Saturday, August 31, 2019

Overview Of Cooling System Engineering Essay

In order to cut downing fuel ingestion and run into the emanation criterions, many betterments has been made. The illustrations of the betterments are combustion schemes, fuel injection system, exhaust emanation and fuel quality [ 1 ] . There are four possible beginnings of atmospheric pollution from the car. Without emanation controls, a carburettor and fuel armored combat vehicle emits bluess, the crankcase emits blowby gases and the tailpipe emits exhaust gases that contain pollutants. The chief regulated pollutant in engine fumes are nitrogen oxides ( NOx ) , C monoxide ( CO ) , unburned hydrocarbon ( HC ) and smoke [ 2 ] . These air pollutants are harmful to human existences every bit good as workss and animate beings. The jurisprudence now requires automotive makers to put in emanation controls. Car that gives away inordinate sum of air pollutants may non be allowed on the streets someday. Stronger Torahs restricting automotive air pollution and compulsory review and care has been proposed. These Torahs are portion of the authorities policy that autos must lend every bit small as possible to the job of air pollution. Each auto already have three major systems for commanding pollutants from these beginnings that is positive crankcase airing ( PVC ) , evaporative emanation control and exhaust emanation control. But in this survey we want to concentrate more on engine chilling system and its effects to the emanation decrease, fuel ingestion and engine public presentation. Now, we will through about the constituents of engine chilling system and its maps. Engine chilling system is a system that responsible for chilling the engine by let go ofing heat through the chilling fives so that the auto & A ; acirc ; ˆâ„ ¢s engine is non excessively hot or non excessively cold. This system helps to convey the engine up at to normal runing temperatures every bit rapidly as possible and maintain the operating temperature for efficient map of the auto engine. It is really of import to maintain the engine at its most operating temperature at all velocities and runing conditions. Burning fuel in the engine produces heat. Some of the heat must be taken away before it amendss the engine parts. This is one of the occupations that performed by the chilling system. If the engine temperature is excessively low, fuel ingestion will lift and if the temperature is excessively hot for excessively long, the engine will overheat.1.2 TYPES OF COOLING SYSTEMThere are two types of auto chilling system which is the air chilling system and liquid chilling sys tem. Air chilling system is a system that uses air as a chilling agent. It is normally used in individual cylinder engines such as bikes while liquid chilling system is known as the radiator system. It a system that uses liquid as a chilling agent and is used in a multi-cylinder engine such as autos and trucks. Radiator is the important constituents in the auto chilling system. It ensures the engine is non overheating. Figure 1.1: Cooling System Components [ 12 ]1.3 COMPONENTS OF COOLING SYSTEM1.3.1 WATER JACKETFor operation of the chilling systems, it uses five basic parts or constituents to make the occupation in commanding the engine temperature that is H2O jackets, H2O pump, thermoregulator, radiator and fan. Water jackets are unfastened infinites between the cylinder walls and the outside shell of the block and caput. Coolant from the H2O pump flows foremost through the block H2O jackets. Then, the coolant flows up through the cylinder caput H2O jackets and back to the radiator.1.3.2 WATER PUMPWater pump normally known as impeller pumps. It is attached to the forepart of the engine and are driven by a belt from crankshaft block. The pump circulates every bit much as 28 390 L of coolant an hr. As the impeller rotates, the curving blades draw coolant from the underside of the radiator. It forces the coolant from the pump mercantile establishment to the H2O jackets. The impeller shaft is supporte d on certain bearings which ne'er need lubrication. The seals prevent the coolant from leaking past the bearings.1.3.3 RadiatorRadiator is a heat money changer that removes heat from engine coolant that go throughing through it. The heat transportation from the hot coolant to the ice chest outside air. It has three chief parts that is radiator nucleus, recess and mercantile establishment armored combat vehicles. The nucleus consists of set of tubings and set of fives that attached to the tubings. Figure 1.2: Coolant Flow Inside Engine Cooling System [ 12 ] C: UsersFaisal Mamat.FaisalMamat-PCDesktopCapture.PNG1.3.4 ThermostatFor thermoregulator, it is a heat operated valve that regulates the coolant temperatures. It does this by commanding the coolant flow from the engine to the radiator. The thermoregulator is in the coolant transition between the cylinder caput and the radiator. The valve in thermostat stay unfastened and close as coolant temperature alterations. Equally long as the coolant temperature is below the thermoregulator set point, the thermoregulator remains closed. Once the temperature arrives at the set point, the thermoregulator starts to open, directing heated coolant through the radiator. The radiator so cools the het engine coolant and the H2O pump forces the coolant back through the engine. The transition to the radiator is closed when the engine is cold so the engine can warms up more rapidly. Engine heat corsets in the engine alternatively of being carrie d to the radiator. Figure 1.3: Closed Position of Thermostat [ 12 ] Figure 1.4: Open Position of Thermostat [ 12 ]1.3.5 ELECTRIC FANAn electric fan is turned on by thermostatic switch merely when needed. For illustration, it turns on when the coolant temperature reach 93 & A ; Acirc ; & A ; deg ; C and turn off back the fan if the coolant drops below this temperature. But on vehicles with air conditioning, turning on the air conditioner bypass the thermostatic switch. The fans run all the clip when air conditioner is on. The fan is controlled by electronic control faculty ( ECM ) in many vehicles with an electronic engine control system.1.4 PROPERTIES OF COOLANT1.4.1 TAP WATERTap H2O is drinkable H2O supplied to a pat inside the family or workplace. The application of engineerings involved in supplying clean H2O to places, concerns and public edifices is a major subfield of healthful technology. Specific chemical compounds are frequently added to tap H2O during the intervention procedure to set the pH or take contaminations, every bit good as Cl to kill biological toxins. The usage of tap H2O adversely affect the auto chilling system. Tap H2O contains Mg and Ca ions that will organize the xanthous precipitate ( rust ) when the H2O becomes hot. The xanthous precipitate will be attached to the auto engine after long clip period and this will cut down the soaking up of heat from the engine. If this rust become denser, it can interfere the transition of chilling liquid in the auto chilling system.1.4.2 ETHYLENE GLYCOL ( EG )Ethylene ethanediol is an organic compound widely used as an automotive antifreeze and a precursor to polymers. In its pure signifier, it is an odorless, colorless, syrupy, sweet-tasting liquid. Ethylene ethanediol is toxic, and consumption can ensue in decease. Ethylene ethanediol is produced from ethene via the intermediate ethene oxide. The major usage of ethene ethanediol is as a medium for convective heat transportation. For illustration, cars and liquid cool ed computing machines. Pure ethene ethanediol has a specific heat capacity about one half that of H2O. So, while supplying freezing protection and an increased boiling point, ethylene ethanediol lowers the specific heat capacity of H2O mixtures relative to pure H2O. A 50/50 mix by mass has a specific heat capacity of about 0.75 BTU/lb F, therefore necessitating increased flow rates in same system comparings with H2O.1.5 FuelGasoline is a transparent, crude oil derived liquid that is used chiefly as a fuel in internal burning engines. It consists largely of organic compounds obtained by the fractional distillment of crude oil, enhanced with a assortment of additives. Some gasolene besides contain ethanol as an alternate fuel. A good gasolene quality should hold: Proper volatility, which determines how easy the gasolene vaporizes. Resistance to trip knock or explosion. Oxidation inhibitors, which prevent formation of gum in the fuel system. Antirust agents, which prevent rusting of metal parts in the fuel system. Detergents, which maintain aid maintain the carburettor or fuel injectors clean. Dye for designation, such as ruddy oculus which gives leaded gasolene a rust or orange coloring material.1.5.1 VOLATILITYVolatility is the easiness with which a gasolene vaporizes. Gasoline must zap rapidly after it is assorted with air in the throttle organic structure or intake manifold. Otherwise, beads of liquid gasolene enter the cylinder walls. This increases wear of the cylinder walls, Pistons and rings. Gasoline that does non zap will non fire. It leaves the cylinder in the fumes gas and pollutes the air. This wastes gasolene and reduces fuel economic system. Volatility determines how rapidly a gasolene can zap. A high volatility gasolene can zap rapidly while a low volatility gasolene vaporizes easy. Gasoline must hold the right volatility for the clime in which it is used.1.5.2 ANTIKNOCK QUALITYAntiknock is known as octane evaluation. It measure the gasolene ability to defy knock during burning. The higher the octane evaluation, the greater the engine ‘s opposition to strike hard. The knocking in your engine occurs when the air fuel mixture detonates prematurely. Since it is the gasolene vapour that ignites, the air fuel mixture must be right to fire swimmingly. Some of the jobs associated with knock are overheating of engine parts such as valves, Pistons and flicker stoppers.1.6 EmissionThen we will travel for the account about the burning in the engine and how it ensuing emanation. Automotive fuels such as gasolene are made largely of two elements that H and C. They have chemical symbols H and C. This type of fuel is hydrocarbon ( HC ) . During complete burning in the engine, these two elements unite with other component, the gas O. Oxygen, normally in the signifier of free O ( O2 ) , makes up approximately 20 per centum of the Earth atmosphere. This is the air that we breathe. During burning procedure, each atom of O will unify with two H atoms. Each C atom unites with two O atoms. Oxygen unifying with H green goodss H2O ( H2O ) . Carbon unifying with O green goodss gas C dioxide ( CO2 ) . During burning, the combustion of air fuel mixture in the engine cylinder may make 2200oC or higher. This high temperature produces force per unit area in the engine that makes it run and produces power. With perfect burning, all the H and C in gasolene would unify with the O. The fumes would incorporate merely harmless H2O and CO2. But burning is non perfect in the engine. Some of the gasolene ( HC ) does non fire. Besides, some of it merely partially burns. This produces C monoxide ( CO ) . This deficiency of O prevents the formation of C dioxide. The unburned gasolene and partially burned gasolene ( CO ) issue from the engine through the tailpipe. Once in the air, it will do atmospheric pollution. Another group of atmospheric pollutants the engine is nitrogen oxide ( NOx ) . About 80 per centum of the ambiance is gas N ( N ) . High temperatures in the burning chamber do some of the N and O to unify and organize N oxide ( NOx ) .1.7 PROBLEM STATEMENTNowadays the rate of fuel ingestion presently traveling on throughout the universe is rather dismaying. Fuel ingestion and emanation rates are off the chart. This will give negative impact to the environment and increase the pollution rate. Basically the power to travel a motor vehicle comes from the combustion of air fuel mixture in an engine. Air pollutants from vehicles comes from the merchandises of this burning procedure. With perfect burning procedure, the emanation would be H2O ( H2O ) and C dioxide ( CO2 ) . Both of these are harmless gases. But burning is non perfect in an engine. Some of the gasolene ( HC ) does non fire and some of it merely partially burns. This produces C monoxide ( CO ) and nitrogen oxide ( NOx ) . Both of these gases are air pollutants and take a breathing contaminated air is really bad for human and animate beings. Then the demand for low cost auto from client that has good public presentation with low fuel ingestion and emanation besides addition. Normally auto that has good public presentation will hold high fuel ingestion and emanation rate. In order to work out these jobs, the survey about engine chilling system and its effects towards engine public presentation, fuel ingestion and emanation decrease will be conducted. Two types of liquid chilling such as tap H2O and ethene ethanediol will be used and its temperature will be checked in order to look into the influenced to these 3 end products.1.8 OBJECTIVES OF THE RESEARCHTo analyze the consequence of engine chilling system and its constituents to the engine public presentation, fuel ingestion and emanation. To look into the influence of per centum of ethene ethanediol in the coolant and coolant temperature set point to the engine public presentation, fuel use and emanation rate.1.9 SCOPE OF THE RESEARCHThe range of this researched is chiefly about the fluctuations per centum of coolant ( ethylene ethanediol ) mixed with H2O and its temperature effects towards engine public presentation, fuel ingestion and emanation. The per centum that will be used for ethylene ethanediols are 30 % , 50 % and 70 % . For every per centum, the coolant temperature set point will be controlled utilizing two sort of thermoregulator with temperature set point 80oC and 100oC. The increasing temperature in cylinder block by increasing the coolant temperature consequences in fuel nest eggs and emanation decrease. Boiling Point Ethylene Glycol solution ( % by volume ) 0 10 20 30 40 50 60 70 80 90 100 Temperature F 212 214 216 220 220 225 232 245 260 288 386 C 100 101.1 102.2 104.4 104.4 107.2 111.1 118 127 142 197 Table 1.1: Boiling Point of Ethylene Glycol Solutions [ 13 ] Car theoretical account that will be used is Perodua Kancil 660cc ( 4 shot and 3 cylinder ) . Then for the fuel, gasoline RON 95 will be used. Three trial will be conducted in investigate the engine public presentation, fuel ingestion and emanation rate. The trial for engine public presentation is dynamometer trial. A ergometer is a device that is used for mensurating force, minute of force ( torsion ) , and power. For illustration, the power produced by an engine, motor or other revolving premier mover can be calculated by at the same time mensurating torsion and rotational velocity ( RPM ) . For the fuel ingestion, we will carry on a fuel trial by utilizing a new armored combat vehicle provided by automotive lab. Unit of measurement to mensurate the fuel trial is in liter/km. To mensurating the emanation rate, gas analyser is used and the measuring unit is in concentration of gas which is parts per million ( ppm ) .1.10 SIGNIFICANT OF THE RESEARCHThis survey will give better apprehension and exposure about the operation in the engine chilling system and how it will effects the engine public presentation, fuel ingestion and emanation. Reducing the fuel disbursals by auto users as the rate of fuel ingestion reduced. The expected end product to cut downing the emanation will ensue in increased the air quality that is harmful to worlds. It besides will take in cut downing the air pollution rate and supply more safer environment for people. The low cost auto with good public presentation and low on fuel and emanation rate besides will be develop.2.0 LITERATURE REVIEW2.1 Cooling SYSTEM OPERATIONA immense sum of heat is generated in the internal burning engines. It is created when the air fuel mixture is ignited inside the burning chamber. The detonation that occur will do the Piston to be forced down indoors the cylinder, prying the connecting rods and turning the crankshaft. The temperatures of the metal parts around the cylinder can transcend 2500oC. To forestall the constituents such as engine oil, cylinder walls, Pistons, and valves from overheating, it is necessary to efficaciously dispose the heat. Approximately 30 % of heat in the burning procedure is lost into the ambiance through the fumes system, 35 % is converted into power to drive the vehicle and the staying 35 % lost as heat through the cylinder walls [ 9 ] . Water pump is attached at the forepart of the engine and driven by a belt from crankshaft block. The impeller rotates and the curving blades draw liquid chilling from the underside of the radiator and force it to flux through pump mercantile establishments and H2O jackets. The liquid chilling will flux through passageways in the engine block and cylinder caput. Temperature in the burning chamber can around 2500oC, so chilling around this country is critical to forestall overheat. The countries around exhaust valve are particularly important and about all infinite inside the cylinder caput around the valve that is non needed for construction filled with coolant. But when the engine is still cold, thermostat still near and the liquid chilling is circulated back to the engine. By shuting the transition through radiator when engine is cold, the engine warms up more rapidly. Engine heat corsets in the engine alternatively of being carried to the radiator. This shortens warms up clip, wastes less fuel and reduces exhaust emanations [ 3 ] . After engine already heat up, the thermoregulator keeps the engine running at a higher temperature than it would without a thermoregulator. The higher operating temperature improves engines efficiency and reduces exhaust emanations [ 3 ] .2.1.1 EFFECT OF RADIATORA radiator normally known as heat money changer. The hot coolant that flows through it will reassign the heat by the air blown through the aluminum fives by fan. Nowadays modern autos use aluminium radiators. It normally made by brazing thin aluminum fives to flattened aluminum tubings. Flow of the coolant is from recess to the mercantile establishment through many tubings that mounted in parallel agreement. These fives will carry on the heat from the coolant inside the tubings and reassign it through the air that fluxing through the radiator. [ 1 ] A type of five is inserted into the tubing called turbulator. Its map is to increases the turbulency of the fluid fluxing through the tubings. If the flowing of the fluid through the tubing is smooth, merely the fluid that touching the tubings would be cool straight. The sum of heat transferred from the fluid to the tubes depends on the difference in the temperature between the tubing and the fluid touching it. Therefore, less heat will be transferred if the fluid that is in contact with the tubing cools down rapidly. To forestall that, turbulency is created inside the tubing and all of fluid mixes together. Keeping the temperature of the fluid touching the tubing up so that more heat can be extracted and all of the fluid inside the tubing is used efficaciously.2.1.2 EFFECT OF RADIATOR FANThe map of radiator fan is to pull the air towards the radiator and helps to chill the hot coolant that fluxing through the tubings. It normally has four or more blades that spin quickly to supply s ufficient air to that would chill the engine. The fan will be mounted between the radiator and the engine so that the air can easy fluxing through the radiator. There are besides extra fan in forepart of the radiator in some autos in order to pull more cool air to the engine particularly when vehicle is non traveling fast plenty, really small cool air reaches the radiator and the engine is non cooled decently.2.1.3 EFFECT OF PRESSURE CAPThe radiator cap or besides known as force per unit area cap really increases the boiling point of your coolant by about 25oC. The cap is a force per unit area release valve and normally is set to 15 pounds per square inchs. When the coolant is placed under force per unit area, its boiling point will increase. As the engine running, the chilling system will be heated up and increase the force per unit area. The lone topographic point where the force per unit area can get away is at the force per unit area cap. Therefore, the scene of the spring on th e cap determines the maximal force per unit area in the chilling system. If the force per unit area reaches 15 pounds per square inch, it will force the valve unfastened and leting the coolant to get away from the chilling system. The flowing of the coolant is from overflow tubing to into the underside of the overflow armored combat vehicle. This sort of agreement will maintain air out of the system. After the radiator is already cools back down, a vacuity is created in the chilling system that pulls unfastened another spring loaded valve while sucking the H2O back in from the underside of the overflow armored combat vehicle to replace the H2O that was expelled.2.1.4 EFFECT OF WATER PUMPWater pumps are impeller pumps. They attached to the forepart of the engine and driven by a belt from the crankshaft block. As the impeller rotates, the curving blades draw coolant from the underside of the radiator [ 3 ] . The H2O pump merely thrust to drive the round flow of the coolant within the engine chilling system, so the recess is the point of lowest force per uni t area in the system and the issue point is the highest force per unit area. The force per unit area drops aggressively at the inlet/outlet of the H2O pump during the operational of the H2O engines and this force per unit area bead will change in proportion to the rotational velocity. Water pumps in engines are prone to cavitation and air bubbles are likely to pervade in to antifreeze and will badly cut downing the public presentation, dependability and service life of the engines [ 6 ] . Cavitation means the pits or bubbles are organizing in the liquid that have been are pumping. These pits form at the low force per unit area or suction side of the pump. For the well design engine chilling system, cavitation is less likely to take occur as the temperature of the coolant diminutions. But when the cavitation temperature is reached, the force per unit area of the H2O pumps drops suddenly and all the chilling system loses its functionality.2.1.5 EFFECT OF THERMOSTATThe chief map of the thermoregulator is to let the engine to heat up rapidly and maintain it at its efficient temperature. It control this by modulating the sum of H2O that goes through the radiator. The coolant in the chilling system starts to originate by picking up heat at the H2O jackets. In the coolant circuit, the force per unit area gradient exist and doing the hot coolant flows out from the engine to the radiator or to coolant beltway transition [ 2 ] . Once the temperatures of the coolant rises to 80oC, the thermoregulator starts to open. Different thermostat unfastened at different temperatures and leting fluid to flux through the radiator. The secret of the thermoregulator lies in the little cylinder located on the engine side of the device. Actually this cylinder is filled with wax that starts to run at temperatures 80oC ( depends on the thermoregulator ) . Then, a rod that is connected to the valve imperativeness into this wax. As the wax thaws. It will spread out and forcing the rod out o f the cylinder and opening the valve.2.2 EFFECT OF COOLANTCoolant is the mixture of antifreeze and H2O in the chilling system. The normally used antifreeze is Ethylene Glycol. This coolant will go around through the chilling system. It will take the waste heat from the engine and delivers the heat through the radiator hosiery to the radiator. It is non recommended to utilize merely H2O as a liquid chilling because it would stop dead if the temperature bead below 0oC. This would halt the circulation and the engine would overheat. As the H2O would spread out 9 % as it freezes, it would check the cylinder block and caput, split the radiator [ 3 ] . By commanding the engine chilling system in a flexible manner as comparison to the conventional chilling system, it will better the fuel ingestion rate of flicker ignition ( SI ) engines [ 11 ] . It is known from the cold start research that the coolant and inlet charge temperature are cardinal parametric quantities to cut down pollutant emanations and warrant smooth engine operation. Cold start experiment were performed with coolant temperatures of 15oC and 80oC. In the steady province operation reached after the start, the Piston surface temperature was severally 110oC and 150oC. The HC emanations were 25 % lower and the NOx emanations 7 % higher with the higher coolant temperature. It seems to bespeak that there is an influence of the coolant temperature on the emanations through the cylinder wall temperatures [ 5 ] . In the hunt for greater fuel economic system and decreased emanation end product, the engine chilling system is being targeted for farther betterments to engine public presentation through its effects on engine frictional losingss. Fuel economic system betterments from the alterations to the engine chilling system are derived chiefly from reduced engine frictional losingss with increased oil temperature by raising the engine operating temperature indirectly through the measure addition in the coolant temperature. Hydrocarbon ( HC ) and C monoxide ( CO ) end product are besides shown to diminish with the addition in operating temperature [ 7 ] . There are besides suggestion that higher cylinder block temperatures will cut down the frictional losingss with the Piston and pealing battalion and will take to cut downing fuel ingestion [ 10 ] . But the increasing of operating temperature has a negative consequence on N oxide ( NOx ) end product as the formation of NOx in the burning chamber can be extremely sensitive to temperature alterations [ 7 ] . There are some old plants in the engine chilling country focal points on to the fuel economic system benefit to IC engines through the decrease engine frictional losingss by raising the coolant temperature. As the coolant temperature additions, the cylinder block wall temperaturs besides increases and will ensue in cut downing the HC emanations [ 11 ] . It concentrates chiefly on gasolene engines where oil temperature is comparatively lower and the tailpipe emanations are HC and CO. Fuel efficiency betterments about 10 % are achieved in portion burden conditions by raising coolant temperature [ 7 ] .Methodology3.1 IntroductionIn this chapter, we will discourse about the processs and full activities to transport out in this whole undertaking. The flow chart below will depict the stairss that should be followed during this undertaking. Basically there are 3 trial that will be conducted that is dynamometer trial, fuel trial and emanation trial.3.2 FLOW CHARTPart Choice Choose the type of liquid chilling and thermoregulator that will be used. Preparation and Setup Choose the type of liquid chilling and thermoregulator that will be used. Run the experiment The experiment will be conducted to the conventional and modified chilling system. Emission Trial Fuel Trial Dynamometer Test Datas AnalysisTYPES OF METHODS3.3.1 DYNAMOMETER TrialDynamometer is really a device usage to mensurating force, minute of force ( torsion ) and power produced by an engine or motor. We can see the illustration from the power produced by an engine, motor or other revolving premier mover can be calculated by at the same time mensurating torsion and rotational velocity ( RPM ) . Nowadays dyno trial become more easy to run with the progress of the modern computing machine and bring forth more accurate consequences. A dyno that paired with the computing machine will expose the power evaluation of a given machine as a figure below. Degree centigrades: UsersFaisal Mamat.FaisalMamat-PCDesktopdynamometer-test-2.1-800Ãâ€"800.jpg Figure 3.1: Example Graph of Dynamometer Test Actually dyno trial is used for assorted applications but the most common one is automobile proving. Automobile makers will mensurate the public presentation of a auto or truck in order to market its power. Sports auto will modified their vehicles with aftermarket parts in order to accomplish higher power end product and so run the dyno trial to measure their alterations. Dyno trials can be run in a twosome of different ways which is human body and engine dyno. When running a human body dyno trial, the vehicle to be tested is driven onto the dyno platform that simulates opposition through the usage of machine-controlled wheels. For an engine dyno trial, the engine to be tested is mounted to the dyno device. These different methods produce different measurings such as brake Equus caballus power and torsion from a human body dyno and flywheel Equus caballus power and torsion from an engine dyno. Power is frequently lost through the thrust train of a vehicle so the brake measuring will typically less than the flywheel measuring. The theoretical account that will be used for ergometer testing is Dynapack 3000. The constituents of Dynapack 3000 consists of computing machine, detectors hub adapters accountant and power soaking up units. This trial is a spot from other dyno trial because of the riddance of the tyre to roller interface on a conventional roller dyno. It eliminates this variable by utilizing a hub adapter that provides a direct yoke to our power soaking up units. There will be no tyre faux pas, no turn overing opposition and no opportunity of the vehicle coming off from the dyno at high velocities. For the theory of operation. First the hubs of the vehicle are straight attached to hydraulic pumps. A variable burden can be applied with all of the possible keeping power that hydraulic possess. Figure below show that the wheels are removed from the vehicle and the variable fit hub adapters are bolted to the vehicle axle. The hub adapter is so straight attached to a hydraulic soaking up unit. Degree centigrades: UsersFaisal Mamat.FaisalMamat-PCDesktopdyno and gas analyser2t1nkVS-bVa9gQb37zp6LeNyhqyOJc4TfM-fDuqeDVw.jpgC: UsersFaisal Mamat.FaisalMamat-PCDesktopdyno and gas analyservIQiOZd6MQEKChUSE_EjDet0c_3AZX3Ykc63jQJyo1g.jpg Figure 3.2: Hub adapter bolted to vehicle Figure 3.3: Proctor of Dynapack 30003.3.2 FUEL TrialFor the fuel trial, a new fuel armored combat vehicle is used to replace with the bing armored combat vehicle. The job with the bing armored combat vehicle is the fuel ingestion can non be measured right. The new fuel armored combat vehicle will be connected utilizing the hosiery from the fuel pump to the series of injectors at cylinder caput. Gasoline or RON 95 will used in this fuel trial. The illustration for the new fuel armored combat vehicle is shown in figure below and the fuel pump is already attached on top of it. Degree centigrades: UsersFaisal Mamat.FaisalMamat-PCDesktopdyno and gas analyser8EYHfSB7JGJ_i1gO_0dpJCrDuHDVK9bGh1xnPJzzuSQ.jpg Figure 3.4: The new fuel armored combat vehicle The trial will be conducted harmonizing to the cogwheels and revolution per proceedingss ( RPM ) that already been set. It is done to command the velocity of the engine to acquire the accurate consequence of the fuel ingestion without affected by the changing of cogwheel on each trial. The RPM and cogwheels can be referred in the tabular array below. Gear Revolutions per minute Distance ( kilometer ) 1 3000 2 3000 3 3000 4 4000 Table 3.1: Revolutions per minute for each of the cogwheel3.3.3 EMISSION TrialHydrocarbon ( HC ) , C monoxide ( CO ) and nitrogen oxide ( NOx ) are measured in parts per million ( ppm ) . For this emanation trial, the device that will be used is the gas analyser 95/3. The gun of this device will be placed into the tailpipe to mensurate the fumes rate. The information will be taken during the assorted RPM that already been set up which is 2000 revolutions per minute, 3000 revolutions per minute and 4000 revolutions per minute. The consequence of this trial will be recorded in this device. Degree centigrades: UsersFaisal Mamat.FaisalMamat-PCDesktopdyno and gas analyservKBx3J-b1dLfHTA3MeaWYgo8LcKrPxDuaprQ5PBq-VY.jpg Figure 3.5: Gas Analyzer 95/3Undertaking SCHEDULE3.4.1 GANTT CHARTTable 3.1: Gantt Chart for Final Year Undertaking Research Planning Research Advancement

Friday, August 30, 2019

Business Law Essay

On Monday, A proposed to B to buy B’s car for $12,000 by post. It is primary to distinguish between an invitation to treat and an offer, as an offer once accepted creates a legally binding contract in which does not apply to the alleged acceptance of an invitation to treat. Therefore, the issue is whether the proposal from A is an offer or an invitation to treat. An offer is defined in Preston Corpn Sdn Bhd v Edward Leong [1982] as an  intimation of willingness by an offeror to enter into a legally binding contract. Its terms either expressly or impliedly must indicate that it is to be become binding on the offeror as soon as it has been accepted by the offeree. The crucial factor that determines whether something amounts to an offer is the intention to be bound, which is usually shown by the wording. Conversely, an invitation to treat is a proposal to negotiate or an attempt to receive proposals. The person extending the invitation is merely indicating that he/she is willing to enter into negotiations but is not bound to accept any offers made. Nonetheless, in the English of Smith v Hughes [1871], the court emphasized that the important thing is not a party’s real intentions but how a reasonable person would view the situation. This is due mainly to common sense as each party would not wish to breach his side of the contract if it would make him/her blameworthy to damages. The details of A’s letter are omitted, thus making it the more difficult to assess the express and implied terms of the proposal, which would come in handy to determine whether or not there is an intention to be bound. Although buyers may have the inclination to negotiate on the terms, rarely will there be one who will do so after initiating a proposal. Once taken the initiative and had gone through the hassle to write out a letter and have it sent, this shows an expression of willingness to buy therefore it is plausible that there is an intention to be bound. But of course this would be my personal presumptions as a reasonable person. Wrapping up, in my opinion, this proposal from A is suggested to be an offer instead of an invitation to treat and once there is an acceptance from B, a mere agreement will be formed. Some prerequisites are mandatory to make an offer valid, thus leads on to the following case. The letter of offer from A was misplaced by the postman and picked up by B’s neighbor, C who passes B the letter on Friday. Logically; an offer must be acknowledged by the offeree to be valid. The concern here is whether the  offer from A was communicated and validated. As stated in Barnes. et al. (2006, p.166) â€Å"The act of communicating the offer indicates that the offeror is willing to be bound by its terms. On the other hand, a non-communicated offer may be evidence that the offeror has not yet decides to enter into a binding agreement.† The general rule of acceptance is that performance of the requested act does not amount to an acceptance unless the party performing the act did so with knowledge of the existence of an offer. If otherwise, a party could find himself bound to the terms of a contract of which he was entirely unaware. However, there is a case for making an exception in the case of a unilateral contract, at least when performance of the act cannot subject the performing party to any disadvantage. Gibbons v Proctor [1891] is an English Contract Law case that deals with an offer, via advertisement, and whether or not a person who does not know of the offer can accept the offer if they complete the terms of the offer. The case has also been cited as authority for the proposition that acceptance in ignorance of an offer is effective: that a person who gives information for which a reward has been offered can claim it even though at the time of giving it he had no knowledge of the offer of reward. Nevertheless, this offer from A is a sort of bilateral contract, in which A is promising to pay B $12,000 for another promise from B for his car. As the letter of offer from A was in the hands on C and it did not reached B as intended; therefore there is no actual communication and the offer is scarcely considered valid. Common sense tells us that if B had not received the offer from A, there is no way B would learn of A’s offer and let alone to reply to it. An offer made through the post will not be effective until it is received and read by the offeree. In conclusion, my thesis is that the offer from A was neither communicated nor valid till Friday when B received the letter from C. On Tuesday, B proposed to sell his car for $11,000 to A by post and the post reached A on the following day. In the event where B proposed the offer upon acknowledgement of the offer made by A, it would be regarded as a counter offer, which in turn would be a distinction to acceptance. But this will not apply in this case as B’s proposal was made before the awareness of A’s offer. As a result, this proposal here will be subjected to whether or not the proposed is an offer and a legitimated one. In the previous issue, the buyer, A is making a proposal to the prospective seller, B and more often than not it would be an offer. When the roles are reversed, the proposal could be either an offer or an invitation to treat, hence, the need to highlight the differences. As presented in page 2, the explanation of an offer is unambiguous. However, for further illustration on invitation of treat, in Partridge v Crittenden, the defendant was charged with an offence of offering wild birds for sale with the aid of advertisement contrary to the Protection of Birds Act 1954. He was found not guilty since he had not offered the birds for sale; the advertisement was simply an invitation to treat. Adding on, in Fisher v. Bell [1961], the defendant was charged with the offence of offering for sale a flick knife contrary to section 1[1] of the Restriction of Offensive Weapons Act 1959. He had displayed the knife in his shop window with a price ticket behind it. It was held that the defendant had not committed the offence as, in displaying the knife in his shop window; he had not offered it for sale. These two examples of invitation to treat opposed to the common, non legal, understanding of the term ‘offer’. Goods in shop windows or on display and goods advertised are usually invitation to treat which invites people to make offers and where the seller may choose to or not to sell. Chances are that B’s proposal to A is an offer because if otherwise, he would not had taken the trouble to pen it down and have it sent. As previous case, this is merely my assumptions as a reasonable person. The letter intended for A from B was clearly communicated as it reached A the  following day, Wednesday. In conclusion, my perspective is that the proposal made by B is an offer and a valid one as the offer was acknowledged by the offeree, A. A fax of acceptance was sent by A to B in regards of the $11,000 offer for B’s car. However, was never printed out due to paper failure in B’s fax machine. This is evidently an acceptance as it mirrors the offer from B. When an acceptance is effective can be critically important as in most occurrences, the offeror has discretion to revoke the offer at any time before acceptance. The general rule is that an acceptance has no effect until it is communicated to the offeror. In Powell v Lee [1908], the defendants who were the managers of a school had decided to appoint the plaintiff headmaster. One of the managers told the plaintiff of the decision without authorization. Subsequently however, the defendants reversed their decision and appointed a third party in which the plaintiff was suing for breach of contract. The plaintiff’s action failed as for there to be a concluded contract, it was essential that there should be a communication made by the body of the persons to the selected candidate. By using the facsimile machine to send acceptance, it is an effective means of direct communication and no contracts will be created unless it is received by the offeror. In other words, the acceptance is not complete when the message is transmitted but only when it is received. However, in this case, A must have reasonably believed that his acceptance was communicated but this is not so because of the fault of B, then B may be estopped from saying that he did not receive the acceptance. This is clearly the fault of B as fax is a technologically advanced method of communication and B will generally know at once that the fax has not been communicated. The balance of faults weighs more heavily on B, hence the postal rule can be applied in which the acceptance was effective once A made the fax and an agreement between A and B will surface. However, in the event where A’s fax had been printed but not acknowledged by B for three days. Postal rule will not apply in this circumstance as not only is it an instantaneous form of communication but, under the traditional contract principles, if the offer or circumstances do not indicate otherwise, the means the offeror used to converse the offer is the impliedly authorized means for accepting. In other words, unless B had specifically request for other form of communication, it is reasonable for B to assume that A would send his acceptance by post and would not be waiting by the fax machine. In this circumstance, the acceptance is only complete when B acknowledges it three days later. However, the case of Tenax Steamship Co Ltd v Owners of the Motor vessel ‘Brimnes’ [1974] contradicts the statement above as it appears that it is not necessary for the offeror to have read the message. If this is applied, the acceptance will be completed on the day itself when A had faxed it instead of three days when B reads it. Personally, as a reasonable person, I would not agree on the latter as it is extremely unjust for B. There are numerous methods of communication, the instantaneous kinds, e.g. via telephone, e-mail as well as the non-instantaneous kinds. No one would be able to predict the form of communication adopted by the other party so B could not possibly be hanging around the room where the fax machine was situated in, waiting for A’s reply. Thus, if B is ignorant of the acceptance, the acceptance would not be of use. On Friday, B posted his acceptance to sell his car for the offer made by A on Monday. The letter was not received by A for two weeks. When an acceptance is to be made through the postal system, the postal rule does apply in which will results in an agreement on Friday regardless of  whether A receives it or not. This peculiar rule developed by the English Law has been first enunciated in the case of Adams v Lindsell [1818], where an acceptance is completed as soon as posted. â€Å"In Adams v Lindsell [1818], the defendant wrote to the plaintiff offering to sell him wool and asked him to reply by post. The plaintiff replied on the 5th but the letter reached the defendant on the 9th. Meanwhile on the 8th, not hearing anything from the plaintiff, the defendant sold the wool to a third party. The plaintiff sued the defendant and the court held that the acceptance was effective when the letter was posted and so there was a contract and the defendant was in breach of it.† Cited from Chandran (p.24) Saying as much, this contract will not be valid as there was previously an agreement made between A and B when A faxed his acceptance. The contract between A and B is where A will pay $11,000 for B’s car and B would have to let go for $11,000 as stated in page 4. No doubt it would be hard on B if he could be bound even without knowing his offer had been accepted. Nonetheless, as mentioned it was his own slip-up that results in the unknown bound. Since the contract for $11,000 is valid, there would be no existence of subject matter of contract which is B’s car in the $12,000 contract and there is no way B will be able to sell the same car twice without breaching the contract. REFERENCE LIST Barnes, J.D., et al. _Law for Business_, 9th Edition. New York: McGraw-Hill Irwin Bond, H.J., et al. _Business Law_, 2nd Edition. Great Britain: Blackstone Press Limited London Chandran, R. Introduction to Business Law in Singapore, 2nd Edition. New York: McGraw-Hill Irwin Frey, M.A., et al. _Introduction to the Law of Contracts_, 4th Edition. United States: Thomson Delmar Learning New York Kelly, D., et al. _The Cavendish Q & A Series: Business Law_, 1995. Great Britain: Cavendish Publishing Limited London Keenan, D_. Advanced Business Law_, 10th Edition. Great Britain: Pitman Publishing London Lawson, R., et al. _Business Law for Business and Marketing Students_, 3rd Edition. Great Britain: Butterworth-Heinemann Low, K.Y., et al. Business & The Law, 1997. Singapore: Pitman Publishing Asia Pacific Major, W.T. _Law of Contract_, 9th Edition. Great Britain: Pitman Publishing London McKendrick, E. _Contract Law: Text, Cases, and Materials_, 2nd Edition. United States: Oxford University Press Inc Read, P.A. _Contract Law Casebook_, 7th Edition. Great Britain: HLT Publications London Soe, M. Principles of Singapore Law: including Business Law, 4th Edition. Singapore: The Institute of Banking & Finance Tabalujan, B.S. _Singapore Business Law_, 4th Edition. Singapore: BusinessLawAsia Terry, P. _Mastering Business Law_, 2nd Edition. Great Britain: Macmillan Press Ltd Houndmills, Basingstoke, Hampshire and London Assignment Cover Sheet

Thursday, August 29, 2019

Give a concise account of the origin and development of arcades Essay

Give a concise account of the origin and development of arcades. Explain their significance in 19th and early 20th century archi - Essay Example Arcades changed this, as they provided shoppers a comfortable atmosphere to shop. The consumers were sheltered from the elements in the shopping arcades, while being given a leisurely place to browse. While the true arcades did not come into being until the early 19th Century, they have their origins in Muslim bazaars, which were enclosed spaces where people could gather and shop. These bazaars enclosed not just shopping, but mosques and schools. The arcades were modeled after these bazaars, as the arcades provided the same service to consumers as the bazaars – shelter from the elements, and a collective meeting ground. The arcades flourished throughout the 19th Century, then fell out of favour in the 20th Century, as fewer buildings were constructed symmetrically with a narrow alleyway between them. Officials by then had recognized the health hazard of tightly compacted spaces. Although the arcades diminished, they did not die, as the writings of Walter Benjamin revived inter est in them. Benjamin saw the arcades as being a way to provide insight that might elude us in our waking hours, as he thought that they provided â€Å"rare shafts of insight [to] illuminate the ruins of our energies that time has passed by.†2 One can now shop in enclosed spaces in both shopping malls and modern-day arcades. The Donegall Arcade in Belfast is just one example of a modern-day arcade. This essay will trace the origins and characteristics of the arcade, explain why they were important to urbanism, how Walter Benjamin reconceived them, and how they are a part of the modern-day fabric. The Social History of the Arcade The arcade, according to Geist (1983)3, has its origins in the Islamic Bazaars (Figure 1).4 Figure 1 – Islamic Bazaar Source: Geiste, J. Arcades. London: MIT Press, 1983, p. 5 These bazaars were building complexes that were necessitated by the hot desert sun of the Muslim countries, The architecture, and Muslim life, â€Å"unfolded only in the courtyards.†5 Geist (1983) states that the arcade came into fashion because there was a need for streets that were clean and free of danger. Around 1800, according to Geist (1983), Parisian streets were dangerous and of threatening proportions. Pedestrians were threatened by the carriages and the cars on the poorly designed medieval streets. The streets were also turned into mud by the rain. Thus, there was a need for pedestrians to walk on clean sidewalks that were out of the elements. Koloff (1849)6 states that industry was the reason for the arcades, because industry was the reason why the streets were becoming so crowded. Retail trade withdrew from the city towards what would now be known as the suburbs, and the inner city had to compete with this exodus. The arcade was thus born out of necessity. Large clusters of buildings, which surrounded heavily populated streets, were cut through so that the pedestrian could get out of the crowded streets. In the passageway was comm erce - merchants would set up booths to hawk their wares.7 The closed arcades came next, in which the pedestrian could feel that he had set foot in another world that was always dry. It was always warm in the winter and cool in the summer, and never dusty or dirty.8 Geiste (1983) states that the two arcades – the closed and open – appeared at the same time. The open arcades were used for manufacturing and

Wednesday, August 28, 2019

Brand building for facilitating the launch of Dogerita mineral water Essay

Brand building for facilitating the launch of Dogerita mineral water - Essay Example People are bombarded with advertisements and a wide variety of brands to choose from. As competition is fierce in an age where there is plenty to choose from, companies need to find ways to create a niche and to improve its brand in the market. It is no longer sufficient to just provide a product. The German Share Company must find ways to stand above the rest in a global business environment that fights for the consumers' money and loyalty. In order to do this, it must develop a brand and a brand strategy. a brand is also considered to be a trademark or a product line. It is a distinctive name which addresses, or identifies, a product, service, or a manufacturer. People purchase a certain brand in order to acquire a distinctive category and to show ownership of the brand that they favour. The name of the organization can also serve as a brand. As stated earlier, the value of a certain brand is determined by how it is perceived by the target audience and the marketplace. After defining the brand, the company must develop a strategy of branding, or a brand strategy. This process consists of coming up with a foundation (a basis) in which to work from. It is a guideline and a system of measuring all marketing strategies and resources/materials. It is a way to deliver the brand strategy, or promise to the target audience.

Tuesday, August 27, 2019

CRITIQUE ON CHAPTER 7 Essay Example | Topics and Well Written Essays - 500 words

CRITIQUE ON CHAPTER 7 - Essay Example An important feature of this chapter is that it assumes that the reader is familiar with material that has been presented in all the preceding chapters. The abstract ideas are critical here, but they rest on concepts that have already been thoroughly discussed such as resource allocation ( p. 8) and perception, action and cognition (p. 9). 2. The close link between media and physics was something of a surprise, since most f the earlier chapters were more concerned with biology, but on reflection this is the missing piece of the puzzle that makes all the earlier concepts hang together. Humans are made up of physical atoms, and the concept of forces interacting in the environment in a dynamic way helps to explain some of the interesting variables in media studies, like for example why some people react in one way to a media stimulus, (e.g. being scared at a horror film) while others act in another way (e.g. just laughing at the fake blood). A lot of factors contribute to how people feel about the horror film, and this was interesting. 3. The chapter ended with an intriguing statement about uncovering â€Å"a science of human communication that is applicable across media, cultures and environments† and I would like to have heard more about this. I suspect that such a science would be very technical, and hard to follow, since the abstract concepts are not easy to remember without concrete examples, but nevertheless this does explain the point behind all this heavy theorizing. I think perhaps the authors should have made this objective clearer at the beginning of the book. Some of the lengthy theory sections might have made more sense if the reader had been aware of this final objective. 4. We talked in class about the weather, as an example of how dynamic interaction takes place and this was a good way of teasing out the relationship between ever changing variables. I liked the

Monday, August 26, 2019

Physical therapy evidence based practice articles Research Paper

Physical therapy evidence based practice articles - Research Paper Example Moreover, the patients were expected to have no pre-existing conditions limiting mobility or contra-indications or balance to TENS. Furthermore, the participants were selected from local community stroke factions and volunteers from the research groups database. Additionally, the participants were expected to be able to give an explicit consent and travel to the study facilities for the necessary testing. The intervention involved a single session of "active TENS" given through a "sock electrode" (frequency between 70-30Hz over a 5s cycle) as well as a course of control treatment (participants wearing the sock electrode lacking stimulation), lasting about two hours in total. There was blinding where all the patients acted as their own control while the randomization followed the order in which the control or TENS was issued thus all participants receiving both stimulation and control conditions. The outcomes reported were obtained from plantar flexor and dorsiflexor strength and proprioception employing an Isokinetic Dynamometer, balance, gait speed and falls risk. The analysis was an exploratory trial to determine the effects of "activeTENS." The study provided initial evidence of the possibility of "activeTENS" to benefit physical function following stroke that merits further second phase trials to improve the intervention. All the patients tolerated "activeTENS" and most of the parameters, advanced throughout stimulation with activeTENS; gait speed (p = 0.002), balance (p = 0.009), proprioception of plantar flexion (p = 0.029) and plantar flexor strength (p = 0.008), except dorsiflexion proprioception (p = 0.078) and dorsiflexor strength (p = 0.194). There was no threat to validity or reliability as the only complaint of leg pain after treatment was resolved the following day. Moreover, the concerns that "activeTENS" could have

Sunday, August 25, 2019

Workplace bullying Essay Example | Topics and Well Written Essays - 2250 words - 1

Workplace bullying - Essay Example Subsequently, effects in the wider community can include lower production, early retirements and an increase in the costs of health care services. Globally, nations are implementing laws to promote dignity within the workplace, and to ban a range of forms of workplace harassment (Giga & Hoel, 2004). However, actual research of how best to ascertain the presence and degree of workplace bullying within an organisation remains contentious. This paper will explore the suitability of using survey instruments to understand the organisational context of workplace bullying. First the background of workplace bullying shall be outlined. Second a literature review of survey instruments used shall be presented, with a focus on the Negative Acts Questionnaire (NAQ). Strengths and weaknesses of the survey instrument shall also be identified. The conclusion will resolve the question of survey question suitability, and also provide recommendations for future research. There are various forms of workplace bullying that can be broadly categorized into two main types: 1) work-related and 2) person-related. Work-related bullying is indicated by constant criticism, not being provided with information, and excessive monitoring. Person-related bullying can include being subject to insults, teasing, false allegations, rumors, social exclusion, humiliation and or intimidation (Einarsen & Hoel, 2001; Knott, 2004). Bullying, whether in the workplace or elsewhere, is about power in social relationships, or more specifically, power differences (Hoel & Cooper, 2000). Within the workplace, bullying may also be referred to as mobbing, workplace aggression, petty tyranny or victimization (Aquino, Grover, Bradfield & Allen, 1999). Ultimately, workplace bullying is repetitive, persists over time, and results in a hostile work environment (Hoel & Cooper, 2000).The antecedents to workplace bullying vary across organisations and departments within organisations, howev er, studies point to the values of the organisational culture, the representation of these values in policies, and the roles, and task demands of employees as primary factors (Hoel & Cooper, 2000). The direct consequence of workplace bullying has been shown to be increased stress and negative responses from some employees (Giga & Hoel, 2004). Conceptual issues of how to define and measure workplace bullying in order to understand it are dominant research areas currently (Knott, 2004). Studies show that a failure to address issues of workplace bullying places organisations at risk of increasing costs due to sick leave, compensation and a tarnished public image (Hoel & Cooper, 2000). Literature suggests a focus on the psychosocial aspects of the workplace as potential antecedents and prevention variables (Einarsen, Hoel, Zapf & Cooper, 2003). There is a current emphasis on the use of survey instruments to identify and measure bullying within the workplace adequately account for the or ganisational context. However there is a lack of literature exploring the efficiency

Saturday, August 24, 2019

Annotated Bibliography Essay Example | Topics and Well Written Essays - 1500 words - 10

Annotated Bibliography - Essay Example The information used in the construction of the argument are mainly from western nations. The interactions between the other nations and the western world are not well represented leading to a major flaw. The text looks at the social aspect of the history of the western civilizations. This book has a wide coverage since it looks at the diverse cultures that are existent in the western world. However, it has a major focus being the influence of the European nations especially the Great Britain on the development of the social orientations of the people. This book is sufficient in that it has an integrated approach to the western history. It covers the issue of gender and cultural diversity with a particularly keen intent covering all the periods that marked major changes. The writing approach used in the book is both compelling and fascinations. The details about the daily life are reduced into writing and expounded on leading to the development of a deeper understanding of the events that informed the current pleasures. The books makes enables the student to better identify with the past. The text mentioned above looks into the social history of the western civilizations using the political and cultural lenses. This is a second volume in a series by the same authors that captivates the students’ interest in the history of the major civilizations. This book focuses on the rise of England as a major world force and the aspects that could have contributed to the rise of the greatest empire ever. It also looks at the creation of the United States from the baby steps moment to its rise as the greatest nation. The politics of the rise and fall of great kingdoms is not the only issue that pervades the text. On the contrary, the book has more content on the cultural diversity. The scope of the book content is a major flaw for the book since there is a

DNA Evidence and Procedures Essay Example | Topics and Well Written Essays - 1000 words

DNA Evidence and Procedures - Essay Example Though DNA is used by the body to create the physical characteristics of hair color, eye color, and height, it can only be used to match a suspect to a sample and can not determine their physical characteristics. Advances in DNA technology have revolutionized forensic science since its introduction in the mid 1980s. It is used to bring evidence against a suspect as well as exonerate innocent people. As investigators, law enforcement is generally concerned with a few key issues with respect to DNA evidence These issue involve maintaining the integrity of the evidence and the credibility of its evidentiary value. These are: The crime scene is the first line of defense in maintaining credible DNA evidence. To minimize the possibility of contamination the incidental activity must be reduced at the crime scene. Only critical personnel should have any initial access until all samples are collected. According to the President's DNA Initiative (2007), "It is important for all law enforcement personnel at the crime scene to make a conscious effort to refrain from smoking, eating, drinking, littering or any other actions which could compromise the crime scene". In addition, it is suggested that all first responders be trained in DNA collection and preservation techniques. Investigators must tediously search for small amounts of DNA evidence available at the scene. This may be small blood spatters, hair, skin tissue evidence found under fingernails, and clothing that contains body fluids. Suspects may be swabbed for saliva or DNA may be obtained from an object they have contacted. In the case of rape or sexual assault, the Department of Justice guidelines dictate that, "...evidence that may be inside or on a victim's body should only be collected by a physician or sexual assault nurse examiner" (Understanding DNA evidence, 2007). Initial contact with an assault victim should stress the importance of not changing clothes or showering before evidence can be collected. Evidence needs to be clearly labeled and identified as to where and when it was collected in a manner that will maintain a proper chain of custody. Samples should be kept dry and need be sealed to prevent contamination and stored at room temperature to prevent degradation (President's DNA Initiative, 2007). The National Institute of Justice mandates that evidence that may contain DNA should not be placed in plastic bags as plastic retains moisture which could damage and degrade the DNA sample (What every law enforcement officer should know about DNA, 1999). Direct sunlight and heat can also damage samples and it is recommended that the sample be transported as quickly as reasonable to an appropriate storage area. It is recommended that long-term storage be maintained only by a qualified facility or laboratory. In the 2003 Summit Report, the National Institute of Justice warned, "If law enforcement officers, medical personnel, and crime lab technicians are not trained to recognize, collect, preserve, transport, and store DNA evidence, then its use may be compromised or even invalidated". Maintaining the integrity of the DNA evidence is vital if it is to have any value in the courtroom. Contamination is the greatest threat to the usability of DNA evidence. DNA evidence runs the risk of being contaminated when DNA from

Friday, August 23, 2019

Stand your ground law Research Paper Example | Topics and Well Written Essays - 2500 words

Stand your ground law - Research Paper Example Controversies surrounding the SYG law have off late attracted the nations debate. From 2005, eighteen states have enacted the law extending the self-defense right without retreating to any place an individual has the right to be, and other several additional States are looking forward to passing the same law. With all these implications, of the threat to public safety, less has been done to research on the effect of the law on people’s security. There is some recorded data at the statistical agencies in U.S. to study the prevalence of homicides. The data from these agencies indicate that the increasing number of homicides is attributed to the SYG law (Yu 119). There is no evidence given by any agency as to why there is an increase in homicides in blacks. The statutes referred to as Stand Your Ground (SYG) allows one to use force, even lethal one in self-defense, in an event of reasonable threat with no duty to first retreat. The right to defend individuals home from any intruder with no obligation to retreat is apparently protected by Castle Doctrine. The difference with the new laws is that they exceed the Castle Doctrine to the places like the workplace, vehicle or anywhere else; this limits the duty to retreat (Skiba 21). Since the time Florida passed the law in 2005, other seventeen states have introduced the SYG law with proportions allowing immunity from criminal prosecution when one uses deadly defense force in areas beyond their homes. With significant help from the National Association of Riffles, the users of SYG law say that they cannot support crime on the same. They also say that citizens who abide by the law should be able to protect themselves from attackers or intruders without the worry of being prosecuted. It is al so postulated that the great increase in concerns about public safety came after the 2001 terrorist attacks and Katrina of 2005, which led to

Thursday, August 22, 2019

University Culture Essay Example for Free

University Culture Essay There are universities all over the world with their own unique cultures which include their own customs among other things. Rice University is a great example of a college with its very own unique culture compared to other universities. E. B. Tyler defined culture as â€Å"†¦that complex whole which includes knowledge, belief, arts, morals, law, custom, and any other capabilities and habits acquired by man as a member of society† (Howe â€Å"Culture† lecture 2011). This is only one of many definitions of culture that have been thrown around by numerous individuals throughout the course of history. This definition in particular fits Rice University extremely well. No one of the before mentioned qualities such as knowledge, morals, or customs make Rice University what it culturally is, but it is when all of these aspects are brought together that Rice really becomes what the university is today. When one matriculates at Rice University they all of a sudden become a part of something much larger than they were before. They become part of a grand family. One of the first things that Rice University drilled into my head when I first arrived was the idea of the honor code, which is really a set of laws that govern the student body. In this system the student is granted a great deal of trust from their professors and the university in as a whole. Things such as take home exams are commonplace thanks to the commitment from the students to respect the honor code. Since such a high focus is placed on the honor code it is in fact a major piece of the culture here at Rice. I feel like this practice works at Rice so well because the students at Rice tend to have shown a great deal of commitment to get into such a great school that they are able to be trusted to be more responsible than the average college student. In different cultures across the planet there are an abundant amount of rituals practiced. Things such as holidays and religion are specific to certain cultures. Rice University has a few rituals of its own. The one that comes to mind most often for people is the running of Baker 13. This is a taboo ritual in the sense that it is prohibited to just anyone (Howe â€Å"Rituals† lecture 2011). This practice would actually be illegal outside of Rice actually. A brief overview of what Baker 13 entails is a bunch of naked college students running around campus at night covered in shaving cream. They attempt to attack any other students unlucky enough to get in their path with a naked, shaving cream covered hug. This practice is unique to Rice University and thus is a way to help establish Rice’s own culture. When it comes to Rice’s ethnic culture things are quite different from the average run of the mill culture. While cultures usually have a specific ethnic group that is prevalent, Rice University prides itself by having so many students with such a wide range of ethnic backgrounds. Rice actually draws from a plethora of ethnic groups, in which â€Å"members share certain beliefs, values, customs, and norms because of their common background† (Howe â€Å"Ethnicity† lecture 2011). This ability to draw from so many different cultures and their ethnic groups is a major part of Rice University’s own culture. Much the same as American culture is borrowed culture from other areas in the world, Rice can be seen as being multicultural. Rice is definitely not only composed of many other cultures coming together. Rice’s culture has many other aspects unique to itself such as the before mentioned rituals and life here in general. Rice University even has its own language exclusive to Rice. This can be seen in the different cheers of each of the eleven different residential colleges here on campus. These cheers tend to be somewhat more vulgar than the average language seen outside of Rice University with some even referring to sexual acts with another’s parents. Language here at Rice is not restricted to merely vocalizations. We, much like gangs in the streets, have a few hand gestures and symbols that are commonly used here. One such gesture is when one makes an owl with his or her hands. This is commonly seen at sporting events when students are cheering on for the Rice University owls. This is one way in which all of the students come together in show support for their fellow students. In some ways people might think of Rice University as not really having a unifying culture. This can be attributed to the eleven different residential colleges here on campus. Each college does in fact have its own culture, so Rice University is actually made up of eleven sub-cultures. These sub-cultures actively compete amongst one another in events such as powder-puff, basketball, and other sporting venues. This competition can come across as counterproductive in keeping a university wide culture intact. Many might wonder how a culture that has almost a dozen sub-cultures that compete against each other so often and even have anti-cheers for one another could still be called a culture. Culture is in fact seen as something that unifies groups and individuals so it is understandable when people do not see Rice University as really having a university wide culture. To me this idea of Rice University not having a culture is totally ungrounded. The many sub-cultures of Rice actually add to the overall campus wide community in my opinion. Rice University has the culture it does because of the ability to have so many different sub-cultures coexist with one another and form such a unified student body. This unification is not always noticeable on the surface, but rest assured Rice people love other Rice people. Like I mentioned above, the whole university comes together at college-level sporting events to cheer on the team against other universities. Another example of members of the different residential colleges coming together is during classes. Since attending class plays such a major role when one is at a university they can be great opportunities for cooperation among the eleven residential colleges. Students from all the residential colleges work together in class on group projects and discussing the topics of the class. Like all universities, Rice has numerous clubs and organizations that one can become a part of. The clubs and organizations welcome anyone to join in and become a member. Even cultural clubs that represent specific foreign cultures welcome individuals from any other cultural background to join in their activities. A few weeks ago I attended a production put on by Rice’s own Southeast Asian dance organization. There were an abundant amount of individuals participating in the production that were obviously not of Southeast Asian heritage. To me this proves just how many different cultures can coexist within Rice University’s very own culture. In other words I believe that Rice University has a special and unique culture thanks to the university’s ability to bring so many diverse cultures together. Not many other places or organizations could have such a strong presence in my opinion. In my short time at Rice so far I have already been affected by the culture of this place. I remember when applying to colleges I would think of how it would be when I actually started attending a university. I would think of all the college cliches from movies and friends’ experiences that had already began their collegiate career. I began to form my thoughts of how I thought college would be when I finally got there. After I got to Rice I soon realized that how I thought the culture would be was completely off. Rice is a place where one has to really be a part of and experience its culture for that culture to be really understood and appreciated. Works Cited Howe, Cymene 2011 â€Å"Culture† lecture. Rice University, Introduction to Social/Cultural Anthropology, Fall. Howe, Cymene 2011 â€Å"Rituals† lecture. Rice University, Introduction to Social/Cultural Anthropology, Fall. Howe, Cymene 2011 â€Å"Ethnicity† lecture. Rice University, Introduction to Social/Cultural Anthropology, Fall.

Wednesday, August 21, 2019

Threat Analysis and Risk assessment

Threat Analysis and Risk assessment Case articulation Staysure.co.uk Ltd specialises in insurance and financial services in the UK and Europe. It was formed in 2004 to provide travel insurance and expanded further to provide home, motor, health and life insurance along with some insurance products. In October 2013 Staysure.co.uk faced a security breach wherein over 100,00 live credit card details along with other personal details of the customers were compromised. This security breach affected 7% of the customers who had purchased insurance from Staysure before May 2012. Before May 2012 the firm stored the card numbers of the customers along with the CVV numbers and other personal details like customer name and addresses. The card details were encrypted but the CVV numbers were fed as plain text into the database even though the card security details should not have been stored at all according to the industry rules. The chief executive of the company said that these details were stored in the system to help customers in their renewal process. After May 2012 the company ceased storing these details. The server on which the website server was based had a software vulnerability and even though a software patch was published in 2010 and 2013 the data controller failed to update software both the times due to lack of formal process to review and apply software updates. The failure to update the database software and the security flaws in the IT security system made the company very vulnerable to a cyber-attack. The security flaws in the companys JBoss Application web server were exploited between 14th and 28th October 2013. The attacker used the vulnerability in the application server to inject a malicious JavaScript code called JSPSpy on the firms website. JSPSpy enabled the attackers to remotely view and modify the source code of the website and query the database containing the details of the customers. It also let the attackers open a command shell allowing them to remotely execute privileged operating system commands. The attackers specifically targeted and downloaded the payment card details. Even though the card numbers were encrypted the attackers were able to identify the keys used in the encryption and hence could decrypt the card numbers. At the time of the attack the database contained a total of 110,096 live card details, which were at a risk of being accessed and used in fraudulent transactions. The firm became aware of the attack on 14th November 2013 and immediately hired in dependent forensic data experts and wrote to 93,389 affected customers, to make them aware of the attack. The company also offered the affected customers free access to Data Patrol, which is an identity fraud monitoring service. After the attack Staysure was fined with an amount of  £175,00 by the   ICO since the company did not comply to the Payment Card Industry Data Security Standard (PCI DSS) , which is a standard administered by PCI Security Standards Council (PCI SSC) to increase payment card security and decrease the transaction frauds over the internet. References: http://www.itgovernance.co.uk/blog/staysure-fails-to-comply-with-the-pci-dss-and-is-fined-175000-by-the-ico/ http://www.insurancetimes.co.uk/broker-fined-175000-by-information-watchdog-after-cyber-criminals-raid-customer-records/1411917.article http://securityaffairs.co/wordpress/21002/cyber-crime/staysure-hacked.html https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2015/02/ico-fines-insurance-firm-after-hacked-card-details-used-for-fraud/ http://www.insuranceage.co.uk/insurance-age/news/2396976/staysure-fined-gbp175k-for-it-security-failings http://www.theinquirer.net/inquirer/news/2321017/staysure-travel-insurer-admits-to-credit-card-theft http://trainsure.com/news-posts/insurance-times-reports-another-cyber-attack/ http://www.moneywise.co.uk/news/2014-01-06/staysure-insurance-customer-data-stolen-hackers http://www.computerworlduk.com/it-vendors/travel-insurer-reveals-almost-100000-customer-details-in-cyber-attack-3495625/ Threat Analysis and Risk assessment The purpose of threat analysis and risk assessment is to maximize the protection of the three main pillars of security namely confidentiality, Integrity and Accessibility while still providing usability and functionality. A Risk to any organization or an individual is an interactive relationship of threat, asset and vulnerability. The various levels of risk can be represented as the product of the impact and probability (likelihood). Quantitative Measure Qualitattive Measure Description 5 High A high level risk can occur frequently and can have a drastic effect on the organization. Sever measures will be needed in order to mitigate a high level risk. 4 Medium High A medium high risk can occur/recur with high probability but might not persist. If it occurs the organization can have a significant or sever effect. 3 Medium A medium level risk is likely to occur   under many circumstances and if a medium level attack occurs it can have moderate to severe effects on the organization. 2 Low Medium A low medium risk can be considered when the organization will have a minor or moderate impact as a result of an attack. A low medium risk can occur occasionally or might not occur at all and can be mitigated easily. 1 Low The risk is considered to be low when the likelihood of an attack on an entity is low and the impact of the attack on the entity is negligible or minor. Low risks will never or rarely happen and can be mitigated easily. Table 1: Risk Rating Scale Figure1. Figure 1 shows a risk matrix which represents the various levels of risk. A vulnerability is a weakness in the system that can be exploited by an attacker or can be unintentionally triggered by a person within the organization. The likelihood is the possibility that any vulnerability will be taken advantage of or the vulnerability will be triggered by someone unintentionally. The likelihood is related to attackers intent, attackers ability and attackers target. If a certain vulnerability is exploited the impact on an organization can be expressed in terms like Negligible, Minor, Moderate, Significant, Severe. The table below shows a risk assessment architecture for Staysure.co.uk. The Firm had several security flaws in the system, which the attackers exploited to gain access to customer information. Asset Threat Vulnerability Threat Actor Threat vector Consequences Likeli hood Impact Risk Customer Personal details Can be assessed and manipulated The database had no security procedure in place hence the data was highly accessible. Hackers or a person within the organization (insider). Gaining access to the database by getting access to the webserver or SQL injections. Personal   details of the employees like name, address, phone can be accessed and used or even modified. Possible (3/5) Significant (4/5) Medium High Company website Source code of the website can be modified and malicious code can be injected and made to run on the browser (Cross site scripting). Cross site scripting can be performed on the website if security measures are not taken care of while developing the website. Hackers or an insider. Web pages Malicious code can be injected into the web pages thus allowing access to the web server and the database. Very Likely (5/5) Severe   Ãƒâ€šÃ‚  Ãƒâ€šÃ‚   (5/5) High Data controllers system No intrusion detection system. A system with no proper security measures can be easily penetrated. Hackers or an insider trying to get unauthorized access. Backdoor created in the web server. Getting access to the data controllers system enables the threat actor to execute Privileged operating system commands Very likely (5/5) Severe (5/5) High Financial card details Storing financial data incorrectly. Unencrypted card details stored in the database Hackers or an insider trying to get unauthorized access. Web site source code can be used to query the database Card details can be used to make fraudulent transaction and cloning. Very likely (5/5) Severe (5/5) High Encryption key Encryption algorithms   can be used to calculate the encryption key Simple encryption algorithm used to form an encryption key. Hackers or an insider. Reverse engineering. If the encryption key is compromised all the encrypted data can be decrypted. Possible (3/5) Severe (5/5) Medium High CVV number Storing CVV numbers in the database is a high risk. CVV numbers if not encrypted can be easily read if the attacker gets access to the database. Hackers or an insider. Web site source code can be used to query the database for CVV numbers. CVV numbers can be used to prove authentication while doing online transactions. Very likely (5/5) Severe (5/5) High JBoss Application Server Unpatched and out of date softwares and no intrusion detection system Scripts can be uploaded to the server which when executed gives remote administration access to the server. Hackers or an unauthorised insider. Backdoors created on the server via malicious script. Once administration access is acquired on the server various admin activities can be initiated and the hosted web servers can be accessed. Likely (4/5) Severe (5/5) High Database Database injections and unmanaged data The data in the database can highly vulnerable to SQL injections and can be highly inconsistent. Hackers SQL injections Data can be erased and stolen from the database and used in a fraudulent manner. Likely (4/5) Severe (5/5) High https://www.towergateinsurance.co.uk/liability-insurance/smes-and-cyber-attacks remove later http://resources.infosecinstitute.com/how-to-prevent-cross-site-scripting-attacks/ remove later Security Architecture Figure: 2 Figure 2 shows security architecture for Staysure during the time of the attack Security Recommendations Staysure.co.uk had no security policies in place which can be sited as the base for the cyber-attack. Being an insurance company and holding personal records of millions of customers the company should have had security procedures in place. It is important that the employees of a company are trained and made aware of the importance of information data security. The fact that the attackers took advantage of the software vulnerability in the JBoss application server even though there were patches available to fix the vulnerabilities shows the ignorance of the data controller towards information security. Table 2 lists security recommendations which would have prevented the attack. Security Recommendations Descriptions Security policies Security policies is an integral part of any organization. Staysure being an insurance company and handling millions of customer records should have had strict company security policies which could have prevented the attack. Security training and awareness The employees of Staysure were clearly not aware of the importance of data security and management. The employees should have been provided good data security and data management training and made aware of information security. Payment Card Industry Data Security Standard (PCI DSS) add appendix When an organization handles personal records of customers it is necessary that the organization follows certain industry standards for data storage. According to PCI DSS the CVV numbers should not have been stored in the database. If the standards were followed the attack would not have a major impact. Data storage and data security Data storage has both physical and logical security aspects.   The logical aspect being data authorization, authentication and encryption. The physical aspects include the place in which the servers are placed, it should be safe from heat-waves, power fluctuations and other physical elements. In case of Staysure the payment card details and the CVV numbers should have been encrypted with a strong encryption algorithm from the very beginning and the database server should have had an intrusion detection and prevention system which would have prevented access to the database. Patch management Unpatched systems and softwares pose a big threat to an organization. The most efficient way to shield from attacks is to have patch management procedure to make sure that all the systems and softwares are patched on regular basis. If Staysure had patched the vulnerabilities in the Jboss application server and software, the attackers would not have been able to exploit the vulnerability. DMZ (Demilitarized Zone) The servers that are faced towards the public should be kept in the DMZ, so that they can be separated from the private network. If a malicious party gains access to the server, he will be isolated in the DMZ and will not be able to attack the private network. If Staysure had a DMZ the attackers would not be able to access data on the private network. Encryption Encrypting any valuable information of customers is necessary in order to protect customer data from being accessible and using a strong encryption key is vital to serve the purpose of encryption. The data controller should have had made sure to encrypt the CVV and the card number and should have used a strong encryption key. IDS Staysure should have had Intrusion detection systems   so that the intrusion by the attacker could have been detected and would alert the authorities thus preventing high impact Firewalls Prevention of human errors http://www.ibm.com/support/knowledgecenter/SSTFWG_4.3.1/com.ibm.tivoli.itcm.doc/CMPMmst20.htm patch management policy. High level security diagram to prevent attacks

Tuesday, August 20, 2019

Analysis of G-Protein Coupled Receptor 12

Analysis of G-Protein Coupled Receptor 12 ABSTRACT: G-Protein Coupled Receptor 12 (GPR12) belongs to the orphan GPCR family which is the same of the GPR3 and GPR6. Homology model for the protein GPR12 was generated from the SWISS-MODEL website which showed an all alpha motif with seven transmembrane ÃŽÂ ± -helix interconnected by loops. GPR12 acts through the cyclic Adenosine monophosphate (cAMP) pathway and promotes neurite outgrowth in primary neurons which can be used to slow down the progression of neurodegenerative diseases. The gene of GPR12 is located in the chromosome 13q12.13 for human, 12p11 for rat and 5; 5 G3 for a mouse with the size of 5.6 kbp, 3.4 kbp, and 4.3 kbp. Four current ongoing clinical trials studies on GPR12 was found on clinicaltrials.gov. G-Protein Coupled Receptor 12 (GPR12) belongs to the orphan GPCR family which is the same of the GPR3 and GPR6 (Ignatov et al., 2003a; Ignatov et al., 2003b). GPR 12 family members are constitutively activated and initiate the cAMP signaling cascades (Ignatov et al., 2003a). It is reported that GPR12 promote neurite extension in primary neurons (Ignatov et al., 2003a). The sequence identity of GPR12 is similar to GPCR S1P5 by 34%, GPR3 by 57% and GPR6 by 58% (Ignatov et al., 2003a; Ignatov et al., 2003b). Hence, it is hypothesized that the orphan receptors might share common ligands and also have similar physiological functions (Uhlenbrock et al., 2002; Tanaka et al., 2007). GPR12 has a high binding affinity towards Sphingosylphosphorylcholine (SPC) (Uhlenbrock et al., 2002). GPR 12 also binds with Sphingosine-1-phosphate (S1P)   with low affinity (Uhlenbrock et al., 2002). GPR12 family members are constantly activated and cAMP downstream signaling cascades initiated (Uhlenbro ck et al., 2002; Ignatov et al., 2003a). This persistent activation promotes neurite extension in primary neurons (Tanaka et al., 2007). GPR12 belongs to the orphan GPCR family which is the same of the GPR3 and GPR6 (Ignatov et al., 2003a; Ignatov et al., 2003b). According to Horn et al., GPR12 belongs to the  Ãƒâ€šÃ‚   GPCRs, Class A Rhodopsin-like subfamily with all other Orphan GPCR receptors (Horn et al., 2003). 2.1. Structure: A search was conducted for GPR12 in the RCSB protein data bank to identify the protein structure of G-Protein Coupled Receptor 12. There were no matches found in the search which is shown in figure 1.   Hence, a Homology model for the protein was generated from the SWISS-MODEL website, 27.41% sequence identity was indicated for Cannabinoid receptor 1 (Flavodoxin). Flavodoxin, Cannabinoid receptor one was chosen as the template, and a 3D structural model was generated for GPR12 from the template which is shown in the figures 2a and 2b. The GMQE (Global Model Quality Estimation) and Q-Mean value for the generated protein 0.56 and -4.28. The generated protein showed an all alpha motif with seven transmembrane ÃŽÂ ± -helix interconnected by loops forming four extracellular topological domains and four cytoplasmic topological domains. The alignment of protein sequence between Human GPR12 and GPR12 of other species like mouse and rat showed very less variation which indicates the protein is conserved between these species(UniProtKB; UniProtKB; UniProtKB). The protein alignment is shown in figure 3. 2.2. Pathway: According to Horn et al., GPR12 belongs to the  Ãƒâ€šÃ‚   GPCRs, Class A Rhodopsin-like subfamily with all other Orphan GPCR receptors (Horn et al., 2003). GPR12 acts through the cyclic Adenosine monophosphate (cAMP) pathway (Tanaka et al., 2007). Since, GPR12 is an orphan receptor where its natural ligand is unknown (Ignatov et al., 2003a). When the ligand such as S1P or SPC binds to the GPR12, the G-Protein gets activated due to the binding of GTP (Ignatov et al., 2003a). Thus, G-Protein activates Adenylate cyclase which converts the Adenosine triphosphate (ATP) into cAMP, and the cAMP activates Protein Kinase A (Ignatov et al., 2003a). The Activated Protein Kinase A activates the cellular reaction such as neurite extension in primary neurons (Ignatov et al., 2003a). [Refer figure 4] 2.3. Gene and Evolutionary aspects of GPR12: The alignment of protein sequence between Human GPR12 and GPR12 of other species like mouse and rat showed very less variation which indicates the protein is conserved between these species (UniProtKB; UniProtKB; UniProtKB). The protein alignment is shown in figure 3. The gene location of GPR12 in the chromosomes locus is nearly the same for human and rat, but it is different in mouse (NCBI-Gene; NCBI-Gene; NCBI-Gene). The gene of GPR12 is located in the chromosome 13q12.13 for human, 12p11 for rat and 5; 5 G3 for mouse (NCBI-Gene; NCBI-Gene; NCBI-Gene). The GPR12 gene contains two exons in humans, three exons in rat and three exons in Mouse separating the intron sequence and the evolutionary association of the gene sequence of GPR12 between the species and between GPCR family is shown in figure 5a and 5b (NCBI-Gene; NCBI-Gene; NCBI-Gene). The GPR12 gene size for a human is 5.6 kbp, for rat it is 3.4 kbp, and for the mouse, it is 4.3 kbp (NCBI-Gene; NCBI-Gene; NCBI-Gene; Stevens et a l., 2013). GPR12 mutant mice showed an effect in their emotionality was affected due to the mutation in GPR12 which was no significant change   (Frank et al., 2012). GPR12 overexpressed in neurons upregulate cAMP levels and promotes neurite outgrowth in primary neurons which can be used to slow down the progression of neurodegenerative diseases like Alzheimers disease, Parkinsons   disease, Huntingtons disease, etc. (Tanaka et al., 2007). GPR12 is also involved in the regulation of cell survival and cell proliferation which may vary during the diseased condition which causes astrocytes to proliferate at a faster rate and results in inflammation (Lu et al., 2012). A search was done for G-Protein coupled receptor 12 on clinicaltrails.gov website which showed four current ongoing clinical trials studies on GPR12. The studies were different from each other such as Platelet reactivity (ClinicalTrials.gov), Stoke (ClinicalTrials.gov), Metastatic Lung Adenocarcinomas (ClinicalTrials.gov) and Migraine (ClinicalTrials.gov). GPR12 belongs to the  Ãƒâ€šÃ‚   GPCRs, Class A Rhodopsin-like subfamily with all other Orphan GPCR receptors. The gene coding for GPR12 is conserved between Humans, Rats, and Mouse which indicates the existence of similar roles and function in these three animals. GPR12 is still in the stages of primary research where its structure, signaling pathways, function, and roles are still waiting to be found. GPR12 has recently assumed to be associated with Neural disorders and diseases. Clinical trials have been successfully conducted for GPR12 for many diseases one of which is depression. References: ClinicalTrials.gov Is There a Transient Rebound Effect of Platelet Reactivity Following Cessation of Dual Antiplatelet Therapy With Ticagrelor a Single Center Prospective Observational Trial. Journal, https://clinicaltrials.gov/ct2/show/NCT02808039?term=G-Protein%2BCoupled%2BReceptor%2B12recr=Openrank=1, January 25, 2017. ClinicalTrials.gov Platelet Reactivity in Acute Non-disabling Cerebrovascular Events (PRINCE). Journal, https://clinicaltrials.gov/ct2/show/NCT02506140?term=G-Protein+Coupled+Receptor+12recr=Openrank=2, January 25, 2017. ClinicalTrials.gov Retrospective Analysis of the Expression of the Neurotensin Receptor by Metastatic Lung Adenocarcinomas (NTS). Journal, https://clinicaltrials.gov/ct2/show/NCT02891733?term=G-Protein%2BCoupled%2BReceptor%2B12recr=Openrank=4, January 25, 2017. ClinicalTrials.gov Ticagrelor Therapy for RefrACTORy Migraine Study (TRACTOR). Journal, https://clinicaltrials.gov/ct2/show/NCT02518464?term=G-Protein%2BCoupled%2BReceptor%2B12recr=Openrank=3, January 25, 2017. Frank, E., Wu, Y., Piyaratna, N., Body, W.J., Snikeris, P., South, T., Gerdin, A.K., Bjursell, M., Bohlooly, Y.M., Storlien, L. Huang, X.F. (2012) Metabolic parameters and emotionality are little affected in G-protein coupled receptor 12 (Gpr12) mutant mice. PLoS One, 7, e42395. Horn, F., Bettler, E., Oliveira, L., Campagne, F., Cohen, F.E. Vriend, G. (2003) GPCRDB information system for G protein-coupled receptors. Nucleic acids research, 31, 294-297. Ignatov, A., Lintzel, J., Hermans-Borgmeyer, I., Kreienkamp, H.-J., Joost, P., Thomsen, S., Methner, A. Schaller, H.C. (2003a) Role of the G-protein-coupled receptor GPR12 as high-affinity receptor for sphingosylphosphorylcholine and its expression and function in brain development. Journal of Neuroscience, 23, 907-914. Ignatov, A., Lintzel, J., Kreienkamp, H.-J. Chica Schaller, H. (2003b) Sphingosine-1-phosphate is a high-affinity ligand for the G protein-coupled receptor GPR6 from mouse and induces intracellular Ca2+ release by activating the sphingosine-kinase pathway. Biochemical and Biophysical Research Communications, 311, 329-336. Lu, X., Zhang, N., Meng, B., Dong, S. Hu, Y. (2012) Involvement of GPR12 in the regulation of cell proliferation and survival. Mol Cell Biochem, 366, 101-110. NCBI-Gene Gpr12 G-protein coupled receptor 12 [Mus musculus (house mouse)] Gene NCBI. Journal, https://www.ncbi.nlm.nih.gov/gene/14738, January/25/2017. NCBI-Gene GPR12 G protein-coupled receptor 12 [Homo sapiens (human)] Gene NCBI. Journal, https://www.ncbi.nlm.nih.gov/gene/2835, January/25/2017. NCBI-Gene Gpr12 G protein-coupled receptor 12 [Rattus norvegicus (Norway rat)] Gene NCBI. Journal, https://www.ncbi.nlm.nih.gov/gene/80840, January/25/2017. Stevens, R.C., Cherezov, V., Katritch, V., Abagyan, R., Kuhn, P., Rosen, H. Wuthrich, K. (2013) The GPCR Network: a large-scale collaboration to determine human GPCR structure and function. Nat Rev Drug Discov, 12, 25-34. Tanaka, S., Ishii, K., Kasai, K., Yoon, S.O. Saeki, Y. (2007) Neural expression of G protein-coupled receptors GPR3, GPR6, and GPR12 up-regulates cyclic AMP levels and promotes neurite outgrowth. J Biol Chem, 282, 10506-10515. Uhlenbrock, K., Gassenhuber, H. Kostenis, E. (2002) Sphingosine 1-phosphate is a ligand of the human gpr3, gpr6 and gpr12 family of constitutively active G protein-coupled receptors. Cellular signalling, 14, 941-953. UniProtKB GPR12 G-protein coupled receptor 12 Homo sapiens (Human) GPR12 gene protein. Journal, http://www.uniprot.org/uniprot/P47775, January 25, 2017. UniProtKB Gpr12 G-protein coupled receptor 12 Mus musculus (Mouse) Gpr12 gene protein. Journal, http://www.uniprot.org/uniprot/P35412, January 25, 2017. UniProtKB Gpr12 G-protein coupled receptor 12 Rattus norvegicus (Rat) Gpr12 gene protein. Journal, http://www.uniprot.org/uniprot/P30951, January 25, 2017. Figure 1: No structure was found for the protein GPR12 in RCSB Protein data bank. Figure 2a: Side view of the GPR12 structure which was generated by SWISS-MODEL. The protein is showing an all alpha motif with seven transmembrane ÃŽÂ ± -helix interconnected by loops forming four extracellular topological domains and four cytoplasmic topological domains. Figure 2b: Top view of the GPR12 structure which was generated by SWISS-MODEL. The protein is showing an all alpha motif with seven transmembrane ÃŽÂ ± -helix interconnected by loops forming four extracellular topological domains and four cytoplasmic topological domains. Figure 3: GPR12 protein alignment for the species Human, mouse and rat generated from ClustalW. * (asterisk) indicates positions which have a single, fully conserved residue, : (colon) indicates conservation between groups of strongly similar residue properties, . (period) indicates conservation between groups of weakly similar residue properties. Figure 4: GPR12 proteins complete intracellular signaling pathway Figure 5a: Phylogenetic/evolutionary tree of GPCR family members (Stevens et al., 2013) Figure 5b: Phylogenetic/evolutionary tree of GPR12 showing evolutionary difference between human, rat, and mouse   Ã‚   G-Protein Coupled Receptor (GPR12) Protein Agonist Antagonist Sphingosine-1-phosphate Suramin Sphingosyl-phosphocholine Table 1: GPR12 agonist and antagonist with structure and name