Sunday, January 26, 2020
Aspirin: History, Effects and Synthesis
Aspirin: History, Effects and Synthesis Introduction Aspirin is a drug which is widely used today to deal with the symptoms of many minor illnesses ranging from general relief from aches and pain; muscle, tooth, headaches, and arthritis; to prevent blood clotting and reduce the risk of stroke and heart attack; lower fever and potentially prevent certain cancers. History of Discovery Aspirin has a great history of development which could be considered to have begun in the 3000BC where it was recorded that remedies from the willow tree were the most useful for the treatment of many ailments. Though it was not for another 1500 years that it was more specifically noted in the Elbers papyrus for its usage for pain relief and inflammation. For the next few thousands of year the willow tree bark was used for in much the same way, although it would not be until 1828, 4800 years after the discovery of its usefulness, that the active ingredient of willow bark was isolated by the German chemist Joseph Buchner who managed to obtain salicin, from the latin Salix, crystals. At the time the crystals were considered fairly pure but Henri Leroux, of France, managed to obtain them in purer forms a year later. Several other chemists/pharmacists made discoveries in the years following, all of which we now know contained Salicylic Acid. It was the Italian Chemist Raffaele Piria who managed to devise a method of containing a more concentrated acid form of salicin from the willow extract, which he named Salicylic Acid (SA). After these discoveries the usage of Salicylates, esters and salts of salicylic acid, became more widespread by doctors for treating pain, fever and inflammation but with limited success due to adverse side effects such as gastric irritation to the lining of the mouth and stomach. It was not until around 1897 that Felix Hoffmann of Bayer Pharmaceuticals developed a method of synthesising acetyl salicylic acid after he had be tasked to find a substitute to SA, that did not cause gastric irritation, 4 years earlier; by Eichengrunalong with Dreser(the pharmacist who developed heroin). Early clinical trials found aspirin to be a potent treatment and today it is the best known and most widely use medicine in the world where it is estimated that over 100 billion tablets or 40,000 tonnes are consumed each year. Unsurprisingly shortly after clinical trials finished acetyl salicylic acid (ASA) became the over the counter drug under the name of Aspirin, though in some countries Aspirin is no-longer holds trademark and has become a generic term for ASA. Synthesis The method of synthesis today involves the reaction of salicylic acid and acetic anhydride in the presence of an acid catalyst such as sulphuric acid or phosphoric acid to give the products ASA and acetic acid. The process is a form of esterification reaction and thus is reversible. (Columbia.edu, n.d.) Method Salicylic acid is placed into a conical flask along with acetic anhydride while inside a fume hood wearing goggles and gloves as acetic anhydride is an irritant and the vapour is harmful is inhaled or reaches the eyes. The acid should then be added in a small quantity and the flask should be swirled to mix thoroughly. The mixture should then be warmed in a beaker of water for around 10 minutes to increase the rate of reaction. Alternatively the mixture could be refluxed over heat. The mixture can then be left to cool, and dried leaving an impure sample of ASA which can be purified. (Continue to Purification) Reaction Mechanism The oxygen atom of the phenol group initiates a nucleophilic attack on a carbon in a carbonyl bond of the acetic anhydride. As a result the oxygen of the phenol group becomes positively charged and the electrons forming the carbonyl bond in the acetic anhydride are pushed onto the oxygen of the bond and thus becomes negative. The bond between the hydrogen and oxygen in the phenol group breaks where the oxygen takes both electrons and becomes stable. The proton is ejected from the structure and the carbonyl bond then reforms as the oxygen delocalises the electrons it gained previously and becomes stable. (Carman, 2008) Purification The process of purification is relatively simple and is done by the process of hot and cold filtering. Distilled water should be added to the impure ASA crystals. Using the properties of ASA and the fact that it is soluble in hot water but virtually insoluble in cold water, any insoluble impurities can be removed by heating the mixture of water and ASA crystals to the point that the ASA crystals are just dissolved in the solution. This hot solution should then be filtered into a clean beaker. Any impurities which are insoluble are caught by the filter paper but the ASA which is soluble passes though. The hot filtered mixture should then be put into an ice bath to recrystallize it. When cold, using a Hirsch funnel, filter paper, a side arm flash, and a vacuum pump the mixture can be filtered once again. As the ASA will be crystalline it will be stopped by the filter paper and thus any soluble impurities are removed. What is left in the filter paper can be washed with distilled water and then dried. Providing the synthesising reaction was done to completion, the dried crystals should be a pure form of ASA or Aspirin. Method of Action of ASA As with many drugs which were developed early in the 20 century, the actual method that the drugs worked inside the body was not known. In the 1970ââ¬â¢s a British Scientist Professor John Vane discovered that it blocked the enzyme Cyclooxygenase which is needed for the production of hormones related to the bodyââ¬â¢s natural inflammatory and pain responses. Vane won the Nobel Prize for Medicine for this work. (Aspirin-foundation.com, n.d.) One enzyme involved in inflammation is cyclooxygenase (COX). COX is responsible for the formation of a group of inflammatory mediators known as prostaglandins. COX activates a chemical known as thromboxane A2 that causes platelets to stick together to form a plug over the damaged area. The aggregation of platelets (plug), in concert with the clotting process, results in a fibrin clot which stops bleeding and aids repair of the blood vessel. Aspirin inhibits COX, in turn stopping the formation of prostaglandins; hence aspirin acts as an anti-inflammatory agent in this process. [In regards to thromboxane A2] thereby reducing the ability of platelets to aggregate. This is why aspirin is known as a ââ¬Ëblood thinnerââ¬â¢ or anti-platelet agent. (Aspree.org, n.d.) Side Effects As previously stated Aspirin inhibits COX which inhibits prostaglandins. Prostaglandins are produced by cells in the lining of the stomach and form majority of the barrier that protect the stomach wall from the concentrated Hydrochloric acid it contains. As a result ASA can result in stomach ulcers. Other side effects would likely to be irritation of the gut, indigestion and nausea. References Arias, J. (2014).Aspirin Synthesis. 1st ed. [eBook] pp.2-4. Available at: http://www.lahc.edu/classes/chemistry/arias/Exp 5 AspirinF11.pdf [Accessed 5 Jul. 2014]. Aspirin-foundation.com, (n.d.).Aspirin Foundation What is Aspirin 100 Years of Aspirin. [Online] Available at: http://www.aspirin-foundation.com/what/100.html [Accessed 5 Jul. 2014]. Aspree.org, (n.d.).How aspirin works. [Online] Available at: http://www.aspree.org/AUS/aspree-content/aspirin/how-aspirin-works.aspx [Accessed 5 Jul. 2014]. Awtry, E. and Loscalzo, J. (2000). Aspirin.Circulation, [Online] 101(10), pp.1206-1218. Available at: http://circ.ahajournals.org/content/101/10/1206.full [Accessed 5 Jul. 2014]. Badd, C. and Perona, M. (1999).Synthesis of Aspirin. [Online] Wwwchem.csustan.edu. Available at: http://wwwchem.csustan.edu/consumer/aspirincons/aspirincons.htm [Accessed 5 Jul. 2014]. Carman, S. (2008).Esterification: The Synthesis of Aspirin (ASA). 1st ed. [eBook] Available at: http://www.drcarman.info/kem220lb/01lab220.pdf [Accessed 5 Jul. 2014]. Columbia.edu, (n.d.).Synthesis of Aspirin. [Online] Available at: http://www.columbia.edu/itc/chemistry/chem-c2507/navbar/Aspirin.ppt [Accessed 5 Jul. 2014]. Nordqvist, C. (2009).What Is Aspirin? What Is Aspirin For? [Online] Medical News Today. Available at: http://www.medicalnewstoday.com/articles/161255.php [Accessed 5 Jul. 2014]. Scribd.com, (2009).Aspirin Synthesis and Analysis. [Online] Available at: http://www.scribd.com/doc/13771504/Aspirin-Synthesis-and-Analysis [Accessed 5 Jul. 2014]. Telow, S. (n.d.).Acetylsalicylic Acid (Aspirin) Synthesis. [Online] Academia.edu. Available at: http://www.academia.edu/4728996/Acetylsalicylic_Acid_Aspirin_Synthesis [Accessed 5 Jul. 2014]. Theuplbcollegestudent.blogspot.co.uk, (2011).College: Full Report: Synthesis of Aspirin. [Online] Available at: http://theuplbcollegestudent.blogspot.co.uk/2011/05/full-report-synthesis-of-aspirin.html [Accessed 5 Jul. 2014].
Saturday, January 18, 2020
Electronic Health Record (EHR) System Potential Threats and Measures Taken to Protect It
Since the early 1980s, information technology have improved and revolutionized every aspect of our lives. We use information technology to do our daily chores like shopping and reading the latest global news at the comfort of our living room. It replaces old challenges with new possibilities. However, one of the areas that had evolved to this new demand in information technology but rather in a slow phase is the healthcare industry. Todayââ¬â¢s healthcare includes hospitals and private clinics. A lack of an effective management of data about a disease and the treatment for saving lives can be put at risk. In previous years medical information was stored only on paper and in one location, usually a patient's primary care physician's office or medical institute. People tend to migrate to a different area or country, thus making it difficult to transfer piles of paperwork and medical records to every point of medical institution which a patient is seeking treatment. It is even more complex when most patients visit more than a single physician or an institution and the process of being treated by a different number of nurses, consulting specialists, diagnostic technicians and administrative staff. Paper-based medical record systems are also adding the unnecessary expense to a medical institution. Registration clerks, nurses spend precious time away from patients attending to huge piles of paperwork. This adds up an enormous financial burden inclusive for the storage of the medical records and wages for the administrative support staff. Miss-kept or missing medical records adds to the lost of precious time and can lead to unnecessary or duplicating of clinical tests. However, until recently, usage of information technology has increased and become prominent part of the healthcare industry. Many large hospitals and private hospitals have made the transition from old-school paper medical records to EHR, Electronic Health Record System. Early stages of an EHR System were base on a simple side but have advance tremendously. Now EHR System is Web-based which are accessible across networks and utilizing GUI, Graphics User Interface for interactivity. Web-based EHR are easy to use, have the capabilities to organize and link information, strong multimedia presentation capabilities, works on most hardware platform and operating system in the market; which communicate through the Internet and provide access to medical records using web browsers and web technologies. Jamie R. Steck(1998), Director of IT from the Central Utah Clinic stated that ââ¬Å"Efficiency has increased dramatically. We did an in-motion study in our records room, which showed that filing electronically is 80 percent more efficient than filing manually, and weââ¬â¢ve seen proof of that on a daily basis. Study shows that EHR is more efficient than the normal process of filing the paper-medical records. Health institution of many sizes faces many demands and challenges when making the transition from paper records to EHR. Healthcare institutions are working hard to reduce their reliance on handwritten records. EHR has improved patient care through greater and qui cker access to patient information thus reducing medical errors due to paper-records. It also significantly reduces test result and patient wait-times with a faster and more efficient workflow. It also reduces record-keeping time thus decreasing paperwork for administrative staff. EHR establish a better information and improved communications in a medical institution. It reduces the possibility of misplaced and lost records thus ensuring the patient record; test results are available when needed. It reduces cost on paper and supply. But just as much as its ancestor, EHR are subjected to privacy violations. Today, healthcares systems in developed countries are changing dramatically. These countries are looking into more inexpensive communication means using the internet to achieve a more efficient and high quality EHR. With the increase of health care system on information technology, we must also look into the increasing number of threats resulting from distribution and the implementations of the EHR System. Patients and doctors are aware of the security requirements base upon the system with the usage of communications over open and insecure network such as the internet. There are concerns over the privacy and security of electronic health information and they fall into two general categories: ââ¬Å" 1. concerns about inappropriate releases of information from individual organizations 2. oncerns about the systemic flows of information throughout the health care and related industriesâ⬠ââ¬â National Research Committee (1997, p. 54) The first category can result either from an authorized users who intentionally or unintentionally access or distributes information in violation of the institution policy or from hackers who break into a institutionââ¬â¢s computer system. The second categ ory refers to the open disclosure of patient health information to parties that may act against the interests of the patient or may also be alleged as invading a patientââ¬â¢s privacy. EHR stored at medical institution are vulnerable to internal or external threats. Internal threats includes authorized system users or medical personnel who abuse and misuses their privileges by accessing information for inappropriate reasons such as viewing their friends, neighbors, colleagues or to leak information to the press for spite, revenge, or profit. External threats or unauthorized access, which is related to the open architecture of Internet, sometimes by vindictive former employees, angry patients, network intruders, hackers or others may steal information, damage systems, or disrupt operations. Till today, there have been modest amounts of evidence to gauge the exposure of EHR to external attacks as there are still no tools for detecting attacks on EHR in the healthcare industry. In a case reported by Marbach, William D. (1983), so-called ââ¬Å"414â⬠group broke into a computer system at the National Cancer Institute in 1982, although no damages were reported. Study by the Federal Bureau of Investigation and the Computer Security Institute (CSI), CSI Director Patrice Rapalus(1996, p. 2) said, ââ¬Å"The information age has already arrived, but most organizations are woefully unprepared . . . making] it easier for perpetrators to steal, spy, or sabotage without being noticed and with little culpability if they are. â⬠Set of laws are being introduced for patient record privacy put strict demands on healthcare providers to protect patient information while using EHR while sharing the information with other patients. Six main factors are integrity, dependability, av ailability, confidentiality, authenticity and accountability. Patient records involves very sensitive data, which should only be disclosed to authorize users, thus confidentiality of the required data is essential. Integrity and availability of the services are also important. To accomplish the desire measure of information system security, a range of security policy models have been proposed and implemented in healthcare. One of the most widely use of security policy being adopted by medical institutions to protect patients information in a EHR System is the Role Based Access Control policy. Role Base Access Controls (RBAC) is the common policy being used in an ERH System. These include two basic types of access control mechanism that are used to protect data which are discretionary access control (DAC) and mandatory access controls (MAC). DAC is very supple hence it is not suitable for protection of health records. MAC on the other hand is stricter, allowing ample space for flexibility and it requires all users handling the records to follow a set of rules administered by the system admin. RBAC in EHR System should have the advantages of both DAC and MAC. With the RBAC approach, EHR System should adopt the roles and the authorization management in its system. In RBAC, it identifies which staffs in a medical institution are authorized to view a patient medical record. It restricted the data from being abuse or falling to the wrong hands. Each and every medical staff in a medical institution are assigned a specific role and operates the EHR System according to their role. Medical staffs are only allowed to view patientsââ¬â¢ record that they are allowed to access. Not all data are being revealed to the every role. G. Pangalos(1998) states that: ââ¬Å"EHR System identifies the following roles in its system: 1. Patients. They have access to their own health institution, personal and demographic data. 2. Physicians. Main Users of EHR System. Make diagnosis, admissions and treatment. Act on behalf of patients. 3. Doctors. Responsible for the laboratory tests and evaluation results. 4. Nurses. Responsible for providing daily care to patients. Donââ¬â¢t need to know any sensitive personal patient data. 5. Other Healthcare Professionals. Responsible to perform treatments for example psychiatric consultation. 6. Administration. Responsible for collection of the administrative, social, personal and non-personal demographic and insurance information about the patient. 7. Local authorities. Specifically Government bodies have access to health records for research or investigation purposes and any sensitive personal data will not be reveal. Department of Health and Human Services (1998), in the proposed rule for security and electronic standards, ââ¬Å".. each organization that uses communications or networks would be required to protect communications containing health information that are transmitted electronically over open networks so that they cannot be easily intercepted and interpreted by parties o ther than the intended recipient, and to protect their information systems from intruders trying to access systems through external communication pointsâ⬠. (vol 63, No 155) As of the statement above given by the Department of Health and Human Services, all information that are sent over the internet must only be accessed by authorized receiver. Todayââ¬â¢s technologies allow users to prove their authenticity and with data encryptions allow data to be transmitted safely over the medium. Data encryption should be at a satisfactory level of security to protect against intruders, thus data integrity have been compromised. User authentication must also be present with the encryption and data transmission process to ensure that the data sent are received by authorized receiver. Other than data encryption, a good firewall should also be implemented on the database server to avoid external intruders from accessing unauthorized data. Although these policies and counter measures are being implemented, unauthorized data leakages do still prevails. Medical records of celebrities and famous people are sought after by the media around world. This is due to the interest of people and money. So patient plays a part in protecting their own medical records. They have to put their trust in the medical institution where their records are being kept.
Thursday, January 9, 2020
An Unbiased View of Why Do You Want to Attend This University Essay Samples
An Unbiased View of Why Do You Want to Attend This University Essay Samples Why Do You Want to Attend This University Essay Samples - the Conspiracy To get to know teachers that let me through high school is truly likely to be tricky to leave behind. To start with, the chief reason why I feel students enrol in universities is to find the greater education. There is an assortment of explanations for why folks enter college or university. There are various reasons for people that attend college and university throughout worldwide. Second, that you'll be an excellent fit for the institution. Even when you're undecided on what major you want to study, you must decide on a particular school or college to apply to. Basically, the admissions folks wish to understand why their school is of specific interest to you. In years past a college education wasn't an important necessity to have a job. This section includes two examples of excellent college essays. Possessing an overall structure for all your essays is fine, but attempt to prevent playing the fill-in-the-blank game. Instead, tell the school why this bit of information is crucial, and the way you're benefit from it. What the In-Crowd Won't Tell You About Why Do You Want to Attend This University Essay Samples Today, the world has gotten more competitive and demanding. I knew that there'll be competition, but I also knew that I'll continue to be prosperous. You should have all pieces of the test under control before you demonstrate your skills in their e ntire entirety. Within this respect, it's important to lay emphasis on the simple fact that the scientific knowledge lays the foundation to the modern civilization and we can't reside in the modern world and keep illiterate and ignorant of the hottest scientific discoveries and technological developments. As an example, I am thinking of a major in history, and am quite interested in the mix of geographic and thematic regions of study provided by Duke's history program. University of Wisconsin is going to be a centre point of my future endeavors regarding success and relation with different individuals which I will get into contact with. Participating in such a massive study from begin to finish has validated my interest in academic research for a profession. Most individuals think this in order to be successful they should make a degree first. More commonly, they want to live in a suitable and comfortable house, drive an expensive car or work as a director etc.. Young individuals understand th is and are eager to prepare themselves as well as they can to make sure their place employed. They need not only work experience, but also a good education to be able to find a decent job. I still keep in touch with a few of the parents and students merely to observe how they're doing and all of them say something similar, I helped them stay on the most suitable path. But this isn't the fault of the writer. To summarize, there are several elements that may influence someone's decision to attend college, but the most essential one is the fear of not being successful. Have a veterinarian or professional friend explain to you how to find the quick. At the exact same time, I strongly appreciate the support from the portion of my family members. Thus, the perfect place to get ready for the actual world is college. The History of Why Do You Want to Attend This University Essay Samples Refuted I've had a strong support system which wouldn't allow me to give up and encouraged me to do what is suitable. BUN tests should be done a particular way. It won't be any different than every other blood test you've received. In this section of the test you'll be requested to demonstrate the practical qualities a nursing assistant must have. Colleges care about the quantities of acceptances deeply, so it could help to understand you're a sure thing. In this piece, I'll explain why colleges would like you to have the ability to explain why it is you're applying. Colleges and universities supply the ideal information and knowledge for those students to learn. The One Thing to Do for Why Do You Want to Attend This University Essay Samples It follows that you understand what makes them different from different schools. Mention by name certain classes, professors, clubs and activities that you're excited to be a component of. Colleges always want to understand why you're interested in attending their school.
Wednesday, January 1, 2020
Subscribe to:
Comments (Atom)