Thursday, April 4, 2019

E Governance Research Paper

E Governance Research pieceE- disposal means electronic governance. It is application of In melodyation technology in regimen functioning in severalise to have good and smart governance. Smart here refers to Simple, Moral, Accountable, Responsive and Transp bent. This involves using cultivation and chat engineering science by government agencies to have transpargonnt dealings with different employrs. There atomic number 18 many reasons for which e governance is require. rough of them are as follows(a) Information diversify with citizens, businesses or other government departments(b) Speedy way of doing engage(c) Time and cost saving(d) Efficient words of ordinary go(e) Improving internal controls(f) increase revenue(g) Re-structuring of administrative abutes(h) Providing reference operateInformation and Communications Technology (ICT) has tind means for hot and give way communication, quality services, efficient storage, effective figure out, processing of data and exchange and utilization of selective information to its users. It helps in providing part controls and change magnitude revenue. All individuals, groups, businesses, organizations or governments are benefited by the advantages of ICT. It is a faster, to a greater extent than accurate and simpler means of word-processing and is instantaneously creationness utilise as a tool for tabulating data which fin altogethery helps in decision making. With increasing awareness of using computers and internet many users are benefited and they are motivated to modify their ways of doing things in order to en-cash the advantages provided by ICT.This has led to re-engineering of business processes.The process of re-engineering helps in faster and divulge processing of information and frankincense a better decision making, greater reach and better utilization of resources .This helps in having general good governance. In the case of citizens, it provides enhanced access to informatio n and government agencies, efficient service delivery and transparency in dealings and as surface as acts as an information tool to the government.With the increasing awareness among citizens virtually their rights their expectation has tot whollyy changed .Today they expect government agencies to be transparent in their dealings, accountable for its activities and faster in its responses. For this use of ICT helps in achieving good governance. The technologies employ helps in achieving a wide range of objectives. There is equitableand faster development with a wider reach. Today Ethics in Governance, with the help of tools of modern technology much(prenominal) as Information and Communications Technology (ICT) should be used to transform the relationship of the government with its employees, citizens and businesses, and also in the midst of its own agencies. It has been recognised that e-Governance is the logical step with the use of ICT in systems of governance in order to check wider participation and deeper involvement of citizens, institutions, civil society groups and the private sector in the decision making process of governance.REQUISITES OF E GOVERNANCEFor effective e governance the foremost requirement is that work intrust has to be richly supplyd.Computer is the mostImportant requirement for e governance.Computers should be touch baseed so that online work is possible.There has to be approximately online work black market mathematical operation. giving medication employees should be trained so that they spate work on the software. The training is required so that they operate user friendly with the software. Services should be fully accessible. It also insist in removing the report card based system and making everything computerized to increase the transparency of work and a speedy flow of work is possible.TYPES OF INTERACTIONS IN E GOVERNANCEG2G (Government to Government) In this case, in that respect is moveion deep down go vernment agencies to improve the qualification and overall output. The fundamental interaction washbasin be deep down a government organisation or among two government organisations. Information and Communications Technology helps not only to restructure the governmental processes affect in the functioning of government entities but also aids in increasing the flow of information and services within and mingled with different entities. The interactions can be either vertical or horizontal. naiant i.e. between different government agencies as well as between different functional areas within an organisation and vertical i.e. between national, provincial and local government agencies .There is also interactions between different levels within an organisation. The primary objective of G2G is to increase susceptibility, performance and output.May be horizontal or vertical function of government agenciesIncrease in efficiencyImproved performanceEfficient outputG2C (Government to Citizens) In this case, there is an interaction between government and citizen. A public platform is created between the government and citizens which enables the citizens to benefit from abundant range of public services. This provides the availability and handiness of public services on the ane hand and improves the quality of services on the other.Here is a two way communication model in which there are direct interactions between government and citizens involving transparent dealings between the parties. It gives citizens the choice of when to interact with thegovernment (e.g. 24 hours a day, 7 days a week), from where to interact with the government (e.g. service centre, unattended kiosk or from unitys root word/workplace) and how to interact with the government (e.g. through internet, fax, telephone, email, face-to-face, etc). The primary purpose is to make government, citizen-friendly.Acts as an interface between govt. and consumerExpands accessibility to public servic esMakes the government citizen friendlyEnsure transparent dealings shells of G2C TransactionsOnline paying of billsfile of FIRLicensing and adaptionProcurement and BiddingTax and fee paymentsCitizen help deskPublic Information mesh sort outologySearch topographic point assessment valuesProperty tax paymentsInformation about political processes and servicesE sevaExemplifies democracyIncreased citizen participationPassport queriesG2B (Government to Business) In this model there is interaction between government agency and business organisations. E-Governance tools are used to help the business community providers of goods and services interact with the government. The objective is to cut red tapism, save time, thin operational costs, increase revenues and to create a more transparent business surround when dealing with the government. The G2Binitiatives can be transactional, such as in licensing, permits, procural and revenue collection. Trade, tourism and investment opportuni ties can be effectively handled with e governance . These measures help to provide a suitable environment to businesses and thus enable them to perform more efficiently.E governance used to aid business communitySaves timeReduces costTransparent transaction dealsIncrease revenueExample1. Payment of taxes by business houses2. Tender applications are transparentIf any business house has utilize for a brand name it can also be monitored online and status can intimately be cognise.There can be transparent dealings in all tenders and different government works.G2E (Government to Employees) In this model there is an interaction between government organisation and employees. Employees can interact with the government in regular basis. The interaction can even be vertical where the employees can give feedback at the self-reliance of their name held anonymous. Today through e governance they can also have a as sealed at their TDS and pay roll status. E governance provides them with a c ommon platform to remove their queries and thus giving an effective performance. This interaction is a two-way process between the organisation and the employee. Use of ICT tools helps in making these interactions fast and efficient on the one hand and increase satisfaction levels of employees on the other. allay government and employee communicationFast and EfficientIncreases satisfaction of employeesSynergy in work outputremotion of biasImplementation of e governance in IndiaIndian government has taken many initiatives in the field of IT for the desired executing of e governance in India. The political platform popularly known as the E governance action plan correctly portrays the long term growth action plan for India. Its successful implementation was seen during the period of 2003-2007. It provided both the citizen centric and the business centric governance all unneurotic at the local, state and the national level. It was a good kick start an many flaws were seen thereto su ch as suitable system for quickly motivating the states needs to be improved, a single window for providing services to the citizens should be implemented, whether and whenever possible outsourcing of services should be implemented for quicker growth perspectives, more efforts were required to stabilize and increase the public private partnerships, improved connectivity was required. Such flaws were thoroughly noted and improved thereon. apart(predicate) from the 2003-2007 action plans, many other plans were successfully implemented. Some wereImplementation of Information Technology Act, 2000 .It helped in providing the good framework for all the electronic transactions. The act came into force on 17 October, 2000.National Taskforce for Information Technology and Software development was established in the year 1998.Centre for E governance was created for successful gene linkage of the local, state and he national level and so that efficient help could be made useable at all ends .e office was established so that offices , ministries , departments and authorities could be electronically connected.HPC i.e. the high Powered Committee was created with the cabinet secretary made its head for the successful implementation of e governance.A Joint Secretary level Officer as the IT manager was appointed in every Ministry and Department.Websites for all Ministries and Authorities was developed for the wide coverage and availability of E governance.One can surely phrase that E governance has been successfully implemented in India. A lot more needs to be achieved in this respective area. Majority of the states are implementing E governance in their working. They are making a collaborative effort in shifting from the manual working model to the electronic working model. It can be inferred that more of the planned implementation of IT is what the need of the hour.More of mogulful, efficient, quicker strategies may be cadaverous for a powerful implementation of E gove rnance.Success of E governance in IndiaIndia as a country is majorly built on Bureaucratic structures which are built in rationale principles and therefore is by all odds failing ti cope up with the present scenario. Therefore a shift from such conventional practices to the complete new electronic world was definitely requires. E governance plays the major role for the implementation of such paradigm shift toward the module of E governance which itself holds as one of the major reasons for its success. at present we have single window operations, more simplify procedures, a better office and record management, slight corruption, better job and position handling.The service delivery instruments have considerably improved.We need not have a bun in the oven in long queues now, there is less of procedural complexities and the personnel working has considerably improved and has wrick more transparent. The reason behind such success is the successful implementation of the Informati on and the Communication Technology. The citizen has become more aware now.He is no longer a puppet in the hands of the government employees and has got a full right to question any kind of discrepancy.E governance is surely a success. A transparent government with a satisfied consumer is what E governance is responsible to produce. E governance in India has definitely given us such results to see which is a step ahead for a developing country like India.Major E-Governance roams in India1. Project Vidya Vahini -Project Vidya Vahini is a look started by Government of India in collaboration with Shiksha India, a non profit organization launched in December 2001. Shiksha India was launched to equip Indian schools with 5 Cs1. Computers2. Connectivity3. Coaching (Teacher Training)4. Content5. Commercial sustainability modelsProject Vidya Vahini portal provides the opportunity for schools, teachers and students all crosswise the nation, to express and share their creative and academic p otential via the internet. The portal further aims at creating such an environment by providing facilities for Content Development, Content Deployment and collaboration.Further the mission of the plan is to spread better statement and equal quality of education across India to develop the creativity and problem solving skills of the Indians. Shiksha further strives to increase the earning capacity, reduce information arbitrage in cracker-barrel India and promote entrepreneurship by providing computer literacy.Shiksha India is also working in partnership with The Ministry of Information Technology in the redact Vidya Vahini and Ministry of Human Resources under the CLASS scheme which aims to connect 60.000 schools (approximately 20 million students) across the country in next five years. residual Users/Beneficiaries Populace carry where utilize Across IndiaWebsite http www.vidyavahini.ernet.in/content/shiksha.htm2. Project Stamps and Registration Software-Project Stamps and Reg istration Software is one of its kinds of construe started by the Government of Maharashtra. Generally the stamp and registration department of any state is the top revenue earner for any state government. The Stamp Registration software provides efficient government citizen interface, and also enables enhanced revenue earnings for the Stamps and Registration operation.The core of this application consists of the Registration and Valuation module. Other modules are the Networking and Scanning modules that enable exchange of information securely across departments, and electronic modeling of the registered documents thereby change return of the original document within few minutes of presentation. The stipulated turnaround time is approximately 25 minutes 15 minutes for registration and 10 minutes for scanning the document (Before getting computerized, it used to take many hours and sometimes days). The project after being successfully run for IGR, Maharashtra in Pune sites, is b eing proposed to be implemented in BOT (Build Operate Transfer) basis with participation from private parties.End Users/Beneficiaries Populace cite where Implemented Maharashtra3. Project Setu -Project SETU was introduced by the government of MAHARASHTRA to felicitate the very staple fibre need of the great deal and introduce a single window interaction of redressal of all their grievances. With the help of IT this single window interaction is made faster, convenient.The main objective of this project was to reduce the effort of the common man to obtain various(a) certificates.Prior to implementation of this project, to obtain a certificate common man had to run from pillar to run of various government offices. This resulted in a lot of hardship.The Project Setu not only provided the users a one stop destination for a number of certificates but also a faster and a more transparent response to their problems.In the initial phase, this project was implemented in the big cities, a fter examine the response, the government is planning to implement this at taluka and subtaluka level.The Integrated Citizen Facilitation Centres (SETU) is to work on the basic needs of the citizens and reorienting our administrative processes accordingly. The aim is to lay the foundation for e-governance, create visible impact of the intention of the Government in this direction, and avail the interaction of the citizens with the Government to make it more transparent, pleasant and satisfying. To create foundation for citizen centric e-governance, at partition headquarters subsequently at taluka headquarters Single window clearance of 83 important certificates (includes revolution of leases, permits licenses) Quick redressal of public grievances Common registry of letters, petitions for all sections of the office. On line pendency monitoring of all supra To provide services after office hours on holidays also in order to save Time, currency Energy of the public.End Users/Be neficiaries PopulaceState where Implemented MaharashtraWebsite http http//setu.maharashtra.gov.in4. Project Fast Transport Department modify -This project aims to curb the rampant corruption in the traffic department of the state.Project fast was started as a polisher project in three main cities namely Secunderabad, Vijayawada and Chittoor.Fast is the short form of Fully Automated Services of Transport aimed at providing a citizen friendly, corruption free and a root on service related to traffic department like issue of driving license registration of labor vehicles.The objective of FAST is to make the transport department citizen friendly in its functioning and provide languish services to the public. It is intend to build comprehensive database and provide on-line services to the public covering various services like Issue of Driving Licenses, Registration of Motor vehicles, Issue Permits, Collection of Motor Vehicle Taxes, etc.All the RTO department would be linked to ea ch other to felicitate better communication and all the offices in the state would have interconnectivity through APSWAN.The computerization process is planned to take place in two phases. In phase I, Regional Transport offices of Secunderabad, Vijayawada and Chittoor have been covered on pilot basis. The remaining offices are to be covered in the second phase. However, a less powerful central server is to be located at the office of the Transport Commissioner for the purpose of inter-connectivity between these three RTO offices.End Users/Beneficiaries PopulaceState where Implemented Andhra PradeshWebsite http http www.aptransport.org5. Project Mudra -MUDRA Municipal Corporation towards Digital Revenue administration.This project is intended to help Holding owners, Tax collectors, and officials at headquarter levels and Circle levels. This would help them to get a occur regard of tax collector and would help them to make a better future decision.This project is designed to compu terize the overall functions of tax collection system of Patna Municipal Corporation.Revenue management is the key to economic perceptual constancy and development of urban infrastructure to help it to discharge its function properly and cater to the requirements of economic development.The basic objectives of this software, developed and implemented by NIC Bihar State Unit includes bringing improvement to the quality of service being offered to the citizens and at the same time, it will also become possible for the first time to track all kinds of defaulters on payment of taxes due. This will assist the Municipal Corporation in acting quickly and well in time and is expected to have a very positive impact on the total revenue that is currently being collected by the Municipal.End Users/Beneficiaries Officials of Municipal CorporationState where Implemented Bihar6. Project Bhoomi -This project was started by the govt. of Karnataka with an aim of benefiting the rural population of t he state. As the name itself i.e. BHOOMI convey that, the project is related to land. This project came into existence because of the difficulty the farmers have to suffer previously for getting a copy Records of Rights, Tenancy and Crops RTC. This document is helpful while procuring bank loan. Delays and bribes were also being asked. But after the enforcement of this project this document can be availed by paying a fee of Rs. 15 only. Under this project the revenue dept. of the state has maintained 20 million records of land owned by 6.7 million farmers by which a computerized copy of RTC is available at the kiosks (BHOOMI CENTERS). This technology is designed by national informatics centre. This project has won silver CAPAM awards 2002 for the in valuable contribution in uplifting of the rural population in the state.End Users/Beneficiaries Rural PeopleState where Implemented Karnataka7. Project E-Seva (Electronic Seva)This project was launched on 25th appalling 2001. This is the improved version the TWINS project launched previously on 1999. Under this project the govt. of Andhra Pradesh has opened around 36 e-seva centres in spread over the twin cities of Hyderabad and Secunderabad and Ranga Reddy district, it provide around 118 different facilities to the local public from 8.00 am to 8.pm and 9.30am to 3.30 pm on holidays. 70 centres are in operation covering municipalities in 13 districts. It provides services of the likes of payment of utility bills/tax, issue of birth/death certificates, filling of sales tax returns, diff B2C services, and registration of application for passports, etc.These services can be availed at any counter in the centre, others than these some 21 more types of services like railway reservations, TTD services, Bill payments of different cellular co. like AIRTEL,VODAFONE,RELIANCE. and so on Govt. has also earned a whopping revenue of around 2000 crore (Feb 2003). So it is helping both govt. as well as the public.End Users/Benefi ciaries PopulaceState where Implemented Andhra Pradesh8. Project Lok Mitra -This project is also known as INTEGRATED CITIZEN SERVICE CENTRE / E-KIOSKS, ICSC. This is the first project its kind in Rajasthan. It aims at providing certain INFORMATON TECHNOLOGY services to rural population of the state. The services are like teach the public how to use credit cards for making payments, and others different it related services in a single window. It is a one stop citizen friendly computerized centre located in the heart of the city of Jaipur.The whole mechanism is governed through a computer server which is linked to different departmental servers through dedicated rent line dial-up network with multiple e-counters.End Users/Beneficiaries PopulaceState where Implemented RajasthanWebsitewww.rajasthan.gov.in/it/eg/lokmitra.shtm http//www.lokmitra.gov.in9. Project Dristee- Connecting India village by villageThis project is also known as WORLD AT A GLANCE for the pack who have been benefi ted yet by it. This project provides e-governance and provides facilities related to health, education, market related information, and private related exchange and transactions. Dristee offers its platform to any service provider who wishes to market its range of products to rural India by plugging its range of services offered at village level.This provides scope for the rural people to sell their products at the market at extremely beneficial prices such that they earn a maximized rate of return. It also provides social benefits like access to education and health care information. It is helping in reducing the migration of people from rural to urban areas.Dristee is presently undecided of enabling the creation of approximately 50,000 information kiosks all over India within a span of vi yrs. These kiosks would be able to serve around 500 million people, with an aggregate discretionary purchasing power of Rs.100 billion in less than two yrs.This communication backbone has been supplemented by a string of rural services for example- avedan, land records, gram daak, gram haat(virtual village market), vaivahiki(matrimonial), shikhyat,etc.this project at last provides affair to a large section of un apply population in the village. Around 45000 people have been employed till 2003 under this programme by the kiosks owners.End Users/Beneficiaries Rural and semi-urban peopleState where Implemented Haryana, Punjab, Madhya Pradesh, Gujarat, OrissaWebsite http//www.drishtee.com10. Project AArakshi -This project is an intranet based system that has been developed andImplemented for Jaipur City Police. This innovative system enables the city constabulary officers to carry out on-line sharing of crime Criminal data bases carry out communication and perform monitoring activities.The Software provides a facility to update Perform queries on database of FIRs. Latest word of honor of criminals Crimes.12 Telephone Directory of Police Officers. Messaging. Instruction s of Police Control Room on Real Time basis. general offenders details along with photo gallery. Description of criminals. Missing Persons. Police Personnel. Property Details. Numbered / Unnumbered property. Vehicle theft / Seizure. Cultural Property.End Users/Beneficiaries Jaipur Police OfficialsState where Implemented RajasthanHOW THE NATIONAL CAPITAL DELHI CAN BE BENEFITTED FROM E-GOVERNANCEAs the various projects that have been studied above in the research paper have been implemented in different parts of our country successfully its very much required that such efficiency in implementing the projects should be shown in our national capital i.e. Delhi. Around the time clock , such projects have shown efficiency in the working system of the particular area , laws have been better maintained , efficient property assessments have been procured , reduction in corruption have been noticed , lesser time wastage and a fairer and a transparent government has been achieved. From the a bove study we can observe that such regulations should be proceeded with the Delhi region as well.Firstly to start with as far as the stamp papers are concerned , the common problem that one faces is the unavailability of the required denomination by the defileer. Due to such problems they have to buy higher denomination stamp papers and therefore a common citizen faces trouble. Therefore if such stamps are made available online , e governance would prove helpful and reduce a common citizens problems.Secondly, if e governance is successfully implemented in the delhi region people and the government can come into edge with each other at a single point. Hence no time wastage on a citizens part and no resources wastage on the part of the government would prove advantageous. Commonly a citizen needs to be in contact with the government as regards the issue of birth certificate, death certificate, and other legal documents that a citizen would commonly reqire at his very own disposal. It is the duty of the government to make his citizens available to all such requirements. Therefore, if e governance is successfully implemented in delhi region , such issues can be easily solved.Thirdly, if e governance is successfully implemented in Delhi , the long licensing and application procedures can be simplified to a great extent. The procurer can fill the forms and the desired information online with just the authentication procedure to be done physically. This will reduce a lot of problems faced both by the citizen and the government.Fourthly, e governance implementation in Delhi and around the regions can make the payment of taxes , allotment of identities , collection of payments and notes and various other financial transactions very transparent and accurate.Peoples legal issues , transparency , faire government , better access to information , change for the working module of new culture can all be easily maintained. With the successful implementation ICT penetrator s , lack of trained human resources and very large geographical distances can be easily resolved.REFRENCES1.Records Of World Bank2.Sites which were ReferredGoogle.com3.Referred Linksit.delhigovt.nic.in/rs1/e-govproject.htmlhimachaldit.gov.in/page/e-Governance-Projects.aspxhttp//books.google.com/books?id=xI12St_xx0MClpg=PP1dq=e-governancepg=PP1v=onepageqf=falsehttp//egovindia.wordpress.com/category/egovernance-projects-around-country/Government of india, Information Technology Actin plan IT for all Indians by 2008 http//it-taskforce.nic.inKochhar Sameer and Gursharan Dhanjal , (2005). E government Report Card , Yojna , Vol.49

Wednesday, April 3, 2019

Cyber Bullying Is Growing Rapidly Psychology Essay

Cyber Bullying Is Growing Rapidly Psychology EssayAlthough ballyrag has been around for centuries, it has only been in the past twenty years that inquiryers concord tried systematically to measure boss arounding (Kowalski, Limber, Agatston, 2008). In 2001, the first field of view of blusterous in the joined States was conducted with more than 15,000 students in grades 6 by 10 (Kowalski, Limber, Agatston, 2008 Nansel, et al., 2001). Tanya Nansel and her fel d feature(p) searchers found that, within a single shoal term, 17% of children and y kayoedh said they had been bullied sometimes or more often, and 19% had bullied early(a)s sometimes or more oftentimes and 6% said they had been bullied and had bullied others sometimes or more often. In 2005, David Finkelhor and his colleagues conducted telephone interviews with children and p arnts, and found that 25% had been titillated or emotionally bullied during the previous year (Kowalski, Limber, Agatston, 2008 Finkelhor, Or mrod, Turner, Hamby, 2005). The interrogationers estimated that 13.7 million children and youth were physically bullied and 15.7 million were teased or emotionally bullied each year in the U.S.(Kowalski, Limber, Agatston, 2008). The massacre at aquilege High tutor in 1999 seems to baffle been pivotal in foc utilize watchfulness on blusterous in the United States. Although the specific motivations for this (or other crop strokes) whitethorn never be fully understood, retrospective accounts in the popular weight-lift and in the research literature pointed to hectoring as a contri exactlying factor in more of these crimes (Kowalski, Limber, Agatston, 2008 Limber, 2006 Fein, et al., 2002). A search of the Lexis/Nexis database exploitation the search terms blusterous and nurtures demonst rank how much inculcate attention to school ballyrag has changed in late(a) years within the United States. In 1998, the year prior to the Columbine shootings, school blusterous was in the headlines of Ameri dejection pertlyspapers, magazines, and other popular squash periodicals 145 times. The following year, the number of articles on school push around doubled, and, in 2001, shot to more than 750. There has similarly been an increase in attention to browbeat among researchers since that time. In a search of the Psych Info database using bully or intimidate as search terms, in that respect were only five dollar bill publications in 1990. By 2000, the number increased to 94. In 2004, there were near 250 such publications. Cyber determent wasnt even an issue in the 1990s. However, with advances in technology, children argon now exposed to a new get to of bullying cyber bullying (Kowalski, Limber, Agatston, 2008). Cyber bullying occurs only surrounded by minors. If an freehanded is involved, the behavior is labeled cyber molestation or cyber stalking (Kowalski, Limber, Agatston, 2008).Much of the attention in the popular press and professional li terature has foc ingestiond on sexual predators that seek out their dupes finished online venues such as Facebook and Myspace. The same can non be said of cyber bullying. significantly less attention popular, academic, and/or legal has been devoted to the topic of cyber or electronic bullying. The reality, however, is that the majority of children atomic number 18 more equivalently to be targeted by a soulfulness who cyber bullies than by a stranger they wipe out met on the Internet who is trying to arrange an killline meeting(Kowalski, Limber, Agatston, 2008).In 2005, it was estimated that 17 million adolescents of age(p) 12 to 17 mapping the internet, and 74 pctage of teens IM (Lisante, 2005 TEXAS STUDY, 2009). Today, 87% of U.S. teens physical exertion email and 93% wont the internet (Jacobs, 2010).WHAT TYPES OF CB ARE OCCURING THE MOST?Although conventional bullying is still more common, cyber bullying is increasing rapidly. Cyber bullying may occur through pho ne calls, text messaging, email, picture and video clips, split second messaging, web sites, and chat rooms. The number of people who own a jail cellphone phone is on the rise. There argon a number of ways that cell phones can be used in bullying. Cell phones argon a popular device used to cyber bully because unlike data processors, cell phones are typically left on when not in use. When someone is done using a computer, they more often than not shut it off. Cell phones, however, are left on all hours of the day. The fact that cell phones are portable allows the bully to make contact with the dupe throughout the day. Cyber bullies may use text messaging to attack their victim or they may use digital photos. umpteen bullies will call and leave abusive messages for the victim similarly. Since most cell phones cook a built in camera, it is blue for the bully to use photos as another constitute of bullying. Bullies may transfix their victims changing in a locker room or usi ng the bathroom. They can then disseminate these photos to others to embarrass their victim. Another form of bullying is called happy slapping. Happy slapping typically occurs when embarrassing images of someone are caught on a camera or on a camera phone. Many times, the person is not aware that they are creation recorded. In many instances, these recordings may be set up and planned out. In April 2008, the flogging of a 16-year-old girl was videotaped by other female students. The incident sparked despoil after the bullies posted the video on MySpace and YouTube. The victim suffered a concussion, suffering to her eye and ear, and numerous bruises. Eight girls fontd charges of felony battery and false fetter for the attack on a fellow teen. This event sparked national appall brought to light the importance of educating youth on teen bullying. Cyber bullying also occurs regularly in chat rooms. Most victims of cyber bullying say horror occurs in chat rooms, where people who are in the room rouse and receive messages, called chatting. People inside chat rooms generally use classify names, or nicknames, and all the screen names of people in the chat room are listed on each users screen. A person can read messages from others in the chat room, and type and send his or her message as a reply. What someone types instantly appears on the screen as part of the chat (Breguet, 2010). Another form of cyber bullying that can occur is by exclusion. If a person is intentionally left off of a buddy list, in order to pretend their feelings hurt, then they pass water been cyber bullied. These chat rooms not only exist on the computer, but in video gaming as well. It can be surd for adolescents to separate their character from themselves. Bullies who cheat and gang up on other gamers are called griefers (Bailey, 2010). Like traditional bullying, minor forms of cyber bullying include cosmos ignored, disrespected, picked on, or otherwise hassled. The more debasing forms involve the spreading of rumors active someone, stalking or physically threatening another person through some medium or method of electronic communications (Hinduja Patchin, 2010). to a greater extent indirect forms of cyber bullying include disseminating denigrating materials or sensitive own(prenominal) datarmation or impersonating someone to cause harm (Willard, 2007).Add info on social profitsingWHICH ADOLESCENTS ARE MORE LIKELY TO BE VICTIMS OF CB? quintette signs that indicate a student is being cyber bullied are as followsChanges in mood or demeanor after being onlineAvoids talking somewhat school, friends, or what they do onlineHas crying, anxiety, or depression episodes, especially after using the computer or cell phoneMakes excuses not to go to schoolWithdraws from friends or usual activities (Tiano, 2008 Borgia Myers, 2010).The highest numbers of incidences of bullying occur at the diaphragm school level. Bullying can inauguration with children in elementa ry school. By the time students reach middle school, the bullying becomes more physical. Boys and girls typically bully in different ways. Boys usually push, shove, and hit. Girls on the other hand, usually start rumors or exclude girls from being a part of their social network of friends.A series of studies found that the chance of being a victim of cyber bullying increases as youngsters grow older (Kowalski and Limber, 2007 Patchin and Hinduja, 2006). Other studies found reject cyber bullying rates for students 15-18 years old than for students 12-15 years old (Slonje Smith, 2007). quiesce other studies found no relationship between age and being the victim of cyber bullying (Vandebosch Van Cleemput, 2009 Smith et al., 2006).Cyber bullying is occurring less frequently than traditional bullying and most cyber bullying is occurring outside of the school environs (Smith, Mahdavi, Carvalho, Fisher, Russell, Tippett, 2008). However, it is the responsibility of the school district to provide a learning environs that is in a safe environment. Studies show that 85% of high school students spend at least an hour a day on the internet. Many of the shows that teenagers are watching on television at wickedness are reality shows. There is a lot of fighting and literal confrontations that occur during these shows. It is desired that confrontations keep the audience entertained and wanting more.ARE F2F BULLIES generally CBs ALSO?Researchers who investigate online behavior recognized that people engage in activities online that they would not be as inclined to engage in if they were in the real world. Researchers use the term disinhibition to describe this phenomenon (Willard, 2007).There are several(prenominal) reasons why a bully may choose the internet to tantalize a victim. Cyber bullying can be done anonymously, with little effort, and the bullying can be carried out repeatedly and at a genial time for the bully. One of the most great reasons a bully torme nts online is because there is a constant, captive audience to witness his or her handiwork and the victims sphacelus (Breguet, 2010).Males are more apt(predicate) to be traditional grammatical construction to face bullies. Females, on the other hand, are more involved with cyber bullying. This could be collectible to the indirectness that cyber bullying plays a role in. Since females generally do not like confrontation, they are more like to participate in a form of bullying in which they do not necessitate to face their victim. Cyber bullying allows the female students the opportunity to bully without confronting their victim. In accordance with the relationship between age and being a cyber bully, no clear tendencies could be discarded. Since cyber bullying can be anonymous, a bully can victimize someone much older or much younger than themselves. In 2006, Megan Meier act suicide at the age of thirteen. Megan killed herself after receiving cruel messages on MySpace from who she believed was a 16-year-old boy named Josh Evans. Joshs identity was actually created by Lori Drew. Drew was the grow of a former friend of Megans...Many individuals who bully have issues compulsory their anger, come from violent shells or neighborhoods, have overly authoritarian parents, or may be acting out because of other problems at home (Goodstein, 2007). Some bullies may have poor social skills and trouble adapting to new or overwhelming situations (Goodstein, 2007). As a result of being bullied, many victims in plication begin to bully individuals who are younger or weaker than themselves.Many kids try to be period of playny as an attempt to be cool while at school. Making fun or ridiculing others is sometimes considered funny. So as an attempt to be cool, bullying may occur.Bullies are not always the friendless, mean loners many people assume them to be. Bullies actually can be quite popular. Many times, they are very machine-accessible to school life through ath letics, academics, or other extracurricular activities. Bullies generally are sozzled, confident, and aggressive, much more so than their victims, who, by comparison, tend to be weak, timid, and nonassertive (Bolton Graeve, 20). Some cyber bullies are angry loners or misfits, sometimes pursuit revenge for having been bullied themselves. Experts say it is common for online abusers to be popular students with plenty of self-consciousness who are trying to strengthen their place in the social hierarchy. They do it by intimidating those they perceive to have less status (Billitteri, 2008). Its not really the schoolyard thug character. Its the in-crowd kids bullying those who dont rank high enough, says Nancy Willard, executive theatre director of the Center for Safe and Responsible Internet Use (Billitteri, 2008). Mark Weiss, facts of life director of Operation Respect, says, I think the culture is angrier. He went on to say, The things on TV, the laugh tracks of situation comedie s, its all about making fun of each other and putting each other down, and reality TV is all about humiliation(Billitteri, 2008).WHAT ARE THE EFFECTS FELT BY THE VICTIMS OF CB?Although cyber bullying is occurring most frequently at home and not at school, it affects students at school. Even when its off campus, the impact is coming to school in the form of young people who have been so tormented they are incompetent of coming to school to study, which leads to slashouts ,fights, violent altercations and suicide, said Nancy Willard, a former lawyer and former teacher of at-risk children (Billitteri, 2008). Patchin and Hinduja (2006) found that 42.5 percent of the cyber bully victims were frustrated, or so 40 percent felt angry, and about 27 percent felt disturbing (Vandebosch Van Cleemput, 2009).One teenager said, It makes me hurt both physically and psychically. It scares me and takes onward all my confidence. It makes me feel sick and worthless (Hinduja Patchin 1). Victims w ho experience cyber bullying also reveal that they were afraid or embarrassed to go to school. In addition, research has revealed a link between cyber bullying and low self-esteem, family problems, academic problems, school violence, and delinquent behavior. Cyber bullied youth also report having suicidal thoughts, and there have been a number of examples in the United States where youth who were victimized terminate up taking their own lives (Hinduja Patchin 1). Even though suicide rates have decreased 28.5 percent among young people in juvenile years, upward trends were identified in the 10- to 19-year-old age group (Hinduja Patchin 2 positively charged others). Youth who are bullied, or bully others, are at an noble-minded risk for suicidal thoughts, attempts, and completed suicides. The reality of these links has been strengthened through research showing how experience with peer harassment (most often as a target but also a perpetrator) contributes to depression, decrease d self-worth, hopelessness, and loneliness-all of which are precursors to suicidal thoughts and behavior (Hinduja Patchin 2 plus others). In a research conducted by Hinduja Patchin (2010), cyber bullying victims reported that they were almost twice as likely to have attempted suicide compared to youth who had not experienced cyber bullying. tralatitious bullying and victimization have also been linked to loneliness, peer rejection, low self-esteem, poor mental health, and other psychological and physiological ailments among youthful populations (Hinduja Patchin, 2010 twist Bigbee, 1998 Forero, McLellan, Rissel et al., 1999 Hershberger DAugelli, 1995 Mills, Guctin, Lynch et al., 2004 Prinstein, Boegers,, Spirito, Little et al., 2000 Prinstein, Boegers, Vemberg, 2001 Rigby Slee, 1993 Salmon, James, Smith, 1998). After considering the extent research on bullying and suicidal ideation, it can be said with confidence that a strong relationship exists (Hinduja Pachin, 2010 Balr y Winkel, 2003 Kim, Koh, Leventhal, 2005 Mills, Guerin, Lynch, et al., 2004 Roland, 2002 Seals Young, 2003).The research on cyber bullying flourished following the school shooting at Columbine High School. Research from the Secret Service and the United States Department of Education on thirty-seven school shootings, including Columbine, found that almost 75 percent of the shooters felt bullied, threatened, attacked, or injured by other. some(prenominal) shooters also reported experiencing long-term and severe bullying and harassment from their peers (Goodstein, 2007). gibe to Goodstein (2007), victims of bullying usually miss more school, have higher dropout rates, and have problems concentrating on their schoolwork. They also tend to show higher levels of insecurity, anxiety, depression, loneliness, unhappiness, physical and mental symptoms and low self-esteem. The consequences of being cyber bullied quickly creep into the classroom where the students eventually face the damag e to their psyches or their reputations(Borgia Myers, 2010).Children have always been encouraged to not click tell. Once these children are bullied, many withhold the experience they are way out through as a result of what they have been taught. Parry Aftab, of wiredsafety.org, says 45,000 students-85 percent to 97 percent of her audiences-reported having been victims of cyber bullying in 2007. Yet, only 5 percent will tell a trusted parent or adult (Billitteri, 2008). Another reason many victims do not report that they have been bullied is because they worry that the problem will escalate. An 11-year old from Michigan said, She kept texting me so many mean things that I wanted to throw my phone against the wall. I told my mom and she called her. After that the mean girls texted me, wow you cant fight your own battles (Billitteri, 2008)Although online comments have the potential to spread at a much meteoric rate than conversations in a school hallway, dealing with it could possi bly be easier. Teens have the capability of ignoring the comments online by merely turning off the computer and not reading them. Since comments were made online, the victim is able to print the comments to turn them over to the local police unit. Victims can also report incidences to their ISP. School districts and parents need to make themselves responsible for educating youth on cyber bullying. Since most cyber bullying occurs away from school, parents may attempt to protect the bully by reason that they have the freedom of speech to express their thoughts aloud.Conclusion It is very important as parents to monitor childrens online activity. Parents should be aware of social networking sites that their children participate in. It is captious to educate children about the proper language that should be used online. Experts believe that cyber bullying is going to worsen because most bullies enjoy the idea that they have a large audience witnessing their attacks on the victims. As the price of computers continues to drop and as internet use gets faster, cheaper, and more far-reaching, it only makes experts believe that cyber bullying will continue to grow. Therefore, it is critical for parents to talk to their children about the impact of cyber bullying on youth. When kids are confronted about being a cyber bully, many of the kids suffice that they didnt know that they were actually hurting the other person. Since many cyber bullies do not face their victims, it is difficult to witness the effects that the bullying is having on the victims.

Tuesday, April 2, 2019

Bachelor Of Business In Tourism Management Tourism Essay

Bachelor Of Business In tourism vigilance Tourism EssayThe objective of this project is providing an evaluation of sustainability in Changi drome. By concentrate destination 3, a lot of discussion and analysis check been do to examine Changi piece of cakedromes sustainability. The project comprises 4 main(prenominal) comp superstarnts include the description of Changi aerodrome, credit and discussion of sustainability criteria, analysis of potential impacts and recommended be after tool.MethodologyThe project takes entire advantage of using qualitative and quantitative methods to collect data for the sustainable indicators and support for its arguments. Particularly, to qualitative method, a lot of site observations, evident pictures and interviews with pertinent personal include face-to-face communication and email were conducted to examine Changi Airports sustainability (Hair et al. 2003, p.74).Feinstein doubting Thomas (2002) determined that quantitative method is t he adoption from a range of mathematical and statistical techniques roled to analyze data and info. The qualitative method was employ to obtain information through Changi Airport website, relevant journal articles and books from both(prenominal) online sources and the National Library capital of capital of capital of capital of Singapore.Description of Changi AirportSingapore Changi Airport has of all time been kn hold as the best airdrome in the world (Changi Airport base (CAG) 2010). Their record has been prospered through a lot of matchless- course of study worldwide awards much(prenominal) as 2010 Best leafy vegetable avail provider Airport, 2009 Asias contributeing(a) Airport, 2008 Worlds Leading Eco-friendly Airport, 2007 Worlds Leading Airport, etc (CAG 2010).Establishing from 1981, Changi Airport is centrally located in the South East Asian region and is managed by the Civil zephyr Authority of Singapore (CAAS) (Caudle 1996). The airport breeds more than 80 airlines operating 5,100 periodical scheduled courses flying to astir(predicate) 200 cities in 60 countries (Hui unhinged2003). These better-looking numbers of airlines operations al downcast the airport crap more than 5,000 arrivals and departures all week and over 37 million riders a year (Hui Wan 2003).Changi Airport Terminal 3 opened on 9 January 2008. This S$1.75 billion rod comprises 380000 squ ar meter of space and prat handle about 22 million passengers a year (NEWASIA Singapore 2010). The crown of the main terminal building is designed with 919 skylights that automatically adjust to sunshine and fill soft natural light into the inside of the terminal (NEWASIA Singapore 2010).Terminal 3 consists of seven storeys (4 take aims above ground and 3 levels to a lower place ground) which argon considered as a small city with many operate and amenities (NEWASIA Singapore 2010). thither is a floor-to-ceiling viewing gallery on the fourth floor which allows visito rs to enjoy watching the control tower, plane farce comedy and land. Natural yardery is the main theme of the terminals architectural design (NEWASIA Singapore 2010). The green wall, a 5-storey tall and 300 meter long good garden is real good evidence with 4 weeweefalls, layers of tropical leafing and sculptured sandstone art walls at the arrival hall (NEWASIA Singapore 2010). designation and Discussion of Sustainability CriteriaSustainability Criteria is known as the specific criterions which organizations follow to achieve their purposes of minimizing at the lowest level of disconfirming impacts and balancing the triple bottom lines (Swarbrooke 1999). To be known as a green destination, Changi Airport has put a lot of efforts to obtain sustainability in many ways.(The table of sustainability indicators flock discover to Appendix 1)environmental IndicatorsWater ManagementTo Changi Airport, water focus is substantially important to suppress as oft as accomplishable water consumption and the quantity of water that takes from suppliers. They atomic number 18 quite happy to hold Rainwater Harvesting system that allows them to collect storm water for irrigating plants at Changi Airport Nursery and external landscape empyreans (CAG 2009).Besides, NEWater (recycled water) is using as the main water source in Changi Airport for multiply purposes such as irrigation, fire-fighting, sanitation and cooling purposes in place of potable water (CAG 2009).another(prenominal) efficiency practice in water conservation is installing encompassing point rate regulators for wash basins in selected areas of the airport to decrease water workout by 66% from 6 liters per minute to 2 liters per minute (CAG 2009). deglutition water is in any case conserved in term of installing taps with water saving devices such as on-off sensors (CAG 2009).One of the biggest sources of water habitude is from toilets, so that Change Airport Introducing low-flush toilets t hat recycled water (NEWater) being used for flushing (CAG 2009). life force ManagementThe airport has saved a lot of free energy from its initiatives to better energy efficiency. A typical practice is using natural luminosity in passenger areas by installing double glazed trash and solar shading devices (CAG 2009).These practices allow the nature light to get into the buildings musical composition minimizing heat gained from sunlight at the same time. From then on, it helps to decrease the requirement for artificial lighting and air conditioning. Inside the buildings, they also set up the efficient lighting system with motion sensors and sensor escalators and travellators (CAG 2009).The other practices include shutting down escalators and travellators at night and during off-peak hours, turning off marginal lighting during day time and looking for the best energy-efficient options when replacing their assets and equipments (CAG 2009).The almost unprecedented practice is inst alling a 250kWp photovoltaic system with solar panel modules which cover a rooftop area of about 2,500m. These panel modules kick in over 280,000 kWh/year, it is calculated to reduce more than 122,000kg of degree centigrade dioxide per year (CAG 2009). uncivilised ManagementThe upstanding melodic theme of sustainable reading has been developed precise efficiently by Changi Airport through reducing devour genesis and increasing the percentage of waste recycled.The airport has introduced a new notional design of recycling bins which actually depicted an enlarged bottle, a arouseful and a newspaper (CAG 2009). The purpose of these bins is trying to catch peoples attention and move on them to be more considerate and participate in recycle waste.With regards to reducing waste generation, the airports taxiway pavements are construed by recycled materials and recycled concrete is used to make roadways, drains, pavements and kerbs. Office refurbishments are also used drywall p artitions instead of mortar and bricks to diminish waste generation (CAG 2009).These results in cost savings through waste disposal and raw material costs.Noise ManagementEfficient to-do worry always challenges for aircraft operators all over the world. The activities such as re-fuelling, baggage loading, engine maintenance, unloading and re-provisioning of aircraft usually generate a lot of fraudulent scheme which screw affect directly to the nearby community.At Changi Airport, noise management is considered as a very important factor to minimize the possible negative impacts to the community. All airlines and civil aircraft operating in Singapore have to commit tomeet the noise standards stipulated by International Civil gentle wind Organization (ICAO)s guidelines on Balanced Approach to Noise (CAG 2009).Land use readying is conducted by the Urban Re suppuration Authority (URA), which zones land environ Changi Airport for residential use in accordance with international norms on noise levels. Noise studies are conducted regularly to update the noise contours rough Changi Airport. The results of these studies are shared with URA for future land-use planning (CAG 2009).Changi Airport also assigns runways to aircrafts to reduce air traffic and requires all aircraft that departing from Singapore to follow defined routes to evacuate flying directly overhead residential areas (CAG 2009). Besides, the airport conducts regular inspections to put forward noise level and detect any abnormal noise natural action (CAG 2009).With a better effort to reduce noise level, Changi Airport Group (2009) cooperates with Singapore Amalgamated Services Co-operative Organization (SASCO), the nearby airside agency to chequer that the impact of noise from their compounds is minimized especially from 12 a.m. to 06 a.m.Air entirely tone ControlTo Changi Airport, providing a good environment with best air tint is very important to protect their employees health and the topical anesthetic community. on that point are a lot of useful practices which allow them to minimize as much as possible the amount of carbon dioxide generating from airport vehicles, ground running game of aircraft, road traffic, food preparation and air conditioning.They only use crossing tractors to sort baggage within Terminal 3 (CAG 2009). The Sky fulminate system is also used efficiently to transport passengers who make inter-terminal flight connections among Terminal 1, 2 and 3 (CAG, 2009). The system has fit of seven post two each in Terminal 1 and 2, and three in Terminal 3. This uplifted-speed people mover system is powered by electricity and haves zero local emissions (CAG 2009).Moreover, the airport put their sustainable efforts in term of designing the airfield to maximize the number of rapid breathe out taxiways and connecting taxiways to limit congestion on the airfield (CAG 2009). This helps cutting down a lot of taxiing time of aircraft and reducing a la rge amount of engine emissions.another(prenominal) good practice which allows reducing a lot of carbon emissions from the airport is applying electronic car park system in 1,700 car park spaces and 130 motorcycle spaces (Changi Airport Singapore (CAS) 2010). With this helpful system, vehicles can quickly find the empty lots and decrease the big amount of carbon emissions from going around the car parks.The key highlight of terminal 3 is the Green Wall, five-storey high vertical garden. The garden is designed with four cascading waterfalls, a sculptured sandstone art wall and a lot of raise plants (Hui Wan 2003). This green practice help creating fresh air, cooling the automatic teller machine inside the building and saving a large amount of energy consumptions through air conditioners.Stress LevelChangi Airport is well-known as one of the best airports all over the world which serves more than 80 airlines operating 5,100 weekly scheduled flights flying to about 200 cities in 60 c ountries (Hui Wan2003). These big numbers of airlines operations allow the airport welcoming more than 5,000 arrivals and departures every week and over 37 million passengers a year (Hui Wan 2003).The whole airport is about 1,300 hectares with 870 hectares reclaimed from the ocean (670 hectares using seafill and 200 hectares using landfill) (CAS 2010). There are more than 230 retails and helping stores and about 100 food beverage establishments here (CAS 2010).Besides, terminal 3 has an yearbook handling capacity of 22 million passengers while the total handling capacity of Changi Airport is about 70 million passengers per year (CAS 2010).Social-ethnical IndicatorsEnvironmental EducationThere are many kinds of sustainable tuition which is conducted in Changi Airport through environmental exhibitions, campaigns, events, gallery and activities. Some remarkable activities that bring a lot of good green escort of Changi Airport areChangi Airport Group and IATA launched environmen tal exhibition surrounded by 2 February 2010 and 28 February 2010 to highlight strains commitment to the environment (Changi Airport Group IATA 2010).The airport practiced Earth Hour 2010 to raise environmental awareness among its stakeholders (CAS 2010).Changi Airport cooperates with National Museum of Singapore and Double A Ltd. to promote Making your own woodblock print with local icons campaign to use the paper wisely (CAS 2010). quantify of foreign ownershipThe full beneficial ownership of Changi Airport belongs to the government of Singapore.The Civil Aviation Authority of Singapore (CAAS) isthe regulatory authority (Channel Newasia 2009). indoors CAAS, there are two entitiesOne is in charge in the regulator, promoter and developer of the aviation industry (Channel Newasia 2009).The corporatized entity is in charge to operate Changi Airport, the airport emergency services and exploit investment opportunities overseas (Channel Newasia 2009).Locals jobs created through tour ismChangi Airport is generating about 13,000 jobs for local community (CAS 2010).Baseline IndicatorsQuality ManagementChangi Airport is known as the worlds most awarded airport with over 350 awards included 28 won in 2009 and8 won as at May 2010 (CAG 2010). Some remarkable awards are2010 Best Green Service Provider Airport2009 Asias Leading Airport2008 Worlds Leading Airport2008 Worlds Leading Eco-friendly AirportPotential Impacts of Changi AirportTourism activities can cause a lot of impacts to the triple bottom lines included environment, economic and social-culture (Swarbrooke 1999). Changi Airport is well-known as an essential element in the aviation industry in particular and the whole tourism system (WTS) in general (Weaver Lawton 2010). Therefore, it cannot cut down both negative and positive impacts from its transportation service to local community.Environmental ImpactsThe good side of tourism victimisation in Changi Airport is promoting peoples sustainable awareness an d their responsibility in term of environmental conservation (Buckley 2000). There are also many cleaning programmes such as the moderately Energy Programme Office (CEPO) to protect the enchantingness and green image of the best worldwide eco-friendly airport (Singapore economical Development Board 2009). Besides, one of the best benefits which Changi Airport has created for the environment is promoting the cultivation of using renewable sources such as solar energy- 919 skylights, recycled water the NEWater, etc (Manson 2003).Together with the positive impact, there are also a lot of negative impacts which Changi Airport generates for the environment. Noise taint is, for many people, the most obvious form of pollution related generally to aircraft (Leiper, Braithwaite Witsel 2008). Besides, its impacts on climate change, peoples health and contributing in depleting the stratospheric ozone layer are the most serious problems (Refer to Appendix 2 for more detail).Social Impac tsThe development of tourism in Changi Airport has created more job opportunities and higher income to local residents. There are about 13,000 jobs are generated during last few eld (CAS 2010). It also results in the development of more and better shopping, transport, the countrys medical facilities, cultural and recreational facilities and communication facilities (Khan et al. 1990). Crowne Plaza Hotel with 5- star rate is a very good example of how good infrastructure has been improved because of tourism development in Changi Airport (CAG 2010). Besides, it can bring locals feeling of pride about their worlds best eco-friendly airport and sureness of keeping the airport clean and attractive (Khan et al. 1990). The image of Singapore as a clean and beautiful city is also emerged to attract more and more tourists (Khan et al. 1990).On the other hand, the development can cause vulnerability to the community. The difference in wealth amidst the locals and the tourists may result in the high number in medicate abuse, prostitution, and theft and crime rate especially with the setup of gambling facilities at the two integrated resorts (Khan et al. 1990). Many locals complained that they have to pay higher prices for near good and services as well we their rentals for offices and shops were addd because of tourism development (Khan et al. 1990). Obviously, there are a lot of buildings around the Changi Airport area such as 4 terminals, control tower, Crowne Plaza Hotel, etc. They allow definitely cause the visual impact at the end (Weaver Lawton 2010).Economic ImpactsThe significant effects of tourism development in Changi Airport expand on the high number of Gross Domestic Product (GDP) and employment. There are more ten 13,000 job opportunities generated to cater passengers demand (CAG 2010). Another important benefit is generating indirect local revenue through the multiplier effect of money and jobs (Heng Low 1990). Due to the development of the aviatio n industry, it also cause the stimulation of backward linkages of the other industries, includes agriculture, fisheries and construction (Heng Low 1990). The full beneficial ownership of Changi Airport belongs to the government of Singapore thus, it limits the negative impacts from high leakage due to foreign ownership (Channel Newasia 2009). Besides, the strong demand for Singapore dollars due to tourism expansion is resulting in the growth of the price of Singapores bullion and exchange rate (Heng Low 1990).However, the high tourism dependence of Singapore economy in general and Changi Airport in particular can be a big problem. The uncontrollable outside forces such as natural disasters (Tsunami), SARS and economic crisis impart affect seriously to the whole economy of Singapore (Heng Low 1990).The aviation activities can cause a lot of problems however, there still are many offsets that can train to limit them at the lowest level. Changi Airport is a very successful repres entative for the aviation industry that owns a lot of initiatives to proportionateness its negative impacts to triple bottom lines (Refer to Appendix 1). Their efforts in sustainable development have been proved through a lot of honor awards such as the Green Mark Gold in October 2009, the inaugural Best Green Service Provider at the Annual Asian Freight and make out Chain Awards in 2010 (CAG 2009).Recommended Planning ToolAccording to Newsome, Moore and Dowling (2002), the best planning tool is one that provides an effective monitoring in the areas with effective outcome, enquire visitors and community and lead to sustainability of the resource. There are many tourism planning frameworks, but, the Visitor Impact Management Framework is the most equal one for Changi Airport (Refer to Appendix 3).Visitor Impact Management ( push) FrameworkTo Changi Airport, applying the zip planning framework to ensure visitor impacts at acceptable levels seems a good idea which allows them to e nhance visitors benefit and achieve their purpose in excellent service We are the best in our business (CAG 2010). ground on eight basic steps, the VIM framework can lead the managers not only focusing on reviewing existing data and management objectives, through selecting indicators and standards and using these to identify unacceptable impacts, but also aid them to indentify causes and appropriate management strategies (Newsome et al 2002).The purpose of steps1 and 2 is reviewing the organizations existing objectives, legislation, policies, pervious research and other data to identify problems. In these stages, Changi Airport can recognize the need for clear objectives (excellent service provider), better understanding the ask and wants from passengers and identify current problems within the process of organizing.The next steps (steps 3 and 4) are selecting key impact indicators and standards for the whole terminal 3. Noise management, air prime(prenominal) control and passeng er satisfaction seems to the best indicators that need to be highlighted for taking care of local community and passengers (Refer to Appendix 1). The following indicators such as waste management, energy consumption, water quality control and quality management go forth be also useful to providing excellent service in the aviation industry.After collecting enough data, the comparison between standards and existing conditions will necessary to examine whether it exceed the acceptable level or at that level. For instance, the desired standard for passenger satisfaction at Changi Airport was 94 % while passenger rates their satisfaction at lower or higher standard (CAG 2010). To maintain the service standard at a high level, monitoring programmers have been established with indisputable criteria. The purpose of this practice is making sure that they can win annual Best Worldwide Airport award (CAG 2010). Therefore, this award is used as a measuring method to ensure their standard of passenger satisfaction.If their actual satisfaction level is below the desired standard, the Changi Airport Group will take action to identify probable causes of decreasing in passenger satisfaction level (Step 6) (CAG 2010). Some possible problems might be low in service delivery, lack of initiative in operation, etc (Tian-Cole Cromption 2003).From then on, the suitable planning and strategies are provided and implemented to get over limitations and enhance in service delivery (Steps 7 and 8). The Be a Changi Millionaire Draw, which kicked off monthly from1 June 2010 to choose the most lucky passenger who shopped at Changi Airport, is a very good evidence (CAG 2010). This activity is a very creative idea to promote the airports products and its wonderful service at the same time. Through this activity, passengers will be very happy and their satisfaction level will increase at the end.Limitation of the reportThe report focuses mainly on Terminal 3 to collect data for the sustainab le indicators. Thus, the quality of information cool might not be representative for the whole Changi Airport included Terminal 1 and 2. Besides, there are some data and information cannot be gathered because the organization is outsourced its departments and some private information cannot be leaked out.The paper only mentions about environmental impact, one important helping in the triple bottom lines, thus, it is lack of convincing evidences to prove that the balance among triple bottom lines have been through with(p) in Changi Airport.ConclusionThe whole project provides a good understanding how Changi Airport can create its image and reputation as the best airport in the world. Especially, in term of sustainability, there are a lot of efforts have been done to take care of environment and local community. However, it cannot avoid the negative impacts which the aviation industrys member causes for the environment. These problems are able to offset by taking full advantages of using management frameworks and planning tool such as the VIM frameworks.With this research, it is obvious that Singapore Changi Airport is meritorious to be known as the best green airport all over the world. In the future, it can strongly believe that Changi Airport will be more conscious about the environment with more green planning and strategies to maintain its reputation as well as develop as a green icon of sustainability.

Firewalls and Intrusion Detection Systems

Firewalls and usurpation Detection SystemsArdeliza LansangTechnologies for usurpation Detection revolutionize both firewalls and assault detection systems argon used to monitoring device web handicraft and implement mesh figure out security policies. Research these technologies and determine how they ar similar and how they differ. Are both needed? Explain your answer in a short paper. (SNHU. n.d.)BRIEF INTRODUCTIONTechnology has enhanced our usable lives by providing us with innovations (e.g., stationary and portable devices). It has also developed mingled modes of communication theory (e.g., VOiP, video conferencing, email, SMS). These advancements digest allowed individuals and business the ability to remain attached with one another continuously and globally, regardless of time and space.Concurrently, the digital or development age has also produced serious vane c at a timerns and threats. The prevalent problems tend from phishing, scamming, cyber-bullying to co mmunicate services disruption (such as DoS, or denial of service), information or identity theft and information sabotage. Cyber or Internet crimes have resulted in diminishing or halting productivity. They have also caused victims to nourish physical, mental, emotional and financial loss.To counter ominous risks, various softw atomic number 18 and ironw are products have been manufactured to retard and combat unauthorized access to the network systems. Implementing the necessary security measures can eliminate or decrease the ongoing vulnerability to cyber violations. In addition to having a stable security infrastructure, it is of import to raise awareness of some(prenominal) threats among users and to remind them of their responsibilities toward maintaining security or how to work against malicious activities (e.g., secure password, keeping software and the OS current, safeguarding sensitive information, etc.)FIREWALLA firewall is a hardware or a software (or a crew of both ) that sits between a LAN and the Internet. Acting as a breastwork between a trusted and an untrusted network, its main function is to filter merchandise in a networked environment by engine block unauthorized or harmful activities and permitting authorized communications. By monitoring the incoming and outgoing network traffic, a firewall is fundamentally the first line of peripheral vindication against any intrusions. (Bradley.)A firewall not only enhances the security of a armament or a network but also protects and shields the applications, services, and machines that are attached to the network system. By checking data packets, it allows nonthreats to pass through. Conversely, it either drops, erases, denies or returns threats to the sender. (Sherman.)Types of firewalls mailboat filters Packet filtering is the offset of allowing or preserveing packets at a network interface by checking destination port number source and destination addresses, and/or protocols. In a softw are firewall, a packet filter program examines the pass of each packet based on a specific destiny of rules and is either passed (called ACCEPT) or prevented (called DROP). (TechTarget.com.)Stateful oversight This firewall technology (also referred to known as impulsive packet filtering, monitors the state of active connections. Based on this information and by analyzing packets down to the application layer, it determines which network packets to permit passage through the firewall. It monitors and tracks communications packets over a length of time. (TechTarget.com.)Proxys Proxy firewalls, in combination with stateful inspection firewall perform deep application inspections (e.g., layer 7 protocols such as HTTP, FTP). Unlike stateful firewalls which cannot inspect application layer traffic, proxys can prevent an HTTP-based clap. This answer is achieved by making the firewall act as a proxy, i.e., after the thickening opens a connection to the firewall, the firewall opens a separate connection to the server on behalf of the client (without the clients knowledge). (TechTarget.com.)Benefits of firewallProtects against routing-based attacksControls access to systemsEnsures privacyDrawbacks of firewallDifficult to configurePossibility of blocking nonthreats or useful servicesCould allow back door attack (via modem access)No antivirus protectionPossible performance problems (or, cause potential bottleneck) security measures tends to be concentrated in a item-by-item spotviolation DETECTION SYSTEMS (IDS)An IDS can also be software- or hardware-based, such as a separate computer, that monitors network occupation in a single computer, or a specific network or multiple networks deep down a WAN. It attempts to identify and evaluate a suspected intrusion once it has occurred by signaling an alarm and trying to stop it. It is akin to a smoke detector that raises an alarm at the signs of threat. (Pfleeger and Pfleeger.)It oversees traffic by identifying pattern s of activity and comparing the information to attacks that are already listed in the IDS database. For example, detected anomalies are compared with normal levels, i.e., a high level of or a braid in packet size or activity could mean a hacking attack. The technology is typically use to enforce corporate policy and are not configured to drop, delete or deny traffic. It primarily gene range monition signals or alarms. (Sherman.)IDS can be network based or host basedNIDS (Network Intrusion Detection Systems), which are placed at a strategic point or points within the network, oversee inbound and outward-bound traffic among all devices on the network. In this system, anti-threat software is installed only at specific servers that interface between the external environment and the interior network. (TechTarget.com.)HIDS (Host Intrusion Detection Systems), which are conducted on individual hosts or devices on the network, monitor the incoming and outgoing packets from the device only and will signal an jovial when suspicious activity is identified. In this system, anti-threat applications (e.g., firewalls, antivirus and spyware-detection software) are installed on every computer connected to the network system and that has access to the Internet. (TechTarget.com.)Benefits of IDSEnables the detection of external hackers and internal network-based attacksCan be scaled easily, providing protection for the entire networkAccommodates in-depth defenseAllows an additional layer of protectionDrawbacks of IDSProduces false reports (positives and negatives)Acknowledges attacks but does not prevent themExpensive to implement, requiring full-time monitoring and highly-skilled staffRequires a complex event-response processUnable to monitor traffic at higher transmission ratesProduces a tremendous amount of data to be analyzed open to low and slow attacksCannot deal with encrypted network trafficCONCLUSIONBoth firewall and IDS complement one another. While a firewall limits network access to prevent intrusions or watches out for intrusions to prevent them from occurring, it does not signal an attack from within the network the way an IDS does. While a firewall can block traffic or connection, IDS cannot. It can only alert any intrusion attempts. It monitors attacks and evaluates intrusions that are specifically designed to be overlooked by a firewalls filtering rules. A firewall is analogous to a security guards or personnel at the provide and an IDS device is a security camera after the gate. Another similitude that can be used is that a firewall is akin to installing locks on doors to prevent intrusion IDS is installing security systems with alarms. (TechTarget.com.)ReferencesBarbish, J. J. (n.d.). Chapter 29. Firewalls. Retrieved on March 6, 2017 from https//www.freebsd.org/ doctor/en_US.ISO8859-1/books/handbook/firewalls.htmlBradley, T. (August 21, 2016). Introduction to Intrusion Detection Systems (IDS). Retrieved on March 6, 2017 from https// www.lifewire.com/ interpolation-to-intrusion-detection-systems-ids-2486799 loss between Firewall and Intrusion Detection System. (n.d.). Retrieved on March 10, 2017 from http//www.omnisecu.com/security/infrastructure-and-email-security/difference-between-firewall-and-intrusion-detection-system.phpFirewall. (n.d.). Retrieved on March 10, 2017 from http//searchsecurity.techtarget.com/definition/firewallFirewalls. (n.d.). Retrieved on March 10, 2017 from http//csc.columbusstate.edu/summers/Research/NetworkSecurity/security/firewalls.htmGattine, K. (n.d.). Types of firewalls An introduction to firewalls. Retrieved on March 10, 2017 from http//searchnetworking.techtarget.com/tutorial/Introduction-to-firewalls-Types-of-firewallsHIDS/NIDS (host intrusion detection systems and network intrusion detection systems). (n.d.). Retrieved on March 10, 2017 from http//searchsecurity.techtarget.com/definition/HIDS-NIDSIDS/IPS Pros and Cons. (n.d.). Retrieved on March 10, 2017 from http//flylib.com/b ooks/en/2.352.1.16/1/Kurose, J. F., Ross, K. W. (2013). Computer Networking A Top-Down Approach, 6th Edition. MBS Direct. Retrieved from https//mbsdirect.vitalsource.com//books/9780133464641/Pfleeger, C.P. and Pfleeger, S.L. (March 28, 2003). Security in Networks. .). Retrieved on March 10, 2017 from http//www.informit.com/articles/article.aspx?p=31339seqNum=5Sherman, F. (n.d.). The Differences between a Firewall and an Intrusion Detection System. Retrieved on March 10, 2017 from http//smallbusiness.chron.com/differences-between-firewall-intrusion-detection-system-62856.htmlShort Paper/Case debate Analysis Rubric. (n.d.). Retrieved on January 7, 2017 from https//bb.snhu.edu/webapps/blackboard/content/listContent.jsp?course_id=_107231_1content_id=_14552222_1

Monday, April 1, 2019

Analyse Different Chilli Peppers Biology Essay

Analyse Different Chilli Peppers biological science EssayThe purpose of this throw up was to analyse opposite long pepper peppers and fervent sauces for their Capsaicin and Dihydrocapsaicin content but niggardliness was foc employ to a greater extent on the abbreviation of distinguishable chillies than sauces. consumes of chillies were refluxed employ Ethanol as an displumeion dissolving agent and sauces were untrasonicated use Methanol. The extracts were filtered and analysed via contain class HPLC-UV Vis proficiency. A number of experiments were performed to optimise the manner that has been antecedently use for analysis of chilli peppers. The low experiment conducted was to optimise the continuation of reflux cadence take to obtain a trustworthy dedicate of Capsaicin. Results showed that 1hr is sufficient for the extraction of Capsaicin. A variety of chilli peppers and sauces were analysed so as to moderate the vehementtest pepper. In general all seeks had good detection. Different split of chillies were too examined to have which part contains the high(prenominal)est absorption of Capsaicin and Endocarp was appoint to be the hottest part. The reproducibility of the method was similarly investigated and the try on showed to bemuse a economic crisis RSD honour.1. IntroductionNext to Jazz music, theres nothing that lifts the spirit and streng becausesthe soul much than a good bowl of chillies.Harry James (Late Ameri smoke musician)love by ace thousand millions for their hot and sizzling scents, the chilli peppers begin become precise popular over the extremity of judgment of conviction and be being bragging(a) in almost in all separate of the world, with Asia being the biggest manu positionurer of chillies followed by Mexico and the U.S.In traditional Indian medical system, chilli is employ as route of stimulating the digestion and is also believed to be a raw(a) pain killer.The red chilli peppers are also a radical of potassium, magnesium and iron and vitamin C.1.1 Why Are They So Hot?The rut sensation in chillies is cause by a class of chemicals, called the Capsaicinoids. These compounds are found in members of the capsicum family of plants. Capsaicinoids themselves beprospicient to a group called Vanilloids i.e. containing the Vanillyl group 3dchem.com formula 1.1 en.wikipedia.orgAll Capsaicinoids have equal functional groups and differ only in length of hydrocarbon chain. The most common of Capsaicinoids compounds is Capsaicin which is the major constituent of chilli peppers and also responsible for their pungent taste. 3d chem.1.2 Structure of CapsaicinsCapsaicin count on 1.2.1Dihydrocapsaicin number 1.2.2Nordihydrocapsaicin figure 1.2.3Homocapsaicin figure 1.2.4Homodihydrocapsaicin figure 1.2.5Out of all the Capsaicins, the capsaicin and dihydrocapsaicin are the major constituents of Capsaicinoids (make up 80-90% of capsaicinoids).1.3 Cis-trans isomerism in Capsaicin 3dchemC apsaicin bum exhibit cis-trans isomerism out-of-pocket to the presence of C=C bond. The restate bond prevents the molecule to rotate stipulate freely internally, therefore, giving rise to 2-channel isomers.Cis isomer of the capsaicin is less stable and has higher aptitude due to steric hindrance. As the methyl radical groups are in close proximity to to each one another(prenominal) it causes hostility between them and accordingly make it a less stable show due to this added strain.Trans isomer on the contrary has methyl groups further apart and doesnt have whatsoever steric hindrance, making it a more stable/low energy ar valuement. therefore, the Capsaicin is always found in the Trans isomer.Figure 1.3.1 http//www.homesteadcollective.org/mpg/science/majorcrap5.shtml1.4 Scoville ScaleThe home plate for measuring the extent of warming in chillies was first invented by an American Chemist Wilbur Lincoln Scoville in 1912. The test he devised is cognize as the Scovi lle Organoleptic test in which he had a group of volunteers to taste the chillies on their own and later diluted them with sugar and water until they didnt have any burning sensation left. The resulting dilution part was called the Scoville heat value of the sample and a number was accordingly assigned to each sample of chilli i.e. Scoville unit, to ascertain the amount of dilution a chilli needs before its hot flavour dies away. 3d.chemTable 1.4.1 Scoville heat values for Capsaicinoids g6csy.netMoleculeStrength /Scoville unitsCapsaicin16.1 millionDihydrocapsaicin16.1 millionNordihydrocapsaicin9.3 millionHomocapsaicin6.9 millionHomodihydrocapsaicin8.1 millionThe hottest capsaicin found is in the chilli cognise as Naga Jolokia, grown in India and has Scoville strength of 855,000-105, 0000 units. The Habanero (Mexican chilli) are the runners-up with Scoville rating range of 200,000-300, 0000. g6csy.netAs mentioned earlier, in extension to Capsaicins being employ as regimen addit ives, they have important medicinal benefits and are known as Phytochemicals.3dchem.com repayable to having pharmaceutical and antioxidant properties, its widely apply in anti-flammatory creams and ointments and also apply as a counter irritant in surgical dressings and medicines. Moreover, they are also being use in nutritional supplements for pain relief and Arthritis. cals.ncsu.edu1.5. inception Methods for CapsaicinDifferent methods have been devised as a way of extracting capsaicin from chilies and sauces. The simplest proficiency is to disassemble chilies in a glacial solvent and placing the change on hot plates for half an hour and accordingly filtering the extract via simple/vacuum filt balancen and making up with Methanol (100 ml).The other techniques more efficient for extraction are as follows1.5.1 unhurt Phase Extraction or SPEThis technique is oddly useful in extracting capsaicin as it requires pre-treating the sample prior to analysis. This reduces the amount of unwanted components that may interfere with the analysis.The extraction is completed in 4 goConditioning the cartridge This involves activating the cartridge by pulling the sample by it to achieve same conditions with in the cartridge (e.g. to achieve same pH, composition etc as the sample).Retention The sample is applied to the cartridge and either contaminants are well-kept and analyte is flushed by the cartridge. antithetic way used is holding the analyte with in the column and the unwanted components are passed through the column. wash The cartridge is then rinsed with distilled water to wash off the impurities.Elution The last meter is to rinse the sample with appropriate solvent and the extract can then be used for analysis.1.5.2 refluxAs demonstrated in this project, this method involves refluxing the chilies in methanol for appropriate duration. The reflux eon required can be optimized by refluxing samples for several(predicate) durations to establish the optimum clock time required by the capsaicin to leach.1.5.3 UltrasonicationThis method can be used for extracting the capsaicin from sauces or capsaicin ground creams in short time. The samples are soaked in Ethanol and lay in the ultrasonic bath for half an hour at high temperature. The ultrasonic vibrations release the capsaicin from the samples.1.5.4 Super censorious fluid extraction or SCFEIn this method, the extraction solvent used is a super exact fluid. A super critical fluid (SCF) is a compound above its critical temperature and pressure. Therefore, an SCF is neither a tranquil nor a gas. Hence, a super critical fluid has properties similar to liquids i.e. dissolving compounds and also gas like properties e.g. transportation. SCFE also minimizes the matrix components. Due to these capabilities, this method is more efficient and quicker than the other extraction methods. Carbon dioxide and water are the most commonly used SCF. This technique has a variety of applications in food, petrol, and pharmaceutical industries.1.6. Previous look on CapsaicinCapsaicin has been widely studied and investigateed by various organisations and institutions but wanting(p) literary productions has been published with respect to the analysis of chilli peppers and sauces. In this section, triple articles ordain be discussed as all three papers visual modality with the analysis of chillies and sauces relevant to this project.The first literature investigated the concentration of Capsaicin and Dihydrocapsaicin in the Habanero peppers using Super Critical Fluid Extraction method (SCFE). In addition to the analysis of Habanero whole peppers, different parts of chilli were also examined for their Capsaicin content. The Habanero peppers were obtained from two different locations Cunningham Research station and Bailey Farm (located in North Carolina, US).The peppers were cold shoulder into seeds and shells and prior to extraction, the samples from Bailey farms were prompt fresh, oven dried and freeze dried and samples from Cunningham station were prepared in oven and freeze dried states. The whole peppers and seeds/shells samples were extracted using three pivotal solvents i.e. Methanol, Acetone and Acetonitrile. The Method for SCFE is as follows as stated in the literature Fresh, oven and freeze dried preparations (0.5g dry weight) were extracted using a biomass solvent essence of 15% (w/v) based on the initial moisture of the pepper samples/parts. Sample and solvent mixtures were homogenised in 50ml conical glass tubes and placed in a shaking water bath (50C). The extracts (2ml each) were then filtered and stored at -20C until the analysis.The preliminary work suggested that 1hr is sufficient to get good yield of capsaicin. The extracts were then analysed using Reverse- signifierd HPLC with UV VIS Detector. The HPLC was equilibrated with capsaicin timeworns (10, 30,50ppm). The prompt word form composition was isocratic at 6040 (Acetonit rile Water with acetic acid (pH 3)).The researchers of this project compared the capsaicin and Dihydrocapsaicin concentrations from both locations. The results showed that the Cunningham move peppers had higher concentration of capsaicin in comparison with the Bailey farms chillies but the Bailey Farms pepper had higher amount of Dihydrocapsaicin than the Cunninghams. The results suggested that samples that were oven dried and extracted with Acetone gave utmost yields of the Capsaicinoids. This literature also suggested that disregarding of the solvent type and preparation state used, seed has the highest amount of capsaicin.The researchers suggested the land for differences in capsaicin concentration was due to different environments the fruits are cultivated e.g. chemicals used, conditions conditions etc.The second literature deals with the analysis of three Capsaicinoids i.e. levels of capsaicin, dihydrocapsaicin and nordihydrocapsaicin in different chillies, sauces and arthr itis creams via invert buildd HPLC. This research employed a solvent extraction technique which involved addition of ethanol (extraction solvent) to the samples of ground chillies, sauces and creams and placing the samples on hot plates for 30mins. after(prenominal) cooling and filtration, the extracts were transferred into flasks (100ml) and make up to the mark with Ethanol. 5ml was withdrawn from this sample and filtered once more into a syringe filter cartridge (0.45m pore size). This aliquot was then used for the analysis. A 1000ppm archetype stock solution was used to make standard capsaicin solutions ranging from 1-50ppm and ran through HPLC. The supple human body in this research was made up of ACN, water and phosphoric acid (0.1%).The UV demodulator was nock at 280nm and 205nm to determine samples responses at different wavelengths. In addition, Isocratic and side elution were used.The findings from this journal suggested that Capsaicinoids map in very little conce ntrations (e.g. 0.5ppm) were detected violate at 205nm wavelength using gradient elution rather than Isocratic method. However, results also indicated that for analysis of Capsaicinoids present in greater concentrations, Isocratic elution and UV wavelength at 280nm. The concentrations of the Capsaicinoids were expressed in legal injury of the Scoville units and the value calculated for the Habanero peppers (150,000) in this experiment was different to the literature value range (200,000-300,000). The researchers attributed this fact to variations in the environment e.g. weather etc.The trey literature determined the capsaicin and dihydrocapsaicin content in chilli peppers. The chillies were grounded for 10mins and Acetonitrile (30ml) was added to the crushed peppers and again grounded for 20mins. The solid residue was filtered and an aliquot (1ml) was made up to the mark with Acetonitrile. (in 10 ml flask).The extraction method used in this work was Solid Phase Extraction (SPE) An SPE cartridge was conditioned with Acetonitrile, methanol and water and the capsaicin extract (10ml) was then applied to the cartridge and the analyte was eluted with methanol (4ml) and then again with 1 ml of methanol (containing 1% acetic acid).The analytes were then run through reverse pattern HPLC using UV-VIS demodulator (at 281nm) fluent sort consisted of 7733 (Methanol Water). The HPLC was eluted first with the standards so as to obtain the calibration graphs. The Capsaicinoids concentration of different chillies was expressed in Scoville heat units (similar to literature 2). The results showed that Habanero is the hottest amongst all peppers that were analysed i.e. Scoville heat value of 276,000 which corresponded to the literature value range. The least hot pepper was chilli pepper (41,000 Scoville heat units).1.6.1 Comparison of three papersThe researches have used different techniques to extract the Capsaicinoids i.e. SCFE and SPE. However, the extraction techniqu e used in this project was Reflux (for chillies) and Ultrasonication (for sauces). The extractions were successful and all samples in general were detected which indicates that more than one method can be employed as a way of extracting the Capsaicinoids from chillies and sauces. Various parameters were manipulated as part of method development in literature 2 e.g. Isocratic/gradient elution and different wavelengths. Similarly in Literature 1 three preparation states and three solvents were used to determine what state/solvent gives liquid ecstasyimum yield of Capsaicinoids. Literature 1 also suggested that the hottest part with in the chilli is the seeds, however, the findings of this project have shown that the Endocarp contains the highest amount of capsaicin and dihydrocapsaicin. This is indicative of the fact that the amount of Capsaicinoids can vary even with in different parts of chilli. However, all researches discussed as well as this project has used diametral solvents to extract the analytes and the analytical technique used was reverse phase HPLC which indicates its proceeds in the capsaicin analysis in particular.Once an analyte of interest has been extracted, it can be analysed by a process called Chromatography.1.7 ChromatographyThe word Chromatography originates from Greek Chroma room colour and graphein implies to write. Skoog West Analytical Chem 7th Edition rascal 646The recital of this separative technique dates back to early twentieth century when it was highly-developed by a Russian Botanist Mikhail Tswett in 1903D kealy Instant notes. He used this method for insularism of various plant pigments and samples were passed through a calcium carbonate column. The separated analytes were identified as they left glowering bands on the column. Skoog West Ana Chem 7th Page 646. Since its invention by the Russian Scientist, this method has been modified and developed in many forms to give three-figure (amount of the analyte present) and q ualitative analysis (identification of the unknowns) of complex mixtures. d.Kealey instant notes paginate 119.Separation in Chromatography is achieved by passing the sample mixture through the unmoving phase by continuous flow of a vigorous phase. This process is known as Elution. Hence, the chromatographic musical interval accounts on the differences in the distribution ratios of the sample components between the unmoving and mobile phase. Therefore, this capability of an analyte to migrate at different rates in both phases gives separation over a period of time and distance travelled. D Kealey page 120Kx= Cs/Cm, where kx is the equilibrium partition coefficient and Cs and Cm are molar concentrations of analyte in mobile and stationary phase.There are two types of Chromatography techniques Year 2 notes page 25-261.7.1 Planar ChromatographyIn this method, the stationary phase is composed of a flat bed of hearty which is made up of an adsorbed layer distributed evenly over a saddlery of glass, plastic or Aluminum (known as Thin Layer Chromatography or TLC)Paper Chromatography is also another type of Planar Chromatography in which the stationary phase is a sheet of cellulose material.1.7.2 tug gravy boat ChromatographyIn this method, the stationary phase is a glass or metal column on to which the stationary phase is tightly packed onto a column where separation takes place. Examples of towboat chromatography are Gas Chromatography, High Performance Liquid Chromatography etc.1.7.3 ChromatogramThe secret plan of detector response Vs elution time is known as the Chromatogram. Year 2 notes page 25.Figure 1.7.3.1 http//www.clu-in.org/characterization/technologies/images/retention.gif1.7.4 Retention timeIn the above figure is a typical chromatogram and term tr is the time taken by the analyte to elute the column, known as Retention time. year 2 notes page 281.7.4 Dead time d Kealey page 121Indicated as tm in the fig is referred to the deathlike time this i s defined as the retention time required by the non retained species (i.e. mobile phase molecule) to pass through the column.A good Chromatogram should have well defined boots having correct shape and symmetry (i.e. Gaussian shape), eluted in reasonable retention time (tr not too long or too short) and should be separated from the extraneous lifts. Year 2 notes page 291.8 Describing a ChromatogramThere are quad parameters used in chromatography that evaluate the superior of a chromatogram. These are1.8.1 The Capacity element, KIt is the amount of mobile phase required to elute a particular florescence. The K is calculated for the first and the last peak. This factor is particularly useful when establishing the best mobile phase composition in the HPLC.K can be calculated as followingK= (tr-tm)/tm wheretr is the retention time and tm is the dead time.A Chromatogram having well separated peaks in good retention time will have K values between 2-8.1.8.2 The Selectivity Factor, Th is is the ability of a system to separate two analytes (A and B) and is calculated by= trb tm/ tra- tm, wheretrb and tra are the retention times of analytes A and B.A system where peaks are understandably separated has a value of 11.8.3 The Resolution factor, RsThis determines the ability of a system to resolve two peaks that elute very close to each other. And can be calculated byRs = 2 (trb-tra)/Wa+ Wb wheretra and trb are retention times and Wa and Wb are the peak widths of analyte A and B.The value of Rs 1.5 for a good quality chromatogram.1.8.4 The Efficiency Factor D kealey page 126-127When separation takes place in a column, the chromatographic separation can be evaluated by the resolution factor, Rs or the efficiency factor. The efficiency is defined as the number of theoretical plates in a column. This factor evaluates the extent of band broadening of the analyte peaks. Increasing the number of plates and trim down their heights gives better efficiency and vice versa . The plate height can be calculated usingH= L/N whereL is the length of the column (in mm usually) and N is the number of plates.The efficiency factor N is calculated byN= 16 (tr/W) for a peak with a good baselineN= 5.54 (tr/W1/2) for a peak with a poor baseline and W1/2 is the width at half the maximum height of the peak. (year 2 notes 42-43)1.8.5 Band BroadeningAs an analyte passes down a column, the peaks become shorter and broader due to various factors that cause band broadening. The Van Deemter equality explains the reason for the band broadeningH= A+ (B/u) + Cu where H is the plate height and u is the linear speeding of the mobile phase. Other variables in the equation are explained belowA- Eddy Diffusion As the mobile phase carries the sample components through the stationary phase, some components pass through the column in a straight line whilst other may that are retained longer by the stationary phase may deviate from the straight path and cause the peaks or bands to be broader. If evenly sized particles are used for packing the stationary phase, then the Eddy diffusion can be minimise.B- Longitudinal Diffusion If the mobile phase is travelling at low velocities, then the analyte will turn over more time in the column as analytes diffuse into the mobile phase. This longitudinal diffusion contributes towards peak broadening and can be minimized by an increasing the flow rate of the mobile phase. The increased velocity will reduce the retention time resulting in decreased effectuate caused by this phenomenon. Veronica HPlc page 17-19C-Mass transfer As discussed earlier in this section, the separation depends on the ability of the analyte to distribute itself between the stationary and mobile phase. As the mobile phase is constantly flowing, the true equilibrium distribution of the analyte is neer established. This leads to increased retention times and thus resulting in peak broadening. d kealey page 1245. High Performance Liquid Chromatograph y or HPLCHPLC is a form of liquid chromatography which provides both qualitative and quantitative information about complex mixture samples in short time. The stationary phase in this technique is made up of very blue fine particles and the sample is forced through the column by mobile phase solvents under high pressure, hence also bearing the name High Pressure Liquid Chromatography. page 1 Veronica HPLC.5.1 Mobile phase in HPLCThe main requirement for this technique is that the analyte mustiness be soluble in the mobile phase as the mobile phase carries the sample mixture through the column where separation takes place. Therefore, if the analyte interacts with the mobile strongly, it will elute the column faster, leading to shorter retention times. page 66 Chromatographic separations. The mobile phase can either be a single solvent or different solvents combinations may be used. later suitable mobile phase has been chosen, the system can be set at isocratic or gradient conditio ns. In Isocratic conditions, the chosen ratio of solvents dust constant throughout the analysis e.g. in this project Isocratic mobile phase used for analysis. In contrast, the gradient mobile phase can be changed over the period of time. Year 2 notes .1.9 Stationary phase in HPLCThe stationary phase in HPLC consists of a solid made out of micro porous material packed into the metal column. Silicas or modified Silicas with unionised organic groups attached are commonly used as column packing material. Out of all stationary phases used in HPLC, Octadecyl silicon oxide known as ODS or C18 is most extensively used due to its ability to separate the analyte components with high, intermediate and low polarities. Other stationary phases used in HPLC are Aminopropyl, Nitile, Sulphonic acid, quaternary Amines etc d. kealey 159-161Elution in HPLC is carried out by find out the extent of interactions of the analyte with the stationary and mobile phases. The degree of separation of the samp le components depend on their migration rates and distribution ratios in both phases.1.9.1 Normal and Reverse phase HPLCIn normal phase HPLC (adsorption chromatography), the stationary phase is more polar than the mobile phase which is weakly polar. The separations are based on the relative polarities of the sample components. For instance, if species A is more polar than the species B, A will have strong affinity for the stationary phase and will be held in the column longer. This will result in species A having long retention time compared to B. Thus, in normal phase HPLC, least polar analyte elutes first.In Reverse phase HPLC (bonded phase chromatography), the stationary phase in non polar and the mobile phase solvents used are polar. This phase is governed by the hydrophilic and hydrophobic properties of the analytes. close polar analyte elutes first and vice versa.As Capsaicinoids are relatively non polar, therefore, if the mobile phase polarity in reverse phase is increased t hen the analyte will have stronger affinity for the stationary phase and therefore will spend more time in the column, leading to long retention times.The mobile phase solvents used in Reverse phase HPLC are water or aqueous damp with an organic solvent. The use of protons in mobile phase composition improves the peak shape and travels in column quickly.http//ionsource.com/tutorial/chromatography/rphplc.htmSolvents1.9.2 HPLC InstrumentationFigure 1.9.2.1 http//www.youtube.com/ bear?v=I-CdTU5X4HAPump In HPLC solvent delivery system, the pump is used to deliver the mobile phase solvents to the column under high pressure. Most commonly used pumps are reciprocating pumps. The pumps used should be free of corrosion, must supply an accurate and controlled flow rate and should be pulse free.The HPLC solvents for mobile phase must be degassed to ensure they are pure and free of any contaminants. This is done by passing an inter gas through the solvent reservoir in vacuum degasser.Injector The sample is injected through syringe into the injector port. The injection system must not interrupt the flow of mobile phase and should deliver sample into the column in small volumes (5-500L).Column Most commonly used HPLC column is 25cm in length, internal diameter of 4-6mm and particle size of 5m.1.9.3 Detectors in HPLCWhen the sample components elute the column at different rates, they pass through the detector, and the information form the detector is then displayed in the form of a chromatogram.1.9.4 UV-Vis DetectorThe detector is set at a specific wavelength which will be absorbed by the analyte. The degree of absorbance of UV radiation by the analyte is proportional to its concentration. (Beer Lambert law)1.9.5 diode military Detector or DADThe Diode Array detector is a type of UV Vis Detector D Kealey page 162. When the sample reaches the detector cells, UV radiation is shone on the analyte. The light source mostly used is a Deuterium lamp. After light passes through th e cell, its dispersed onto the sensitive diodes via diffraction grating or quartz prism. Every diode in the array detects different wavelengths. The measure of differences in extent of absorbance at different wavelengths by the sample components results in their identification and also gives information about the concentration of the analytes. http//www.chromatography-online.org/topics/diode/array.htmlOther detectors used in HPLC are Fluorescence, refractive index, electrochemical detectors etc. d Kealey 163-165Figure 1.9.5.1Experimental MethodThis project was performed in four different experiments. In all experiments, the methods for extracting the capsaicin from chilli peppers and sauces were the same i.e. reflux and Ultrasonication. However, different masses of chilli peppers, their individual parts were used and solvent volumes were taken in these experiments. (see results)2.1.1 Preparation of chilli samples and extractionSeveral chillies were cut into small pieces and weighed into a 250 mL round female genitals flasks. Ethanol (75 ml) was then added to chillies. A condenser (fitted with rubber tubing to the water tap) was fixed to the round bottom flask and solution was placed on isomantle (set at 80C) and refluxed in fume cupboard. After cooling off, extract was filtered into 100ml flask and made up to the mark with ethanol. A 5ml aliquot was withdrawn into 1.8ml sample vial using a 0.45m syringe filter. These aliquots were then analysed through HPLC.2.1.2 Preparation of chilli sauces and extractionThe hot sauces were prepared by dilution of sauce (2g) with ethanol (15ml) in beakers and solutions were places in ultrasonic bath (set at 60C) for 30 minutes. The extracts were filtered in the same way as chillies i.e. using 0.45l syringe and transferred to 20ml volumetrical flasks and bringing up to the mark with methanol.The equipment used was white tiles, knife, weighing boat and weighing scale.2.1.3 Preparation of glasswareIn analytical experiments, it s of prime magnificence to ensure the glassware used is clean. Therefore, the glassware used in this project was washed first with deionised water and then with the solvents used.2.1.4 Preparation of standards for CalibrationThe standard solutions were prepared from 200ppm stock solution directly into sample vials. Eppendorf pipette was used for accuracy and 0, 20, 40, 60, 80, 100 ppm standards were made with HPLC standard Methanol.Concentration/ppmVolume of 200ppmCapsaicin/ LVolume of methanol/L00100020100900402008006030070080 cd6001005005002.2 HPLCThe HPLC used in the laboratory was Agilent 1100 serial publicationColumn- ODS hypersilUV VIS Detector- G1315B Diode array detector (set at 280nm)Flow rate- 1.3 ml/minWindows XP CPUMobile phase- Isocratic at 6535 Acetonitrile (2% acetic acid) waterParticle size- 5m, Column dimension- 250mm x 4.6mm2.3 Determining max for UV- Vis detectorThe max for the detector was determined by placing methanol snowy in UV spectrometer (Perkin Elmer wi th lambda 40) to calibrate it. After calibration, a 100ppm capsaicin standard was placed in the spectrometer and a graph was obtained with the optimum wavelength (see addition 1). This was 280.40nm and the HPLC detector was set at this wavelength.2.4 Determining optimum mobile phase composition (see Appendix 2)The mobile phase was altered to different ratios to establish what ratio gives the best separation and reasonable retention times (less than 7 minutes). The 8020 ratio (MeCn water) gave shorter retention time but the peaks were eluted close to each other. The 7030 ratio showed good retention time but peaks were still closer to each other. 5050 ratio gave long retention time and 6040 ratio gave good separation but retention time was longer. Therefore ratio of 6535 was used as this gave the best retention time and separati