this affect his life. When people stop him to say Youre Travis Barker from blink-182, he acts like you see someone from blink-182