Friday, December 27, 2019

Project Management - 618 Words

What are some of the principal reasons why Project management has become such a popular tool in recent years? Project Management has become a very essential and popular business tool in recent years. Every successful project must have a person in charge to keep the project organized. Project management includes areas in integration management, scope management, time management, cost management, quality management, human resource management, communications management, risk management, and procurement management. Also, The Project Manager deals with standards and regulations of the project, project environment, management skills and interpersonal skills. A project manager must have strong leadership skills. All of these are key ingredients†¦show more content†¦My mother gave me a budget to work with, just enough to start it up. I already had most of the tools need at the house, all I needed was to buy the seed and the dirt. I knew all the inner workings of making a garden, but what I didn’t know was the was kind of seed to buy for the season. I was buying fall vegetables in mid -summer. So when it came time, some months later, to harvest my vegetables, the snow came in and destroyed them. It was horrible. As for the bridge, it turned out better than I could’ve imagined, mainly because I took a year-long Wood Work class a few years before, so I knew what to do with wood. But in this case, it was glue and popsicle sticks. One had the option of building a Truss, Suspension, Camelback, Bow, and so on and so forth. My instructor gave us word that the Suspension bridge is the trickiest to build out of popsicle sticks, knowing me, I went for it anyway. So I bought all my supplies and began working on it. As for the suspension cables, I used guitar strings. It took me the almost the whole first half of the year to build it, but when it was done, it could hold its own. At the end of the semester, the final exam for the bridges, was to see how much weight it could hold and my bridge, and I say this with the least amount of bragging, my bridge held up to 837.5 pds. As for distinguishing them in terms of the process used to create both end results kinda speaks for itself really. The only similarities between them both is the factShow MoreRelatedProject Management : Projects Management902 Words   |  4 PagesProject Management Project Management. What does the words Project Management mean and what are the steps to managing a great project. If we break down the two words Project Management it is defined on dictionary.com as â€Å"The process of planning, organizing, staffing, directing and controlling the production of a system†. As shown in the website Project Insight there are multiple different steps in the project management roll such as project scope, life cycle, objectives, assumptions, constraintsRead MoreProject Management and Project Management It3115 Words   |  13 PagesExamination Paper: Project Management IIBM Institute of Business Management Examination Paper Project Management Section A: Objective Type (30 marks) †¢ †¢ †¢ This section consists of multiple choices questions and short answer type questions. Answer all the questions. Part One questions carry 1 mark each and Part Two questions carry 5 marks each. Part One: Multiple choices: 1. During _________formal tools and techniques were developed to help and manage large complex projects. a. 1950s b. 1980sRead MoreProject Portfolio Management : Project Management1432 Words   |  6 PagesProject Portfolio Management (PPM) is the centralized management of the processes, methods, and technologies used by project managers and project management offices (PMOs) to analyze and collectively manage current or proposed projects based on numerous key characteristics. The objectives of PPM are to determine the optimal resource mix for delivery and to schedule activities to best achieve an organization’s operational and financial goals ― while honoring constraints imposed by customers, strategicRead MoreProject Management, Project Communication, And Project Stakeholder Management797 Words   |  4 Pagesareas of project management that stood out while taking this program. Project integrated management, project communication, and project stakeholder management. A discussion on how they are executed will be presented. As more courses were taken during this project management graduate program, many of the project management concepts became clear and revealed more of the interdependencies and intricate dynamics that are required for successful project management. Stakeholder Management Project StakeholderRead MoreProject Management : Project Integration Management1236 Words   |  5 Pagesâ€Å"Direct and Manage Project Execution is the process for executing the work defined in the project management plan to achieve the project s requirements/objectives defined in the project scope statement† (comp. PMBOK3, p. 78). The Project Manager helps with the execution of the planned activities, sometimes with the assistance of a project management team for larger projects. This occurs during the execution phase of the project. Figure: Phases of a project When we are completing the work assignedRead MoreProject Management Msc. 7Pjmn009W Project Management Project.1391 Words   |  6 Pages Project Management MSc 7PJMN009W Project Management Project Author: Maria Chico Garrido Date: 06 March 2017 Version: 1.1 Project type: Academic Preferred Supervisor: Proposed Title: How does the use of formal project management methodologies in complex Home Automation projects contribute to project success? Main Deliverables/Milestones: Deliverable Date Project Mandate 09 March 2017 Project Brief: In depth literature review of formal project management methodologies and project success. BackgroundRead MoreProject Management1510 Words   |  7 PagesSystem. You are the project manager on a project to construct a flyover in the city to ease traffic congestion. Flyover construction should cause minimum disruption to the traffic until it is complete. Ensuring safety of the commuters and workers at the site is the responsibility of your company. The date of completion of the project is six months from now. This date cannot be extended because of an upcoming international summit in the city. To achieve the overall project time lines, the followingRead MoreProject Management Project And Change Management1940 Words   |  8 Pages Paper on project management in smart voice project Sohail Kamdar Project and change management Table of contents Name of the topic Page No. Abstract†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..3 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦4-5 View point of project management†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦5 Outlook of the project†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦5-6 Milestone inventory†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6-7 WBS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 Plan of project management†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7-9 Cost savings plan†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Read MoreProject Management1713 Words   |  7 PagesProject Management The Project Manager has some tasks that have to be carried out, he/she is responsible for the full project. The Project Manager has to make the best use of all the resources so the project can be completed successfully. The project Manager sets the boundaries for the project, such as schedules and what is done and when it has to be completed. There are various tasks the project manager is responsible for such as: 1) Time and resource allocation and management 2) Setting upRead MoreProject Management1015 Words   |  5 Pagesor renewed interest in the field of project management? IT is growing at a rapid rate and with that growth demands people to manage this growth. People I think are more trained to be project managers and also there is new software that helps tremendously with the management part of the tasks. So demand is up, skilled workers are up, and the cost benefit is there for this renewed interest. 2. What is a project, and what are its main attributes? How is a project different from what most people do

Thursday, December 19, 2019

Compensation Mid Term - 2094 Words

Name: Yunjia Zhang Syms School of Business Tax 6145 Deferred Compensation and Employee Benefits Fall 2014 Midterm Fill-in 2 pts each 1. The qualification requirements are intended to prevent discrimination in favor of highly compensated employees, 2. The age and service requirements require that an eligible employee participates in the plan no later than the attainment of age____21______ and_____2 year(s) of service. 3. A contribution to a qualified retirement plan (â€Å"QRP†) is income tax deductible if it is made no later than __due of tax return(April 15th) OR 60 extension days___________. 4. Under the dual entry method of plan participation, a QRP’s entry dates are usually the first day of the first plan year†¦show more content†¦With a profit-sharing plan, total contributions cannot exceed the lesser of $50,000 or just 25 percent of your salary. b. List 4 distinctions between a defined benefit plan and a defined contribution plan. A defined benefit plan identifies 1. the specific benefit that will be payable to you at retirement. 2. Your basic retirement benefit is usually based on a formula that takes into account factors like the number of years a participant works for the employer (years of service) and the participants salary. 3.Your retirement benefit is generally provided in the form of regular payments over your lifetime beginning at what the plan calls normal retirement age, which is typically age 65. 4. employer has higher expense and long-term obligations associated with running a defined benefit plan. A defined contribution plan 1.specifies how much money will go into a retirement plan today. 2.The amount typically is either a percentage of an employees salary or a specific dollar amount. 3. Then, those funds often are invested in mutual funds available inside the retirement plan. 4.The amount you have at retirement depends on how much your employer contributes to the plan, how much you as the employee save in the plan, how long you leave those funds invested, and how well your investments perform inside the plan. c. List 3 distinctions between a qualified plan and a non-qualified plan. A qualified plan compares toShow MoreRelatedTotal Compensation Strategy1105 Words   |  5 PagesTotal Compensation Strategy Total Compensation Strategy Managing Diversity Nationally and internationally, companies are facing the task of reassessing the balance between their own identity and the force of integration. Centralism often makes access to new markets and regions difficult. Distinctive local autonomies, on the other hand, endanger the overall organization and identity of the company. Connected with this is the question of whether a unified and global compensation policy shouldRead MoreThe Consequences Of The Treaty Of Versailles1015 Words   |  5 PagesIn 1919, the Allied victors in World War I met at the Paris Peace Conference to set the peace terms for the defeated Central Powers. The Allies created the peace terms in the hope to create and maintain world peace. However, the Allies and Central Powers realized that the peace terms stated in the Treaty of Versailles did not help to maintain world peace. When the Allies created the Treaty they designed it in a bad way. Rather than specific, the Treaty didn’t make much sense because it was wordyRead MoreCompensation And Benefits Strategies Recommendations Essay1360 Words   |  6 Pagesï » ¿ Benefits and Compensation Strategies Recommendations TEAM B: Ben F. Soares, Thomas Manning, Zoua Yang, Ziad Shamma HRM 531 David John Stocker Benefits and Compensation Strategies Recommendations Introduction: Market Evaluation: When constructing a benefits and compensation strategy, it is important to understand what companies in comparable markets are providing to their employees. For our company, Clayton Commercial Construction, who wants to open up operations in Arizona, it means lookingRead MoreContemporary Issues Of Finance And Its Impact On The Growth Of Executive Compensation1524 Words   |  7 Pagesdescribe the role of stock options in the growth of executive compensation over last 20 years. The growth of executive compensation has been a topic of much dispute over the recent years (Bebchuk and Grinstein, 2005) due to the excess in which is paid out to executives in businesses that perform well or even poorly. There has been an undisputed rise in the level of chief executive compensation (Murphy, 1998). Since 1990 compensation levels to CEO’S and the top 5 executives has climbed considerablyRead MoreThe Impact Of Refresher Training On Job Knowledge And Attitude878 Words   |  4 Pagesensure training priorities have been met is to complete an evaluation. Evaluation Process El Vee’s evaluation process incorporates both short-term and long-term feedback. One of the short-term mechanisms is a â€Å"pre- and post-test† (Rajeev, Madan, Jayarajan, 2009) and interviews of the supervisors will occur thirty days after completion of the training. Long-term evaluations will include a review of performance appraisals, interview employees who attended training, and review customer satisfaction surveysRead MoreStrategy for Home Depot1316 Words   |  6 Pagesimprovement and construction products and services. †¢ Head Quarter : Atlanta, US Stores †¢ US: Including all 50 US states †¢ Canada: All 10 provinces †¢ Mexico, China, South America and UK Market Position †¢ Largest home improvement retailer in US in terms of overall revenue based on strong customer service ethos Culture â€Å"Everybody here feels that it is their company† - Home Depot director, Don Keough â€Å"Directors were required to meet with customers offer insights†¦Ã¢â‚¬  - Business Week 4 NardelliRead MoreCompensation and Benefit System Proposal Essay example1090 Words   |  5 Pagesresource department has came up with a new compensation plan. In the propose compensation and benefits system plan , I will explain a new compensation plan for Holland Enterprises, also I will explain the components of the compensation and benefit system plan in order to attract and motivate employees to be productive . In order for the compensation and benefits system plan to be operational, the package should include a necessary level of compensations to fulfill basic needs, equity with the externalRead MoreThe Associate Director-Customer Service Position Essay1292 Words   |  6 Pageseffectively to individuals or groups with little time for preparation. 12. Innovative – supporting culture and vision 13. Bachelor’s degree preferred Compensation and Benefits The following will indicate the total rewards package for this position: Compensation 1. Direct compensation market range is 109,000 – 130,000 The Compensation Program rewards efforts as the employee shows growth offering competitive salaries, incentives based on individual and company performance, including commissionsRead MoreHuman Resource Management : An Organization Essay1429 Words   |  6 Pagesplans for training and development of human resource in an organization. The main functions of Human Resource Management in an organization are given below: 1. Recruitment 2. Training and Development 3. Professional Development 4. Benefits and Compensation 5. Ensuring Legal Compliance Role and importance of human resources Human Resources (HR) is concerned with the issues of managing people in the organisation. The Human Resources department is responsible for many people related issues in an organisationRead MoreBanking and Finance Law1018 Words   |  5 PagesMID TERM ASSIGNMENT BANKING FINANCE LAW Name: Tran Cong Hieu Student ID: 15402543 Word count: 986 ISSUES Can Fantastic Landscapes Pty. Ltd. have the right to sue Red Bank to claim $50,000 which Minnie has stolen? Can Fantastic Landscapes Pty. Ltd. sue Red Bank for compensation for the $10,000 penalty fee? Can Fantastic Landscapes Pty. Ltd. seek compensation from BLB? RULES Firstly, who is the customer? Secondly, content of the contact at (2.65) states that: the contact between

Wednesday, December 11, 2019

Classification analysis Essay Example For Students

Classification analysis Essay Classification AnalysisA computer is no longer something new and magical to many people nowadays, because many families now have at least one computer in their homes. It is without doubt that there are thousands and millions of computer users in the country, but is it ever possible for all of them to explain how a computer works? No. All right, can they even classify the components of a computer appropriately? Not quite. They may know how to describe the physical appearance of a computer and they will probably include two or three other terms as well, such as monitor, keyboard or a mouse. Nonetheless, classification of a computer should not be done this way. In fact, a computer can be broken down into three distinct categories, namely output, input and CPU. The term output consists of all components that display words and graphics so that a person can see them. Many people can easily understand why the monitor is a form of output device since it is the screen that tells them what the computer is actually doing. Simply put, without a monitor, the computer itself is basically useless. Another form of output, which is rarely noticed by many computer users however, is the printer. Many people have probably used a printer before, but it is just that they never realize it is also a form of output. As opposed to output, input consists of components that take in information from the users themselves so that the computer will know the tasks it is supposed to perform and accomplish. The keyboard is classified as a form of input because this is where the users enter commands and text. There are many other forms of input as well. Nonetheless, many people just dont realize them, or are too lazy to classify them. For instance, the mouse belongs to input, since it provides a floating pointer on the screen so that the users can access commands faster and easier. The scanner is another form of input, because it acts like a photocopier, except it scans the image and makes it onto the computer screen instead of onto a piece of paper. The CPU, Central Processing Unit is probably the most important category of the three. As the name implies, it is the soul of a computer, very much alike the human brain. For unknown reasons though, people often call the CPU a computer. This is absolutely incorrect. The word computer is merely a general term, which must always include all the three categories in order to operate. Perhaps the constituents of a CPU itself should be mentioned. Simply stated, this central unit must have memory blocks to store data temporarily; disk drives to store data permanently; and last but not least, the main processor chip which performs all the jobs and mathematical calculations, as well as determines the speed of a CPU. These are the three categories that the readers must know should they need to classify a computer again in the future. Also, it can be seen that a computer is not as simple as many people think it is, for it consists of many internal components, which are often neglected and ignored. It should also be emphasized that the components listed in this essay are not the only ones available, since developers and manufacturers will continue to bombard the market with newer and more sophisticated gadgets everyday. Computer is no longer something new and magical to many people nowadays, because many families now have at least one computer in their homes. It is without doubt that there are thousands and millions of computer users in the country, but is it ever possible for all of them to explain how a computer works? No. .u7238301afeb179a95cbf20b030c6aac6 , .u7238301afeb179a95cbf20b030c6aac6 .postImageUrl , .u7238301afeb179a95cbf20b030c6aac6 .centered-text-area { min-height: 80px; position: relative; } .u7238301afeb179a95cbf20b030c6aac6 , .u7238301afeb179a95cbf20b030c6aac6:hover , .u7238301afeb179a95cbf20b030c6aac6:visited , .u7238301afeb179a95cbf20b030c6aac6:active { border:0!important; } .u7238301afeb179a95cbf20b030c6aac6 .clearfix:after { content: ""; display: table; clear: both; } .u7238301afeb179a95cbf20b030c6aac6 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u7238301afeb179a95cbf20b030c6aac6:active , .u7238301afeb179a95cbf20b030c6aac6:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u7238301afeb179a95cbf20b030c6aac6 .centered-text-area { width: 100%; position: relative ; } .u7238301afeb179a95cbf20b030c6aac6 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u7238301afeb179a95cbf20b030c6aac6 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u7238301afeb179a95cbf20b030c6aac6 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u7238301afeb179a95cbf20b030c6aac6:hover .ctaButton { background-color: #34495E!important; } .u7238301afeb179a95cbf20b030c6aac6 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u7238301afeb179a95cbf20b030c6aac6 .u7238301afeb179a95cbf20b030c6aac6-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u7238301afeb179a95cbf20b030c6aac6:after { content: ""; display: block; clear: both; } READ: Objections to the first formulation of Kant's Cate Essay All right, can they even classify the components of a computer appropriately? Not quite. They may know how to describe the physical appearance of a computer and they will probably include two or three other terms as well, such as monitor, keyboard or a mouse. Nonetheless, classification of a computer should not be done this way. In fact, a computer can be broken down into three distinct categories, namely output, input and CPU. The term output consists of all components that display words and graphics so that a person can see them. Many people can easily understand why the monitor is a form of output device since it is the screen that tells them what the computer is actually doing. Simply put, without a monitor, the computer itself is basically useless. Another form of output, which is rarely noticed by many computer users however, is the printer. Many people have probably used a printer before, but it is just that they never realize it is also a form of output. As opposed to output, input consists of components that take in information from the users themselves so that the computer will know the tasks it is supposed to perform and accomplish. The keyboard is classified as a form of input because this is where the users enter commands and text. There are many other forms of input as well. Nonetheless, many people just dont realize them, or are too lazy to classify them. For instance, the mouse belongs to input, since it provides a floating pointer on the screen so that the users can access commands faster and easier. The scanner is another form of input, because it acts like a photocopier, except it scans the image and makes it onto the computer screen instead of onto a piece of paper. The CPU, Central Processing Unit is probably the most important category of the three. As the name implies, it is the soul of a computer, very much alike the human brain. For unknown reasons though, people often call the CPU a computer. This is absolutely incorrect. The word computer is merely a general term, which must always include all the three categories in order to operate. Perhaps the constituents of a CPU itself should be mentioned. Simply stated, this central unit must have memory blocks to store data temporarily; disk drives to store data permanently; and last but not least, the main processor chip which performs all the jobs and mathematical calculations, as well as determines the speed of a CPU. These are the three categories that the readers must know should they need to classify a computer again in the future. Also, it can be seen that a computer is not as simple as many people think it is, for it consists of many internal components, which are often neglected and ignored. It should also be emphasized that the components listed in this essay are not the only ones available, since developers and manufacturers will continue to bombard the market with newer and more sophisticated gadgets everyday.

Tuesday, December 3, 2019

Syphilis Essay Example For Students

Syphilis Essay Syphilis is a sexually transmitted disease caused by the spiral bacteria called Treponema pallidum. Syphilis consists of three main stages, primary stage, secondary stage, and latent stage. The latent stage may lead to a final stage called the tertiary stage. There are many cures to syphilis, and it is virtually eliminated from todays society. There are a few ways to contract the disease, all of which can be prevented. The primary stage of syphilis is characterized by a small lesion, called a chancre, which resembles a pimple, blister or open sore. This occurs anytime between nine days and three months after infection. Fluid from the chancre is extremely infectious, but usually painless. Normally it appears on the genitals or near where the bacteria entered the body. It often hides and many people never realize that it is there. On women, the sore can be found hidden in the vagina or the folds of the labia. On men, it usually hides in the folds of the foreskin, under the scrotum, or near the base of the penis. Men more often than women will also have swollen lymph nodes in the groin. At this stage, the chancre is very infectious. It will heal with or without treatment, but the bacteria will remain and begin to spread if untreated. We will write a custom essay on Syphilis specifically for you for only $16.38 $13.9/page Order now In the secondary stage, occurring about six weeks later, a generalized rash appears. It can last for weeks or months, perhaps up to a year. Painless ulcers develop in the mouth. Most people discover raised areas around the genitals or anus. The bacteria can be easily spread through mucous patches on the raised areas, which are called condylomalata. Flu-like symptoms start to occur, and can come and go for years. These symptoms may include a rash (over entire body or just on palms of hands and soles of feet), a sore in the mouth, swollen and painful joints, aching bones, and a mild fever or headache. These symptoms usually disappear in 3 to 12 weeks. Some people even experience hair loss during the secondary stage of syphilis. The disease then enters a latent stage in which no outward signs or symptoms occur, however, the bacteria are active inside your body, multiplying and attacking internal organs. The latent stage can last from 20 to 30 years. When second stage symptoms completely disappear, the disease is no longer infectious. At this point, the rule of thirds comes into play. Among the total number of latent syphilis cases, one-third will go away on their own, one-third will stabilize, and one-third of the cases will evolve to the next and last stage. When the final stage, tertiary syphilis, does occur, it could be fatal. It may produce hard nodules, called gummas, in the tissues under the skin, the mucous membranes, and the internal organs. The bones are also affected, as well as the liver, kidney, and other visceral organs. Infection of the heart and major blood vessels accounts for most of the syphilis related deaths. A special kind of syphilis, which occurs in nearly 15 percent of the tertiary cases, is called neurosyphilis. It causes lack of muscular coordination, loss of urinary control, and degeneration of the reflexes. It also may cause pregnancy problems, including miscarriage, stillbirth, or to the birth of a child with congenital syphilis. Infected children often have typical signs, such as high forehead, saddlenose, and peg-shaped teeth. Syphilis can be diagnosed and treated with relative ease. Because of this, the past twenty-five years or so have seen a marked decline in the number of tertiary stage cases of syphilis and of deaths due to the disease. Syphilis is mostly treated by an injection of penicillin, or by a two-week regimen of tetracycline. Two follow-up blood tests two weeks apart from the initial test and two weeks apart from each other are needed to ensure the treatment was effective. The first three stages of syphilis are completely curable, and even in the last stage syphilis can be stopped. With the present medical technology to diagnose and treat syphilis, there is no excuse for anyone in the U.S. to suffer the last stage of syphilis. .u80dd74dcfe8dae4d5e908a258f4f1577 , .u80dd74dcfe8dae4d5e908a258f4f1577 .postImageUrl , .u80dd74dcfe8dae4d5e908a258f4f1577 .centered-text-area { min-height: 80px; position: relative; } .u80dd74dcfe8dae4d5e908a258f4f1577 , .u80dd74dcfe8dae4d5e908a258f4f1577:hover , .u80dd74dcfe8dae4d5e908a258f4f1577:visited , .u80dd74dcfe8dae4d5e908a258f4f1577:active { border:0!important; } .u80dd74dcfe8dae4d5e908a258f4f1577 .clearfix:after { content: ""; display: table; clear: both; } .u80dd74dcfe8dae4d5e908a258f4f1577 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u80dd74dcfe8dae4d5e908a258f4f1577:active , .u80dd74dcfe8dae4d5e908a258f4f1577:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u80dd74dcfe8dae4d5e908a258f4f1577 .centered-text-area { width: 100%; position: relative ; } .u80dd74dcfe8dae4d5e908a258f4f1577 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u80dd74dcfe8dae4d5e908a258f4f1577 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u80dd74dcfe8dae4d5e908a258f4f1577 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u80dd74dcfe8dae4d5e908a258f4f1577:hover .ctaButton { background-color: #34495E!important; } .u80dd74dcfe8dae4d5e908a258f4f1577 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u80dd74dcfe8dae4d5e908a258f4f1577 .u80dd74dcfe8dae4d5e908a258f4f1577-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u80dd74dcfe8dae4d5e908a258f4f1577:after { content: ""; display: block; clear: both; } READ: Effects Of Media EssayAlternatives to penicillin are necessary because many people are allergic to penicillin and in some people it is not effective in treating syphilis. Early detection of syphilis disables the disease completely. In pregnant women, early detection of the infection can reduce the chances of the fetus becoming infected. Syphilis is sexually a transmitted disease, and is usually transmitted by sexual contact or kissing. The way it infects is from the secretions emitted from the sores, and the bacterium gets into small tears or cuts on the genitalia. Unlike AIDS, infection from contaminated objects is rare, because drying quickly kills the organisms. You cannot obtain syphilis from casual hugging, or from toilet seats in dirty bathrooms. The way you can prevent contraction of syphilis is to use a condom, or sustain from sexual activity all together. If you do see any early signs of syphilis, contact a doctor right away, and it can almost certainly be cured in the primary and early secondary stages. Category: Health Beauty

Wednesday, November 27, 2019

Vocation and Religion free essay sample

A discussion on the way in which Samuel Butler satirizes the idea that ones vocation must be religious or theological in the nature of its calling with reference to his book, The Way of All Flesh. The following paper examines the way in which Butler suggests religion can prove an obstacle to finding an individuals true purpose in life in his book , The Way of All Flesh.References are made to Robert Brownings poem Fra Lippo Lippi. and Tennysons Locksley Hall, in which both the central characters have vocations that are not religiously sanctioned vocations. Before the full flowering of the Victorian Era in British society, the nature of what constituted an individuals vocation was primarily understood primarily in theological terms. Even today, the Merriam Websters Collegiate Dictionary defines the word vocation as a summons or a strong inclination to a particular state or course of action but especially as a divine call to the religious life. We will write a custom essay sample on Vocation and Religion or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page However, the increasing interest in science, history, and secular identity caused Victorian society as a whole to undergo a profound destabilization. Both the religious and social moral structures that had prioritized religion as a means for providing an individual with his or her ideal occupation were called into question. Rather than viewing those called to the clergy as the only recipients of a unique gift or vocation, the idea that religion was the only calling an individual could experience is called into question in a number of Victorian narratives of self-understanding.

Sunday, November 24, 2019

Exceptional Education Referral To Placement Essays - Free Essays

Exceptional Education Referral To Placement Essays - Free Essays Exceptional Education Referral To Placement Abstract This paper will reflect upon the school-wide dilemma of students, families and schools involved in the referral and placement process of students with special needs such as specific learning disabilities and beyond. This is a genuine problem in our Florida school system as each year is seems to take longer for a student who has been referred by an educator to be placed into a situation which best meets their academic and/or emotional needs. This paper will concentrate on stories derived from primary stakeholders dealing with this situation. The stakeholders for this particular story are; Diana, a 3rd grade student in need, and her family, her teacher, the school psychologist, and the school exceptional student education teacher. Each stakeholder will present their version of the problem as a personal situation. Exceptional Education-Referral to Placement Time: A School-Wide Dilemma My story begins by telling you that I am a 3rd grade teacher and have taught elementary school for close to four years. In that time, I have been able to teach many youngsters and also see that there are some learners whose needs exceed what I have been able to give them in a regular classroom setting. When I used to teach fifth grade, most students with academic concerns had already been identified and place, part time, in an SLD (Specific Learning Disability) setting as needed. However, some students had still managed to travel through six years of public school barely scraping by. Now teaching third grade, I have two students in particular I am highly concerned about. One of which has been on the refer for testing list since second grade and has still not been able to be placed in an educational setting which will focus on her needs. The second little girl is mostly likely a result of her mother taking drugs while she was in the womb. This child's development seems to be slowing as the rest of the students around her progress. For this paper, I am going to focus on the plight of the first child for my example. From my observations as the teacher of the little girl I will refer to as Diana, it is extremely evident a regular classroom setting is not meeting the needs of this child. STAKEHOLDERS There are many people in this little girl's life who hold a stake in her successes. I, as her teacher, am certainly one, as well as herself, her parents and family, our school varied exceptionalities teacher, the county/school psychologist and the school principal. This list could also continue to her future teachers and beyond, but I will be discussing the stories of the main stakeholders I have previously listed. Teacher's Story Diana, at nine years old, has already been detained once in her schooling career. This child is able to identify letters, but digraphs such as Sh, or Ch are not comprehensible to her. Now in third grade, it is clear me that Diana is not learning at the same rate as her fellow classmates. I felt from within the first week that she was in my class that this child was well below grade level. I see her frequently off task, dawdling if you will by shuffling papers, organizing her desk and book bag, practically anything to avoid showing her classmates that she does not understand the work that is going on in the classroom. As Diana's teacher, I am troubled that in my regular classroom, I cannot give her the full attention and services that would meet her individual needs. I did the by the book way that a teacher is supposed to do to find out the history of this child. This meant checking the cumulative folder of past school history and I also spoke with her previous teachers and inquired with the guidance counselor as to whether or not she was on a testing list. I was informed that Diana had been referred by her second grade teacher, but it would be helpful if I continued with documentation of school work and followed up. I have done this and I have also discussed Diana's situation at quarterly profile meetings about students where the principal, teacher and curriculum resource teacher are all present. Unfortunately, because Diana

Thursday, November 21, 2019

Ethical situation in business Essay Example | Topics and Well Written Essays - 1250 words

Ethical situation in business - Essay Example panies need to emphasize on ethics in order to satisfy their employee pool and use existing human resource pool in to fillip growth (Trevino & Nelson, 2010, p. 194). Code of ethics helps the company to build sustainable image in front of their stakeholders. Unethical business practice creates negative image in front of shareholders and government of the country. In the extreme case of unethical behaviors like fraud, bankruptcy, misrepresentation of company asset or any kind of forgery government takes legal action against the company. Legal action against the company not only hurts market reputation of the company but negatively affects shareholder’s interest. In the given situation companies of USA has designed ethical assistance lines for employees to report ethical concern or ask question about companies business pattern in order to create a transparent ethical environment in the organization. The following diagram will show propensity of employee to report unethical business practice of the company (Ferrell, Fraedrich, & Ferrell, 2009, p. 222). The company will only accept projects for which they have the requisite knowledge, expertise and experience to accomplish task successfully. The company will engage only those employees who have the requisite expertise and knowledge to complete the project in accordance to demand of clients. Employees of the company will take care of the confidential client information and must not disclose any of the information in public without taking formal permission from clients. Disclosing client information to their competitor’s is strictly prohibited and employees practicing such unethical transaction will be under legal jurisdiction of Federal Government. Employees and the company will not accept any kind of bribe, remuneration, commission or any kind of fringe benefit from third party connected to clients without taking prior permission from clients. The company will disclose such kind of monetary offer from third

Wednesday, November 20, 2019

Financial Information for CRODA International Plc Essay

Financial Information for CRODA International Plc - Essay Example Industrial specialties- which includes base chemicals, home care, polymers and coatings, additives for polymers, lubricant additives, lubricants and processed vegetable oils. (www. investing.businessweek.com). Consumer care division which includes international business in health care, personal care, and crop care – engaged in all markets throughout the world with a thumbing need for sustainable ingredients and innovations. Further, Croda has an enterprise technology division (R&D) which recognizes and assimilates new technology into Croda’s international business set up. (www.croda.com). Croda was able to post pre-tax profits of 10.5% during the year 2008 in spite of the serious international economic recession. However, due to stable focus on new markets, product innovation and recession mingled with the instant reduction in cost have facilitated Croda to accomplish one more year of pre-tax revenue growth in spite of the worst scenario in the international economy. (Chairman speech, AR 2009). The salient feature of the business model of Croda is the capacity to offer a variety of products to a variety of customers all over the globe. Croda’s persistent focus on originality in specialties has offered them the capacity to derive the true value for their products. (CEO Speech AR 2009). Croda is in a true sense a really global company as it is having only just 7% sales in the homeland of U.K. All of its subsidiary company around the world has targeted sales, operating margin, profit growth targets that form fundamental to their strategic plans and budgets. Croda’s report their progress annually against five major financial performance parameters. According to Croda’s annual report 2009, Croda International Plc has prepared its financial reports as demanded by the Companies Act, 2006 of U.K and as provided by the U.K accounting.

Sunday, November 17, 2019

A Reflective Account of a Teaching Session about Changing a Stoma Essay

A Reflective Account of a Teaching Session about Changing a Stoma - Essay Example It is thus important that on my part, I analyse my approach in teaching to determine its effectiveness, strengths, weaknesses and what I should do to make it better. The best approach to examine my approach to teaching is definitely through the use of Gibb’s reflective cycle as it will enable me to reflect a great deal in using one situation and analyse everything that occurred in it, relating my actions to each result that occurred. Through Gibb’s Reflective Cycle, I will analyse a case in which I taught a patient how to change a stoma. I will first describe the context of the teaching- how I acted and how the patient reacted. According to Jasper (2003) this should be followed by analysing ones feelings in the situation and emotions at the event. One then follows this up with an evaluation of the experience, determining which aspects turned out to be positive and which ones were not, and what failed to go according to plan. After this one needs to critically analyse th e occurrence, establishing a conclusion on the entire experience and ultimately come up with an action plan to follow in case of a similar experience in the future. By the time I am through with this, the teaching experience will be analysed in entirety and the next patient I teach how to change a stoma will have a better experience. The context of the teaching This is the first step of Gibb’s Reflective cycle, where I will analyse what actually happened as I taught the patient how to change the stoma. To begin with, the patient had undergone a surgery to due to a severe case of diverticulitis and was just about to be discharged. I visited her ward as was required of me and undertook to explain to her how from that moment henceforth she would be changing the stoma. The patient was clearly in anxious emotional state due to the surgery she had just undergone, although it had been very successful. As Winston et al (1987) so ably puts it, the pre-operative and post-operative emot ional states of surgery patients is characterised by anxiety, misgivings, depression and irritability. Spielberger (1973) had earlier on suggested that patients usually develop anxiety to surgery as an emotional reaction towards situations that physically threatening, while Furst (1978) demonstrated that patients under surgery usually reported fear, apprehension, worry and uncertainty. All this serve to explain the emotional status of my patient as at the time I was teaching her. I realise that even before I had started, she was in a state that would make it difficult to absorb what I was saying. I first explained briefly to the patient the procedure she had just gone through- the surgery, and a little about diverticulitis and stomas since I assumed she already had been informed. I told her that diverticulitis was a condition arising from inflamed pouches on her large intestines known as diverticula, and also informed her that it was not a rare condition since about 10% of Americans above the age of 40 have diverticula and of these, ten out of twenty five develop diverticulitis (Borgadus, 2006). On the stoma, I told her that it was a surgical bypass of her colon system which had been affected by the diverticulitis and now failed to function properly. I informed her that the colostomy meant that she had to have a bag for receiving fecal matter a single time (Stoma and Stomata, 2009). I could see that she was embarrassed by her condition and the life that she would lead from that henceforth. I then took the patient through the steps of changing a stoma. I used knowledge of the Honey and Mumford teaching and learning style to determine which kind of learner she was. The Honey and Mumford teaching and learning style identifies four distinct preferences of learning styles,

Friday, November 15, 2019

Impact of the Land Registration Act 2002

Impact of the Land Registration Act 2002 A registration scheme far more comprehensive than land charges is found today in the Land Registration Act 2002. The principle significance of this is that the register tells the purchaser who owns the legal estate. The system moreover is not limited to legal estates. Subject to some exceptions (overriding interest), all legal and equitable interest must be entered on the register if they are to bind a purchaser.[1] The first thing to ascertain when dealing with any piece of land is which system of conveyancing is to be applied. And it is clear in the scenario that the land is registered.[2]The purchaser will want to know whether any third parties have rights to the land which might interfere with the intended use of it. Concern about these matters will lead the purchaser to make extensive enquiries before the purchase of the estate is finally concluded.[3] A. Legal leases not exceeding seven years constitute overriding interest and this falls under schedule 3, Para 1 of LRA 2002. Short legal leases are specifically excluded by Para 1 from the category of short leases which override registered disposition. That includes leases which are to take effect in possession more than three months after the date of grant.[4] Polly comes to the cottage after Alisha brought it but Polly was given the lease the previous year. And since Alisha didn’t find any belongings in the cottage before buying we can assume that Polly returned after a year to take possession. In that case Sec.4 (1) (d) applies which makes the lease not an overriding interest. Because such leases mean that there is a real risk that the purchaser might buy the estate without discovering that it is subjected to a lease when the tenant is not necessarily in possession of the land. In such scenarios we can conclude that only the facts matters. And if Polly wants her legal lease to be protected knowing that she won’t be in possession of the cottage for some time she should have made a notice[5] in the register about her lease. But certain interests cannot be protected by notice[6] , one such case is when the lease doesn’t exceed more than three years, interest under a trust of land or restrictive covenants. Since Polly’s lease is for four years it can be entered into the charges register. The fact that an interest is the subject of a notice doesn’t mean that the interest is valid. However, if the interest is valid, the notice ensures both that it binds any purchaser for valuable consideration[7] , and he knows about it before he takes the estate.[8] It is therefore much safer to protect such interests by notice. Once such an entry has been made the interest losses its overriding status[9] , but of course binds a disponee for valuable consideration. B. It is essential to remember that, it is the rights of the occupiers that bind purchasers and not the occupation itself. The claimant must always prove two elements: actual occupation and an interest in land. In National Provincial Bank v Ainsworth[10] it was held that deserted wife’s equity to be a mere personal right against her husband; her occupation made no difference.[11] Judges have regularly emphasized that the question of whether a party is in actual occupation is essentially a question of fact. Lord Wilberforce stated that[12], ‘It is the fact that matters and what is required is physical presence on the land and not some entitlement in law’ this was stated in Abbey National v Cann. In LRA 2002 Schedule 3 , Para 2 if occupation is established but the interest claimed was not known to the purchaser , the question will then be whether the occupation was obvious on reasonable inspection of the land.[13] Wilma daily comes home even for a short while and it is very much unclear whether Alisha didn’t notice that. And the wedding photograph is good evidence to the fact that Wilma may have a share in the land. A thorough search should have taken place in such risky matters which Alisha didn’t. The question is Wilma not being present permanently in the cottage because she was looking after her sick mother which was clearly defined by the case of Chhokar v Chhokar[14]in relation to LRA 1925 were a similar situation has being dealt with. The court of appeal said that it had no difficulty in holding that she was in occupation at the date, and went on to describe her right in the property as an overriding interest. The effect of temporary absence is now being considered by the courts in Link Lending Ltd v Bustard.[15] Occupation of Wilma was obvious enough through the inspection even if Alisha didn’t know about it. This means that provided the occupation is discoverable, the disponee may still be bound by an interest of which she doesn’t know ( Malory Enterprises Ltd v Cheshire [2002] )[16]Nevertheless in Kingsnorth Finance Co Ltd v Tizard[17] provide that there was actual occupation even when the wife was divorced she visited every day to look after her children. Although she was not living there her daily activities might be regarded as sufficient to justify the result. The facts are all important in such a case.[18] The result in Chhokar seems clear, but what if the seller had removed all evidence of the wife. Like in the scenario it is unclear whether Alisha sees possessions of Wilma other than the wedding photograph before sale. And since Bob lies about a divorce Wilma’s claim might be stronger in such a circumstance. The purchaser has a statutory defence to an overriding interest if inquiry is made of the occupier, but the rights are not disclosed.[19] This is a clear hint to a purchaser as to what should be done. Those in actual occupation must be discovered and then asked what their interests are. In practice and in the scenario they tend to rely on the seller’s information. This might be convenient but gives no protection. And when Alisha identified the wedding photograph she should have been careful enough to ask the occupier what their interests are rather than whether she is present or not. This is because there is no need for overriding interest to be the source of the actual occupation.[20] The scenario doesn’t state that Wilma and Bob are divorced so this matter can be taken under Family Law Act 1996, s31 (10), that where one spouse or civil partner owns the family home, the other spouse has a right not to be evicted if already in occupation and a right with a leave of the court to enter and occupy if not already in occupation. And this lasts as long as the marriage continues. Under Sec.31 Wilma’s home rights constitute a charge on the estate or interest of Bob and will bind Alisha in the property for valuable consideration if they are protected by a notice on the register of the title. This acts as an exception to overriding interests and thus binds Alisha. C. Easements and profits can be created expressly or impliedly by granting another person a right over one’s land or by reserving a right over land which one is transferring to another person.[21]Only legal easements are now capable of overriding the register. The LRA 2002 effectively reversed the controversial case of Celsteel Ltd v Alton House Holdings Ltd[22] which held that both legal and equitable easements were overriding within 1925 scheme. But if somehow the deed is registered it loses its overriding status. We can assume that Maxwell’s claim satisfy the requirement for a valid easement as laid down in Re Ellenborough Park.[23]A valid easement can be created by prescription which is long use of land and under Sec 2 of the Prescription Act 1832. The use for many years of a right which is capable of being an easement can create a legal easement by prescription.[24] Prescription arises if an easement has been used openly, as of right, without permission and continuously by one fee simple owner against another, provided that the right could have legitimately been granted by the landowner.[25] Maxwell does use the path openly and even notify Alisha of his right and say he has been using it for any years. It is somewhat unclear whether the prescription is by lost modern grant. Finally, we can come to a conclusion which interests bind Alisha and which does not. The legal lease of Polly doesn’t bind Alisha since there’s lack of physical presence and notice as explained. But the share of Wilma does bind Alisha since she has some equitable rights towards her share of the property. And finally the easement will also bind Alisha through the Prescription Act 1832. Critically examine the rationale for the continued existence of interests which override. â€Å"Overriding interests are important and controversial because they contravene the most basic registration principle: they bind purchasers despite not being entered on the Register† Roger Smith, Elements of Land Law (Pearson Longman 2007) In a sense overriding interests are rather like ‘trump cards’ of the registered land system, taking automatic priority to any rights which are subsequently acquired by a person in the land. Not only that, but they can also lead to alteration of the register with no compensation being payable to the purchase. Little wonder then that a former Chief Land Register referred to them as ‘a stumbling block’.[26] When compulsory title registration was introduced, the aim of its creators was to simplify conveyance by placing all the essential information about an estate in land on a register. Thereafter a purchaser intending to buy the land will only have to look up at the register in order to discover all what he needed to know about the property.[27] A major difficulty arose from the category of ‘overriding interest’. The original notion of land registration was that the register would provide a complete record of the title, so that the purchaser will be able to buy it with minimum or other enquiries or inspections.[28] The fundamental principle behind registered land is the mirror principle, which is to reflect accurately and completely and beyond all argument the current facts that are material to a mans title. Overriding interests represents the greatest breach in the mirror principle. They were not accidentally created but rather deliberately done by the legislature and given automatic effect precisely because they should be obvious to any prospective purchaser or their enforcement is too important to depend on registration.[29] On the other hand the curtain principle is perhaps the most ambitious motive behind the origin 1925 Act and it remains a key principle under 2002 Act. The aim is to keep certain types of equitable interests off the register completely. As Williams and Glyn’s Bank v Boland shows, if the curtain is not raised the purchaser can easily be bound by such equitable interests. This problem clearly involves striking a balance between protection of the purchaser and protection for the occupier of land and it arose largely due to social and judicial changes.[30] Paragraphs 1 to 3 of Schedule 3 cover three types of interests which were overriding under LRA 1925. They are short leases, rights of persons in actual occupation and easements and profits. Schedule 3, Para 1 shortens the length of a lease from not exceeding 21 years to not exceeding 7 years. And in the future it can reduce to 3 years with the effect of e-conveyancing[31]. The reason why these leases override is that it would be unreasonable to expect short leases to be registered and if they were the register would be cluttered up by them. Under the 1925 Act anyone with proprietary right in property and also in actual occupation could claim an overriding interest. In Williams Glyn’s Bank v Boland in 1981 defined actual occupation as â€Å"It is the fact of occupation that matters and what is required is the physical presence in the land and not some entitlement in law†. However, Schedule 3 of LRA 2002 has reduced the extent to which these interests can bind a purchaser on subsequent registration of title so that a purchaser will not be bound if the occupation would not have been obvious on a reasonable inspection of the land at the time of the disposition. Under LRA 1925 s.70 (1) (a) all legal easements and profits and certain equitable easements[32] were overriding. But this wide category was reduced by LRA 2002 under Schedule 3, Para 3 where only legal easements by prescription or implied easements and profits were overriding. The LRA 2002 effectively reversed the controversial case of Celsteel Ltd v Alton House Holdings Ltd[33] which held that both legal and equitable easements were overriding interests within the 1925 scheme. Under LRA 1925 Sec. 70 (1) (f) a squatter could obtain title after 12 years adverse possession.[34] The new rules introduced by LRA 2002 apply to any squatter who had not completed the 12 year imitation period before the Act came into force on 13th October 2003. The rules are designed to protect the rights of the registered proprietor, and as a result the squatter’s chances of acquiring title to land are greatly reduced by the new scheme.[35] Finally local land charges override but they should be discovered by a local land charges search carried out before purchase. Moreover other interests, such as chancel repair liability will cease to override on 13 October 2013. Thus the ‘snap shot’ is becoming more accurate.[36] Why do we have them? At one time it was argued that the register replaces the title deeds and that the registration system should not protect purchasers in respect of interests not generally found in title deeds. Although this seems correct as historical explanation[37], the law commission has rejected it as an approach fit for the modern law. Their view is that, â€Å"In the interest of certainty and of simplifying conveyancing, the class of right which may bind a purchaser otherwise than as the result of an entry in the register should be as narrow as possible but †¦ interests should be overriding where protection against purchasers is needed, yet it is either not reasonable to expect or not sensible to require any entry on the register.†[38] They are also difficult to discover on an inspection of the land.[39] Not surprisingly the 2002 Act is working towards either minimizing or abolishing some overriding interests but has not yet worked out a strategy to eradicate them once and for all.[40] To make them lose their rights would contravene Article 1 of the First Protocol of ECHR. Active promotion of the advantages of registering interests could work in favor of both the purchaser and the beneficiaries of these rights. Times have changed and the importance of moving on cannot be underestimated.[41] This surely illustrates the deepening of the crack in the mirror principle of registered land. In order to narrow the crack, the class of overriding interests may be made more certain by narrowing the class. On the grounds of public policy, there will perhaps always be interests which will need protection against the purchaser, where it will be unreasonable to register the interests. Therefore, the extent of the crack can never really get away from third- party interests, which is just as important as having quicker and cheaper conveyancing. Until legislation makes clear specifications on what particular interests can qualify, the concerns of overriding interests will remain. Bibliography Textbooks Judith-Anne MacKenzie,Textbook on Land Law(15th, Oxford University Press, 2014) Roger J Smith,Property Law(7th, Pearson Education Limited, 2011) Martin Dixon , Gerwyn LL H Griffiths and Emma Lees, QA Land Law (8th, Routledge, 2013) Journal Articles Matthew Roach, the end is nigh for Overriding interests -Or is it? [Summer 2013 ] 2 Stewart-Wallace , principles of land registration, p 32 Online resources Mangala Murali, Overriding Interests –a conundrum of English Land Law (Law Brief Update October 10, 2012 ) http://www.lawbriefupdate.com/2012/10/10/overriding-interests-a-conundrum-of-english-land-law/> accessed 1/12/2015 Statues Land Registration Act 1925 Land Registration Act 2002 Prescription Act 1832 Limitation Act 1980 Cases Bakewell Management Ltd v Brandwood Celsteel Ltd v Alton House Holdings [1985] Celsteel Ltd v Alton House Holdings Ltd [1985] 1 WLR 204 Dewan v Lewis [2010] EWCA Civ 1382 Kingsnorth Finance Co Ltd v Tizard [1986] 1 WLR 783 (Ch D) Link Lending Ltd v Bustard [2010] EWCA Civ 424 Malory Enterprises Ltd v Cheshire [2002] National Provincial Bank v Ainsworth [1965] AC 1175 Re Ellenborough Park [1955] 3 All ER 667 Williams Glyn’s Bank Ltd v Boland [1981] 1 [1] Roger J Smith,Property Law(7th, Pearson Education Limited, 2011) 53 [2]If one is not sure whether a registration has been made it can be found out by making an ‘index map search’ which will tell you whether the estate has been registered. Further details may be obtained by making a full search of the register, which since 3 December 1990, can be done without the consent of the estate owner. [3] Judith-Anne MacKenzie,Textbook on Land Law(15th, Oxford University Press, 2014) 38 [4] S.4 (1) (d) [5] The Act defines a notice as ‘ an entry in the register in respect of the burden of an interest affecting a registered estate or charge’ S.32(1) [6] S.33 [7] S 32(3) [8] Judith-Anne MacKenzie,Textbook on Land Law(15th, Oxford University Press, 2014) 106 [9] S 29(3) [10][1965] AC 1175 [11] Roger J Smith,Property Law(7th, Pearson Education Limited, 2011) 254 [12] Williams Glyn’s Bank Ltd v Boland [1981] [13] Judith-Anne MacKenzie,Textbook on Land Law(15th, Oxford University Press, 2014) 118-119 [14] [15] [2010] EWCA Civ 424 [16] Judith-Anne MacKenzie,Textbook on Land Law(15th, Oxford University Press, 2014) 115 [17] [1986] 1 WLR 783 (Ch D) [18] Judith-Anne MacKenzie,Textbook on Land Law(15th, Oxford University Press, 2014) 115 [19] Sch3 Para 2b [20] Roger J Smith,Property Law(7th, Pearson Education Limited, 2011) 264 [21] Judith-Anne MacKenzie,Textbook on Land Law(15th, Oxford University Press, 2014) 111 [22] [1985] 1 WLR 204 [23] [1955] 3 All ER 667 [24] The role of this doctrine was summarized in Dewan v Lewis [2010] EWCA Civ 1382 [25] Bakewell Management Ltd v Brandwood [26] Roger J Smith,Property Law(7th, Pearson Education Limited, 2011) 251 [27] Judith-Anne MacKenzie,Textbook on Land Law(15th, Oxford University Press, 2014) 86 [28] Judith-Anne MacKenzie,Textbook on Land Law(15th, Oxford University Press, 2014) 86 [29] Martin Dixon , Gerwyn LL H Griffiths and Emma Lees, QA Land Law (8th, Routledge, 2013) 10 [30] ibid [31] The introduction of e-conveyancing will have tremendous significance for the operation of the registered title system. It will only remove the gap between execution and registration which , as we have seen , can cause problems , but will also reduce very considerably the number of interests which can be created ‘off the register’. [32] Celsteel ltd v Alton House Holdings [1985] [33] [1986] 1 WLR 512 [34] Even if the squatter is no longer in possession at the date of disposition. [35] Judith-Anne MacKenzie,Textbook on Land Law(15th, Oxford University Press, 2014) 141 [36] Martin Dixon , Gerwyn LL H Griffiths and Emma Lees, QA Land Law (8th, Routledge, 2013) 21 [37] Stewart-Wallace , principles of land registration, p 32 [38] Another important factor permeating the changes introduced by LRA 2002 is the extent to which a purchaser may be expected to discover these interests without making extensive inquiries. â€Å"Because overriding interests bind transferees of the land even though they are by definition, not protected on the register, they are widely acknowledged to be potential source of difficulty in registered conveyancing† The law commission report no254 1998 [39] Examples include rights of an occupier of land, a lease for a term of less than seven years, profits a prendre (fishing rights or shooting or hunting rights). [40] The rights of persons in actual occupation present formidable challenges for reformists and it is this area of law that professionals must work on to find a conducive solution. [41] Mangala Murali, Overriding Interests –a conundrum of English Land Law (Law Brief Update October 10, 2012 ) http://www.lawbriefupdate.com/2012/10/10/overriding-interests-a-conundrum-of-english-land-law/> accessed 1/12/2015

Tuesday, November 12, 2019

Measuring Quality Health Care

{draw:g} {draw:g} {draw:g} Why is a patient the most important thing when it comes to healthcare? Without a patient, there would be no healthcare. What do patients look for when it comes to getting care they need? I feel that cost is one thing, but the most important thing a patient wants is quality care. A positive patient outcome is one of the measures of quality health care. Additionally, health care workers have many roles when determining quality care. The main factor to a positive patient outcome is providing the patient with the best care that can be given. This includes what ever it takes medically to keep this person healthy. Many people are denied certain medical procedures due to the insurance company not providing the payment. Therefore, the billing clerk should try and see if there is a charity that is available or set up a payment plan. This is another approach that I feel is necessary in providing a positive patient outcome and quality care, watch for medical errors. Why? According to Stevens, there are over 50,000 people that die every year in a hospital or healthcare institution due to a medical error. Training employees and having an administrator over parts of the facility would help improve on errors. Training is the key to the problem. If an employee gets adequate training, then there is less of a chance for a mistake. Roles that health care workers have when determining quality care vary. The main role is assessing the patient, diagnose, monitor, observe treatments, and respond to changes. Other roles that are played if the patient is at home are making sure the patient is in a safe environment, communication with all parties involved, making sure the patient is eating and drinking well, keeping an eye out for changes, and make sure the patient is using proper hygiene. Measuring quality care is important for the patient as well as the facility. Without the patient, there is no facility. Keeping a patient happy, comfortable and healthy is important. There are many different roles provided by health care workers that are involved in a patient’s care, depending on the care the patient needs. The main thing is a positive patient outcome. What makes something positive? A positive health care worker makes a big influence on a positive outcome. References: Stevens, A. (2008) http://blog. sunbeltstaffing. com/medical-ethics/what-role-do-healthcare-worker

Sunday, November 10, 2019

Phylogenetic

Molecular Phylogenetics An introduction to computational methods and tools for analyzing evolutionary relationships Karen Dowell Math 500 Fall 2008 Molecular Phylogenetics Karen Dowell 1 Abstract Molecular phylogenetics applies a combination of molecular and statistical techniques to infer evolutionary relationships among organisms or genes.This review paper provides a general introduction to phylogenetics and phylogenetic trees, describes some of the most common computational methods used to infer phylogenetic information from molecular data, and provides an overview of some of the many different online tools available for phylogenetic analysis. In addition, several phylogenetic case studies are summarized to illustrate how researchers in different biological disciplines are applying molecular phylogenetics in their work. Introduction to Molecular PhylogeneticsThe similarity of biological functions and molecular mechanisms in living organisms strongly suggests that species descended from a common ancestor. Molecular phylogenetics uses the structure and function of molecules and how they change over time to infer these evolutionary relationships. This branch of study emerged in the early 20th century but didn’t begin in earnest until the 1960s, with the advent of protein sequencing, PCR, electrophoresis, and other molecular biology techniques.Over the past 30 years, as computers have become more powerful and more generally accessible, and computer algorithms more sophisticated, researchers have been able to tackle the immensely complicated stochastic and probabilistic problems that define evolution at the molecular level more effectively. Within past decade, this field has been further reenergized and redefined as whole genome sequencing for complex organisms has become faster and less expensive. As mounds of genomic data becomes publically available, molecular phylogenetics is continuing to grow and find new applications. 4, 10, 17, 20, 22] The primary objective of molecular phylogenetic studies is to recover the order of evolutionary events and represent them in evolutionary trees that graphically depict relationships among species or genes over time. This is an extremely complex process, further complicated by the fact that there is no one right way to approach all phylogenetic problems. Phylogenetic data sets can consist of hundreds of different species, each of which may have varying mutation rates and patterns that influence evolutionary change.Consequently, there are numerous different evolutionary models and stochastic methods available. The optimal methods for a phylogenetic analysis depend on the nature of the study and data used. [5, 19, 20] Molecular Evolution: Beyond Darwin Evolution is a process by which the traits of a population change from one generation to another. In On the Origin of Species by Means of Natural Selection, Darwin proposed that, given overwhelming evidence from his extensive comparative analysis of living specimens and fossils, all living organisms descended from a common ancestor.The book’s only illustration (see Figure 1) is a tree-like structure that suggests how slow and successive modifications could lead to the extreme variations seen in species today. [11, 27] Molecular Phylogenetics Karen Dowell 2 Figure 1. Evolution Defined Graphically. The sole illustration in Darwin’s Origin of the Species uses a tree-like structure to describe evolution. This drawing shows ancestors at the limbs and branches of the tree, more recent ancestors at its twigs, and contemporary organisms at its buds. [34] Darwin’s theory of evolution is based on three underlying principles: ariation in traits exist among individuals within a population, these variations can be passed from one generation to the next via inheritance, and that some forms of inherited traits provide individuals a higher chance of survival and reproduction than others. [11] Although Darwin developed his theory of evolution without any knowledge of the molecular basis of life, it has since been determined that evolution is actually a molecular process based on genetic information, encoded in DNA, RNA, and proteins. At a molecular level, evolution is driven by the same types of mechanisms Darwin observed at the species level.One molecule undergoes diversification into many variations. One or more of those variants can be selected to be reproduced or amplified throughout a population over many generations. Such variations at the molecular level can be caused by mutations, such as deletions, insertions, inversions, or substitutions at the nucleotide level, which in turn affect protein structure and biological function. [11, 22] What is a Phylogeny? According to modern evolutionary theory, all organisms on earth have descended from a common ancestor, which means that any set of species, extant or extinct, is related.This relationship is called a phylogeny, and is represented by phyloge netic trees, which graphically represent the evolutionary history related to the species of interest (see Figure 2). Phylogenetics infers trees from observations about existing organisms using morphological, physiological, and molecular characteristics. Figure 2. Phylogeny of Mammalia. This phylogenetic tree shows the evolutionary relationships among six orders of Mammalian species (taxa). Taxa listed in grey are extinct. The â€Å"tree of life† represents a phylogeny of all organisms, living and extinct.Other, more specialized species and molecular phylogenies are used to support comparative studies, test biogeographic hypotheses, evaluate mode and timing of speciation, infer amino acid sequence of extinct proteins, track the evolution of diseases, and even provide evidence in criminal cases. [19] Molecular Phylogenetics Karen Dowell 3 Understanding Phylogenetic Trees Before exploring statistical and bioinformatic methods for estimating phylogenetic trees from molecular data , it’s important to have a basic familiarity of the terms and elements common to these types of trees. See Figure 3. ) Figure 3. Basic elements of a phylogenetic tree. Phylogenetic trees are composed of branches, also known as edges, that connect and terminate at nodes. Branches and nodes can be internal or external (terminal). The terminal nodes at the tips of trees represent operational taxonomic units (OTUs). OTUs correspond to the molecular sequences or taxa (species) from which the tree was inferred. Internal nodes represent the last common ancestor (LCA) to all nodes that arise from that point.Trees can be made of a single gene from many taxa (a species tree) or multi-gene families (gene trees). [1, 10] A tree is considered to be â€Å"rooted† if there is a particular node or outgroup (an external point of reference) from which all OTUs in the tree arises. The root is the oldest point in the tree and the common ancestor of all taxa in the analysis. In the absence of a known outgroup, the root can be placed in the middle of the tree or a rootless tree may be generated. Branches of a tree can be grouped together in different ways. (See Figure 4. ) Figure 4.Groups and associations of taxonomical units in trees. A monophyletic group consists of an internal LCA node and all OTUs arising from it. All members within the group are derived from a common ancestor and have inherited a set of unique common traits. A paraphyletic group excludes some of its descendents (for examples all mammals, except the marsupialia Molecular Phylogenetics Karen Dowell 4 taxa). And a polyphyletic group can be a collection of distantly related OTUs that are associated by a similar characteristic or phenotype, but are not directly descended from a common ancestor. 1, 17] Trees and Homology Evolution is shaped by homology, which refers to any similarity due to common ancestry. Similarly, phylogenetic trees are defined by homologous relationships. Paralogs are homologous s equences separated by a gene duplication event. Orthologs are homologous sequences separated by a speciation event (when one species diverges into two). Homologs can be either paralogs or orthologs. [1, 11, 22] Molecular phylogenetic trees are drawn so that branch length corresponds to amount of evolution (the percent difference in molecular sequences) between nodes. 1, 19] Figure 5. Understanding paralogs and orthologs. Paralogs are created by gene duplication events. (See Figure 5. ) Once a gene has been duplicated, all subsequent species in the phylogeny will inherit both copies of the gene, creating orthologs. Interestingly, evolutionary divergence of different species may result in many variations of a protein, all with similar structures and functions, but with very different amino acid sequences. Phylogenetic studies can trace the origin of such proteins to an ancestral protein family or gene. [1, 22] Figure 6. Mirror Phylogenies.Gene A and Gene A1 are paralogs, whereas all i nstances of Gene A are orthologs of each other in different Canid species. One way to ensure that paralogs and orthologs are appropriately referenced in a phylogenetic tree, and guard against misrepresentation due to missing or incomplete taxonomic information is to generate mirror phylogenies (see Figure 6) in which paralogs serve as each other’s outgroup. [1, 4, 19, 22] Estimating Molecular Phylogenetic Trees Molecular phylogenetic trees are generated from character datasets that provides evolutionary content and context.Character data may consist of biomolecular sequence alignments of DNA, RNA, or amino acids, molecular markers, such as single nucleotide polymorphisms (SNPs) or restriction fragment length polymorphisms (RFLPs), morphology data, or information on gene order and content. Evolution is modeled as a process that changes the state of a character, such as the type of nucleotide (AGTC) at a Molecular Phylogenetics Karen Dowell 5 specific location in a DNA sequence ; each character is a function that maps a set of taxa to distinct states. 1, 19] Note that most of the examples in this paper use DNA sequences as character data, but trees can be accurately estimated from many different types of molecular data. Figure 7. Evolution of a DNA Sequence Figure 7 illustrates how a molecular sequence might evolve over time as a result of multiple mutations that results small, but evolutionarily important changes in a nucleotide sequence. At the protein level, these changes may not initially affect protein structure or function, but over time, they may eventually shape a new purpose for a protein within divergent species. 10, 19, 22] OTUs can be used to build an unrooted phylogenetic tree that clearly depicts a path of evolutionary change. Steps in Phylogenetic Analysis Although the nature and scope of phylogenetic studies may vary significantly and require different datasets and computational methods, the basic steps in any phylogenetic analysis remain t he same: assemble and align a dataset, build (estimate) phylogenetic trees from sequences using computational methods and stochastic models, and statistically test and assess the estimated trees. 4, 19, 20] Assemble and Align Datasets The first step is to identify a protein or DNA sequence of interest and assemble a dataset consisting of other related sequences. For example, to explore relationships among different members of the Notch family of proteins, one might select DNA sequences for Notch1 through Notch4, in different species, such as human, dog, rat, and mouse, then perform a multiple sequence alignment to identify homologies. [1, 10, 13, 19, 20] There are a number of free, online tools available to simplify and streamline this process. DNA sequences of interest can be retrieved using NCBI BLAST or similar search tools.When evaluating a set of related sequences retrieved in a BLAST search, pay close attention to the score and E-value. A high score indicates the subject seque nce retrieved with closely related to the sequence used to initiate the query. The smaller the E-value, the higher the probability that the homology reflects a true evolutionary relationship, as opposed to sequence similarity due to chance. As a general rule, sequences with E-values less than 10-5 are homologs of a query sequence. [10] Once sequences are selected and retrieved, multiple sequence alignment is created.This involves arranging a set of sequences in a matrix to identify regions of homology. Typically, gaps (one or more spaces in the alignment) are introduced in one or more sequences to represent insertions or deletions in the molecular code that may have occurred over time. Effective multiple sequence alignment hinged on gap analysis—determining where to insert gaps and how large to make them. There are many websites and software programs, such as ClustalW, MSA, MAFFT, and T-Coffee, designed to perform multiple sequence on a given set of molecular data. ClustalW i s currently the most mature and most widely used. 1, 10. 19] Molecular Phylogenetics Karen Dowell 6 Building Phylogenetic Trees To build phylogenetic trees, statistical methods are applied to determine the tree topology and calculate the branch lengths that best describe the phylogenetic relationships of the aligned sequences in a dataset. Many different methods for building trees exist and no single method performs well for all types of trees and datasets. The most common computational methods applied include distance-matrix methods, and discrete data methods, such as maximum parsimony and maximum likelihood. 4, 17, 20] There are several software packages, such as Paup*, PAML, PHYLIP, that apply most popular methods. [4] Paup* is a commercially available program that implements a wide variety of methods for phylogenetic inference, including maximum likelihood analysis for DNA data using different models. Paup* also includes a set of exact and heuristic methods for searching optimal trees. PAML (Phylogenetic Analysis by Maximum Likelihood) is open-access set of programs for phylogenetic analysis and evolutionary model comparison.PAML includes many advanced models—DNA- and AAbased models as well as codon-based models that can be used to detect positive selection. Many of the programs in PAML can model heterogeneity of evolutionary rates among sequence sites using ? distributions, and evolutionary dynamics of different sequence regions (concatenated gene sequences). PHYLIP is another large suite of open-access programs for phylogenetic inference that estimates trees using numerous methods, including pairwise distance, maximum parsimony, and maximum likelihood.The maximum likelihood programs can handle a few simple stochastic models and have good tree searching capabilities. PHYLIP is generally considered good educational software for novice phylogeneticists. Distance-Matrix Methods Distance matrix methods compute a matrix of pairwise â€Å"distances† between sequences that approximate evolutionary distance. Distance-based methods tend to be in polynomial time and are quite fast in practice. These methods use clustering techniques to compute evolutionary distances, such as the number of nucleotide or amino acid substitutions between sequences, for all pairs of taxa.They then construct phylogenetic trees using algorithms based on functional relationships among distance values. There are several different distance-matrix methods, including the Unweighted Pair-Group Method with Arithmetic Mean (UPGMA), which uses a sequential clustering algorithm; the Transformed Distance Method, which uses an outgroup as a reference, then applies UPGMA; the Neighbor-Relations Method, which applies 4point condition to adjust the distance matrix, then applies UPGMA; and the Neighbor-Joining Method, which arranges OTUs in a star, the finds neighbors sequentially to minimize total length of tree. 4, 17] The following section on the UPGMA method prov ides a more detailed example of how distance-matrix methods work. UPGMA Method UPGMA produces rooted trees for which the edge lengths can be viewed as times measured by a molecular clock with a constant rate. This method uses a sequential clustering algorithm to identify two OTUs that are most similar (meaning they have the shortest evolutionary distance and are most similar in sequence) and treat them as a single new composite OTU. This process is repeated iteratively until only two OTUs remain.The algorithm defines the distance (d) between two clusters Ci and Cj as the average distance between pairs of sequences from each cluster: Molecular Phylogenetics Karen Dowell 7 Where |Ci| and |Cj| are the number of sequences in clusters i and j. This sequential clustering process is visually described in Figure 8. In this example, the two most homologous sequences are 1 and 2. They are clustered into a new composite parent node (6), and the branch lengths (t1 and t2) are defined as 1/2d1,2 . The next step is to search for the closest pair among remaining sequences and node 6.Pair 4 and 5 are identified and clustered into a new parent node (7), and the branch length for t4 and t5 is calculated. [4, 17] Figure 8. Sequential clustering of sequences using the UPGMA method. [17] In this interactive process, parent node 8 is created from pairs 7 and 3, and parent node 9 is created by clustering nodes 6 and 8. [4, 17] Thus, all sequences are clustered into a single evolutionary tree. The total time (t9) can be calculated as: D6,8 = 1/6 (d1,3 + d1,4 + d1,5 + d2,3 + d2,4 +d2,5)Discrete Data Methods Discrete data methods examine each column of a multiple sequence alignment dataset separately and search for the tree that best represents all this information. Although distance-based methods tend to be much faster than discrete data methods, they typically yield little information beyond the basic tree structure. Discrete data analyses, on the other hand, are information rich. The se methods produce a separate tree for each column in the alignment, so it is possible to trace the evolution for specific elements within a given sequence, such as catalytic sites or regulatory regions. 10, 17, 19, 20) Commonly used discrete data methods include maximum parsimony, which searches for the most parsimonious tree that requires the least number of evolutionary changes to explain differences observed, maximum likelihood, which requires a probabilistic model for the process of nucleotide substitution, and Bayesian MCMC, which also requires a stochastic model of evolution, but creates a probability distribution on a set of trees or aspects of evolutionary history. [17, 19, 20] Discrete data methods are generally considered to produce the best estimates of evolutionary history.However, these methods can be computationally expensive, and it can take weeks or months to obtain a reasonable level of accuracy for moderate to large datasets with 100 or more OTUs. [19] Molecular P hylogenetics Maximum Parsimony Karen Dowell 8 Among the most widely used tree-estimation techniques, maximum parsimony applies a set of algorithms to search for the tree that requires the minimum number of evolutionary changes observed among the OTUs in the study. For example, Figure 9 lists four sample sequences from which phylogenetic trees could be inferred using maximum parsimony.Site Seq 1 2 3 4 1 A A A A 2 A G G G 3 G C A A 4 A C T G 5 G G A A 6 T T T T 7 G G C C 8 C C C C 9 A G A G Figure 9. Sample sequences for a maximum parsimony study [17] Maximum parsimony algorithms identify phylogenetically informative sites, meaning the site favors some trees over others. Consider the sequences in Figure 9: Site 1 is not informative, because all sequences at that site (in column 1) are A (Adenine), and no change in state is required to match any one sequence (1-4) to another.Similarly, Site 2 is not informative because all three trees require one change and there is no reason to favor one tree over another. Site 3 is not informative because all three trees require two changes. (See Figure 10). Figure 10. Site 3 trees all require one evolutionary change. [17] Site 4 is not informative because all three trees require three changes. No one tree can be identified as parsimonious. (See Figure 10 Figure 11. Site 4 trees all require three evolutionary changes. [17] Site 5 is informative because one tree requires only one nucleotide change, whereas the other two trees require 2 changes.In Figure 12, the first tree on the left, which requires only one nucleotide change, is identified as the maximum parsimony tree. Figure 12. Site 5 trees vary in the number of evolutionary changes required. [17] Molecular Phylogenetics Maximum Likelihood Karen Dowell 9 The maximum likelihood method requires a probabalistic model of evolution for estimating nucleotide substitution. This method evaluates competing hypotheses (trees and parameters) by selecting those with the highest likeliho od, meaning those that render the observed data most plausible. The ikelihood of a hypothesis is defined as the probability of the data given that hypothesis. In phylogeny reconstruction, the hypotheses are the evolutionary tree (its topology and branch lengths) and any other parameters of the evolutionary model. [17, 20] The likelihood calculations required for evolutionary trees are far from straightforward and usually require complex computations that must allow for all possible unobserved sequences at the LCA nodes of hypothesized trees. This method specifies the transition probability from one nucleotide state to another in a time interval in each branch.For example, for a one-parameter model with rate of substitution ? per site per unit time, the probability that the nucleotide at time t is i is: The probability that the nucleotide at time t is j is: To set up a likelihood function, given x as the ancestral node and y and z as internal nodes, the probability of observing nucle otides i, j, k, l at the tips of the tree is computed as: Pxl(t1+t2+t3)Pxy(t1)Pyk(t2+t3)Pyz(t2)Pzi(t3)Pzj(t3) For the ancestral node (root) x, the probability of having nucleotide l in sequence 4 is calculated as: Pxl(t1+t2+t3)Because x, y, and z can be any one of four nucleotides (ACGT), it is necessary to sum over all possibilities to obtain the probability of observing the configuration of nucleotides i, j, k, l, in sequences 1, 2, 3, 4, for a given hypothetical tree (see Figure 13. ). This likelihood probability is calculated as: h(I,j,k,l)= [? gxPxl(t1+t2+t3)] [? Pxy(t1)Pyk(t2+t3)] [? Pyz(t2)Pzi(t3) Pzj(t3)] The appropriate likelihood function depends on the hypothetical tree and the evolutionary model used. (See Figure 13. ) [17] Figure 13. Different types of model trees for the derivation of the maximum likelihood function. 17] Molecular Phylogenetics Stochastic Models of Evolution Karen Dowell 10 Evolutionary changes in molecular sequences result from mutations, some of whic h occur by chance, others by natural selection. Rates of change can also differ among OTUs, depending on several factors ranging from GC content to genome size. To accurately estimate phylogenetic trees, assumptions must be made about the substitution process and those assumptions must be stated in the form of a stochastic evolutionary model. These probabilistic models are used to rank trees according to likelihood: P(data|tree).From a Bayesian perspective, they rank trees according to a posterior probability: P(tree|data). [17, 20] The objective of probabilistic models is to find likelihood or posterior probability of a particular taxonomic feature, then define and compute: P(x? |T,t ? ) Where x ? is xj for j=1†¦n, T is a tree with n leaves with sequence j at leaf j, and t ? are tree edge lengths. [17] A few popular stochastic models of evolution include the single parameter Jukes-Cantor (JC) method, Kimura 2-parameter (K2P), Hasegawa-Kishino-Yano (HKY), and Equal-Input.Some s oftware programs, such as Paup*, will automatically use a default model for the tree estimation method chosen. The JC method is the easiest one to comprehend, because it assumes that if a site changes its state, it changes with equal probability to the other states. This is not very realistic, however, as some sites are known to evolve more rapidly than others, and some sites may be invariable and not allowed to change at all. Determining how best to select the appropriate model is a topic of another paper (or papers) as there is no one model that incorporates all mutation rules and patterns across different species and macromolecules. 4, 17, 20] Hidden Markov Models Profile hidden Markov models (HMMs) are a form of Bayesian network that provides statistical models of the consensus structure of a sequence family. Gary Churchill at The Jackson Lab was the first evolutionary geneticist to propose using profile HMMs to model rates of evolution. Many software packages and web services n ow apply HMMs to estimate phylogenetic relationships. [8] In the HMM format, each position in the model corresponds to a site in the sequence alignment. For each position, there are a number of possible states, each of which corresponds to a different rate of evolution.In addition, transitions between all possible rate-states at adjacent positions. Transition probabilities capture any tendency for patterns of rates to occur in successive sites. [2, 4] Assessing Trees Tree estimating algorithms generate one or more optimal trees. This set of possible trees is subjected to a series of statistical tests to evaluate whether one tree is better than another – and if the proposed phylogeny is reasonable. Common methods for assessing trees include the Bootstrap and Jackknife Resampling methods, and analytical methods, such as parsimony, distance, and likelihood.To illustrate how these methods are used, consider the steps involved in a bootstrap analysis. Bootstrap Analysis A bootstra p is a statistical method for assessing trees that takes its name from the fact that it can â€Å"pull itself up by its bootstraps† and generate meaningful statistical distributions from almost nothing. Using bootstrap analysis, distributions that would otherwise be difficult to calculate exactly are estimated by repeated creation and analysis of artificial datasets. In a Non-parametric bootstrap, artificial datasets Molecular Phylogenetics Karen Dowell 11 generated by resampling from original data.In a parametric bootstrap, data is simulated according to hypothesis tested. The objective of any bootstrap analysis is to test whether the whole dataset supports the tree. [1, 4, 17] Figure 14 illustrates the basic steps in any bootstrap analysis. Sample datasets are automatically generated from an original dataset. Trees are then estimated from each sample dataset. The results are compiled and compared to determine a bootstrap consensus tree. Figure 14. Steps in a phylogenetic tr ee bootstrap analysis. [1] Phylogenetic Analysis Tools There are several good online tools and databases that can be used for phylogenetic analysis.These include PANTHER, P-Pod, PFam, TreeFam, and the PhyloFacts structural phylogenomic encyclopedia. Each of these databases uses different algorithms and draws on different sources for sequence information, and therefore the trees estimated by PANTHER, for example, may differ significantly from those generated by P-Pod or PFam. As with all bioinformatics tools of this type, it is important to test different methods, compare the results, then determine which database works best (according to consensus results, not researcher bias) for studies involving different types of datasets.In addition, to the phylogenetic programs already mentioned in this paper, a comprehensive list of more than 350 software packages, web-services, and other resources can be found here: http://evolution. genetics. washington. edu/phylip/software. html. PANTHER ( pantherdb. org) Protein ANalysis Through Evolutionary Relationships, known by its acronym PANTHER, is a library of protein families and subfamilies indexed by function. Panther version 6. 1 contains 5547 protein families. Molecular Phylogenetics Karen Dowell 12It categorizes proteins by evolutionary related proteins (families) and related proteins with same function (subfamilies). [8, 21, 26] PANTHER is composed of both a library and index. The library is a collection of â€Å"books† that represent a protein family as a collection of multiple sequence alignments, HMMs, and a family phylogenetic tree. Functional divergence within the tree is represented by dividing the parent tree into child trees and HMMs based on shared functions. These subfamilies enable database curators to more accurately capture functional divergence of protein sequences as inferred from genomic DNA. 25, 26] PANTHER database entries are annotated to molecular function, biological process and pathway with a proprietary PANTHER/X ontology system, which is supposed to be easier to understand than the more global standard Gene Ontology (GO). Database entries in PANTHER are generated through clustering of UniProt database using a BLAST-based similarity score. Trees are automatically generated based on multiple sequence alignments and parameters of the protein family HMMs using the Tree Inferred from Profile Score (TIPS) clustering algorithm.Scientific curators review all family trees, annotate each tree, and determine how best to divide them into subtrees using a tree-attribute viewer that tabulates annotations for sequences in a tree. In addition, trees and subfamilies are manually cross-checked and validated by curators. [25, 26] P-POD (ortholog. princeton. edu) The Princeton Protein Orthology Database (P-POD) combines results from multiple comparative methods with curated information culled from the literature.Designed to be a resource for experimental biologists seeking evolutionary information on genes on interest, P-POD employs a modular architecture, based on their Generic Model Organism Database (GMOD). P-POD can be accessed from their web service or downloaded to run on local computer systems. [12] P-POD accepts FASTA-formatted protein sequences as input, and performs comparative genomic analyses on those sequences using OrthoMCL and Jaccard clustering methods. The P-POD database contains both phylogenetic information and manually curated experimental results.The site also provides many links to sites rich in human disease and gene information. This tool may be particularly helpful for bioinformaticists and statisticians developing comparative genomic database tools and resources. Pfam (pfam. sanger. ac. uk/) PFam is a collection of protein families represented by multiple sequence alignments and HMMs. It contains models of protein clans, families, domains, and motifs, and uses HMMs representing conserved functional and structural domains. It is a large, widely used, actively curated mature database that has been available online since 1995.Pfam can be used to retrieve the domain architectures for a specific protein by conducting a search using a protein sequence against the Pfam library of HMMs. This database is also helpful for proteomes and protein domain architecture analysis. [6, 8, 24] There are two versions of the Pfam database: Pfam–B is generated automatically from ProDom, using PsiBLAST, an open access bioinformatics tool available through NCBI for identifying weak, but biologically relevant sequence similarities. Pfam-A is hand-curated from custom multiple sequence alignments. Pfam protein domain families are clustered with Mkdom2, and aligned with ProDomAlign.ProDom is a comprehensive set of protein domain families automatically generated from the SWISSPROT and TrEMBL sequence databases. Mkdom2 is a ProDom program used to make ProDom family clusters. Protein domain families in ProDom were aligned using an improved parallelized program called Molecular Phylogenetics Karen Dowell 13 ProDomAlign, developed in C++ using OpenMP. ProDomAlign is based on MultAlign, a program well suited for aligning very large sequence families with thousands of associated sequences. As of early 2008, Pfam matched 72 percent of known proteins sequences, and 95 percent of proteins for which there is a known structure.Within the Pfam database, 75 percent of sequences will have one match to Pfam-A, 19 percent to Pfam-B. There are also two versions of Pfam-A and Pfam-B. Pfam-ls handles global alignments, and Pfam-fs is optimized for local alignments. Interestingly, Pfam entries can be classified as â€Å"unknown,† but that doesn’t mean the protein is undocumented. Unknown entries can be proteins for which some information is known, but it has not been fully researched or cannot be adequately annotated. For example, Pfam entry PFO1816 is a LeucineRich Repeat Variant (LRV), which has a known structure (1LRV ) available in the Protein Databank (pdb. rg). LRV repeat regions, which are found in many different proteins, are often involved in cell adhesion, DNA repair, and hormone reception—but identification of an LRV within a sequence encoding a protein doesn’t specifically reveal the protein’s function. For studies involving a large number of protein searches, it may be more convenient to run Pfam locally on a client machine. The standalone Pfam system requires the HMMER2 software, the Pfam HMM libraries and a couple of additional files from the Pfam website to be installed on the client machine. HMMER is a freely distributable implementation of profile HMM software for protein sequence analysis. ) Once the initial search is complete, researchers can go to the Pfam website to further analyze select number of sequences using additional features on website. [6, 8, 24] TreeFam (TreeFam. org) TreeFam is a curated database of phylogenetic trees and orthology predictions f or all animal gene families that focuses on gene sets from animals with completely sequenced genomes. Orthologs and paralogs are inferred from phylogenetic tree of gene family.Release 4 contains curated trees for 1314 families and automatically generated trees for another 14351 families. [16, 23] Like Pfam, TreeFam is a two-part database: TreeFam-B contains automatically generated trees, and TreeFam-A consists of manually curated trees. To automatically generate trees, an algorithm selects clusters of genes to create TreeFam-B â€Å"seeds† from core species with high-quality reference genome sequences, first using BLAST to rapidly assemble an initial list of possible matches, then HMMER to expand and filter probable sequence matches for each TreeFam B seed family.The filtered alignment is fed into a neighbor-joining algorithm and a tree is constructed based on amino acid mismatch distances. For TreeFam version 4, the most current release, five â€Å"clean† family trees were built for each TreeFam B seed, two using a maximum likelihood tree generated using PHYML (one based on the protein alignment, the other on codon alignment), three using a neighbor joining tree, using different distance measurements based on codon alignments. 16, 23] Scientific curators then manually any correct errors (based on information in the literature) in automatically generated TreeFam-B trees. Curated TreeFam-B trees then become seeds for TreeFam-A trees. Clean TreeFam-A trees are build using three merging algorithms and bootstrapping to find the consensus tree of seven trees: two constrained maximum likelihood trees based on protein and codon alignment, and five unconstrained neighbor-joining trees generated using different distance measurements based on codon alignments.For both TreeFam-B and TreeFam-A families, orthologs and paralogs are inferred only from clean trees using Duplication/Loss Inference (DLI) algorithm that requires a species tree (NCBI taxonomy tree). [16, 23] Molecular Phylogenetics PhyloFacts (phylogenomics. berkeley. edu/phylofacts) Karen Dowell 14 PhyloFacts is an online phylogenomic encyclopedia for protein functional and structural classification. It contains more than 57,000 â€Å"books† for protein superfamilies and structural domains.Each book contains heterogenous data for protein families, including multiple sequence alignments, one or more phylogenetic trees, predicted 3-D protein structures, predicted functional subfamilies, taxonomic distributions, GO annotations, and PFAM domains. HMMs constructed for each family and subfamily permit novel sequences to be classified to different functional classes. [14] Unlike other databases mentioned in this paper, PhyloFacts seeks to correct and clarify annotation errors associated with computational methods for predicting protein function based on sequence homology.It uses a consensus approach that integrates many different prediction methods and sources of experimental data over an evolutionary tree. By applying evolutionary and structural clustering of proteins, PhyloFacts is able to analyze disparate datasets using multiple methods, identify potential errors in database annotations, and provide a mechanism for improving the accuracy of functional annotation in general. [14] PhyloFacts can be used to search for protein structure prediction or functional classification for a particular protein sequence.Researchers may also browse through protein family books and multiple sequence alignments, phylogenetic trees, HMMs and other pertinent information for proteins of interest. This webservice also provides many links to literature and other information sources. [14] Applied Molecular Phylogenetics Molecular phylogenetic studies have many diverse applications. As the amount of publically available molecular sequence data grows and methods for modeling evolution become more sophisticated and accessible, more and more biologists are incorporating phylog enetic analyses into their research trategy. Here’s a sampling of how molecular phylogenetics might be applied. Tracing the evolution of man In one case study, molecular phylogenetic techniques were used to compare and analyze variation in DNA sequences using modern human and Neanderthal mitochondrial DNA (mtDNA). For this study, 206 modern human mtDNAs and parts of two Neanderthal mtDNAs sequences derived from skeletal remains were used to generate an initial dataset. Genetic distance was first estimated using the Jukes-Cantor single parameter model.Then the Kimura 2-Parameter model was used to distinguish between transition (replacement of one purine with another purine or one pyrimidine with another pyrimidine) and transversion (replacement of one purine with a pyrimidine or vice versa) probabilities with Kimura 2parameter model. A phylogenetic tree representing primate evolution was generated using pairwise genetic distances between primate Hypervariable regions I and II of mtDNA. [3] Chasing an epidemic: SARS Using publically available genomic data, it is possible to reconstruct the progression of the SARS epidemic over time and geographically.To conduct this phylogenetic analysis, researchers used the neighborjoining method to construct a phylogenetic tree of spike proteins in various coronaviruses and identify the viral host (a Himalyan palm civet). They then obtained 13 SARs genome sequences with documented information on the date and location of the sample. The neighbor-joining method and a distance matrix based on Jukes-Cantor model, were used to generate an epidemic tree, from which it was possible to identify the origin (date and location) of the virus by observing progression of mutations over time. 3] Molecular Phylogenetics Barking up the right tree Karen Dowell 15 Phylogenetics is increasingly incorporated into biological and biomedical research papers. When the canine genome was published, researchers used sequence data to estimate a co mprehensive phylogeny of the canid family. Figure 15. Phylogenetic Tree of the Canid family This canid family phylogenetic tree is based on 15 kb of exon and intron sequence. It was constructed using the maximum parsimony method and represents the single most parsimonious tree.A good example of how phylogenies are referenced in the literature, this tree includes bootstrap values and Bayesian posterior probability values listed above and below internodes, respectively. Dashes indicate bootstrap values below 50%. In addition, divergence time in millions of years (Myr) is indicated for three nodes. [18] Seeing the Forest from the Trees Molecular phylogenetics is a broad, diverse field with many applications, supported by multiple computational and statistical methods. The sheer volumes of genomic data currently available (and rapidly growing) render molecular phylogenetics a key component of much biological research.Genome-scale studies on gene content, conserved gene order, gene expre ssion, regulatory networks, metabolic pathways, functional genome annotation can all be enriched by evolutionary studies based on phylogenetic statistical analyses. [19, 25 27] Molecular phylogenies have fast become an integral part of biological research, pharmaceutical drug design, and bioinformatics techniques for protein structure prediction and multiple sequence alignment. Although not all molecular biologists and bioinformaticians may be familiar with the techniques describedMolecular Phylogenetics Karen Dowell 16 in this paper, this is a rapidly growing and expanding field and there is ongoing need for novel algorithms to solve complex phylogeny reconstruction problems. References 1. Baldauf, SL (2003) â€Å"Phylogeny for the faint of heart: a tutorial. † Trends in Genetics, 19(6):345-351. 2. Brown, D, K Sjolander (2006) â€Å"Functional Classification Using Phylogenomic Inference. † PLos Computational Biology, 2(6):0479-0483. 3. Cristianini, N, and M Hahn (2007 ) Introduction to Computational Genomics: A Case Studies Approach.Cambridge University Press: Cambridge. 4. Durbin, R, S Eddy, A Krogh, G Mitchison (1998) Biological Sequence Analysis. Cambridge University Press: Cambridge. 5. Ewens, WJ, R Grant (2005) Statistical Methods in Bioinformatics. Springer Science and Business Media: New York. 6. Finn, RD, J Tate, J Mistry, PC Coggill, SJ Sammut, HR Hotz, G Ceric, K Forslund, SR Eddy, ELL Sonnhammer, A Bateman (2008) â€Å"The Pfam protein families database. † Nucleic Acids Research, 36:D281288. 7. Gabaldon, T (2008) â€Å"Large-scale assignment of orthology: back to phylogenetics? Genome Biology, 9:235. 1-235. 6. 8. Gollery, M. (2008) Handbook of Hidden Markov Models in Bioinformatics. CRC Press, Taylor & Francis Group: London. 9. Goodstadt, L, CP Ponting (2006) â€Å"Phylogenetic Reconstruction of Orthology, Paralogy, and Conserved Synteny for Dog and Human. † PLoS Computational Biology, 2(9):1134-1150. 10. Hall, BG. (2004 ) Phylogenetic Trees Made Easy: A How-To Manual, 2nd ed. Sinauer Associates, Inc. : Sunderland, MA. 11. Hartwell, LH, L Hood, ML Goldberg, AE Reynolds, LM Silver, RC Veres (2008) Genetics: From Genes to Genomes, 3rd Ed.McGraw-Hill: New York. 12. Heinicke, S, MS Livstone, C Lu, R Oughtred, F Kang, SV Angiuoli, O White, D Botstein, K Dolinski (2007) â€Å"The Princeton Protein Orthology Database (P-POD): A Comparative Genomics Analysis Tool for Biologists. † PLoS ONE, 8:e766. 1-15. 13. Kortschak, RD, R Tamme (2001) â€Å"Evolutionary analysis of vertebrate Notch genes. † Dev Genes Evol, 211:350-354. 14. Krishnamurthy, N, DP Brown, D Kirshner, K Sjolander (2006) â€Å"PhyloFacts: an online structural phylogenomic encyclopedia for protein functional and structural classification. † Genome Biology, 7:R83. -13. 15. Kuzniar, A, RCHJ van Ham, S Pongor, JAM Leunissen (2008) â€Å"The quest for orthologs: finding the corresponding gene across genomes. † Trends in G enetics, 24(11):539-551. Molecular Phylogenetics Karen Dowell 17 16. Li, H, A Coghlan, J Ruan, LJ Coin, JK Heriche, L Osmotherly, R Li, T Liu, Z Zhang, L Bolund, GKS Wong, W Zheng, P Dehal, J Wang, R Durbin (2006) â€Å"TreeFam: a curated database of phylgenetic trees of animal gene families. † Nucleic Acids Research, 34:D573-580. 17. Li, WH (1997) Molecular Evolution. Sinauer Associates: Sunderland, MA. 18.Lindblad-Toh, K, CM Wade, TS Mikkelsen, EK Karlsson, DB Jaffe, M Kamal, M Clamp, JL Chang, EJ Kulbokas III, MC Zody, E Mauceli, X Xie, M Breen, RK Wayne, EA Ostrander, CP Ponting, F Galibert, DR Smith, PJ deJong, E Kirkness, P Alvarez, T Biagi, W Brockman, J Butler, C Chin, A Cook, J Cuff, MJ Daly, D DeCaprio, S Gnerre, M Grabherr, M Kellis, M Kleber, C Bardeleben, L Goodstadt, A Heger, C Hitte, L Kim, KP Koepfli, HG Parker, JP Pollinger, SMJ Searle, NB Sutter, R Thomas, C Webber, ES Lander (2005) â€Å"Genome Sequence, Comparative Analysis and Haplotype Structure of the Domestic Dog.Nature, 438:803-819. 19. Linder, CR, T Warnow (2005) â€Å"An overview of phylogeny reconstruction. † In the Handbook of Computational Molecular Biology, Chapman and Hall/CRC Computer & Information Science. 20. Lio, P, N Goldman (1998) â€Å"Models of Molecular Evolution and Phylogeny. † Genome Research, 8:12331244. 21. Mi, H, N Guo, A Kejariwal, PD Thomas (2007) â€Å"PANTHER version 6: protein sequence and function evolution data with expanded representation of biological pathways. Nucleic Acids Research, 35:D247-252. 22. Patthy, Laszlo. (1999) Protein Evolution. Blackwell Science, Ltd: Malden, MA. 23. Ruan, J, H Li Z Chen, A Coghlan, LJM Coin, Y Guo, JK Heriche, Y Hu, K Kristiansen, R Li, T Liu, A Mose, J Qin, S Vang, AJ Vilella, A Ureta-Vidal, L Bolund, J Wang, R Durbin (2008) â€Å"TreeFam: 2008 Update. † Nucleic Acids Research, 36:D735-740. 24. Sammut, SJ, RD Finn, A Bateman (2008) â€Å"Pfam 10 years on: 10000 families and still growing. â €  Briefings in Bioinformatics, 9(3):210-219. 5. Thomas, PD, A Kejariwal, N Guo, H Mi, MJ Campbell, A Muruganujan, B Lazareva-Ulitsky (2006) â€Å"Applications for protein sequence-function evolution data: mRNA/protein expression analysis and coding SNP scoring tools. † Nucleic Acids Research, 34:W645-650. 26. Thomas, PD, MJ Campbell, A Kejariwal, H Mi, B Karlak, R Daverman, K Diemer, A Muruganujan, A Narechania. â€Å"PANTHER: A Library of Protein Families and Subfamilies Indexed by Function. † Genome Research, 13:2129-2141. 27.Warnow, T (2004) â€Å"Computational Methods in Phylogenetics† Computational Systems Biology Conference, Stanford, CA 28. Whelan, S, P Lio, N Goldman (2001) â€Å"Molecular phylogenetics: state of the art methods for looking into the past. † Trends in Genetics, 17(5):262-272. Molecular Phylogenetics Karen Dowell 18 Appendix Website Resources Phylogeny Programs. A University of Washington site formerly supported by the National Science Foundation. http://www. evolution. genetics. washington. edu/phylip/software. tml TreeFam Tree Families Database. http://wwww. treefam. org Protein Analysis Through Evolutionary Relationships (PANTHER) Classification System. http://www. pantherdb. org. 29. Pfam Database of Protein Families. http://pfam. sanger. ac. uk 30. Princeton Protein Orthology Database (P-POD). http://ppod. princeton. edu 31. Wikipedia. http://en. wikipedia. org/wiki/Tree_of_life(science) Cover Page The cover image is from a phylogeny of canid species that appeared in Lindblad-Toh et al, 2005. [18]