Academic literature on the topic 'Catalogs, Drug'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Catalogs, Drug.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Catalogs, Drug"

1

Makkonen, Katri. "Problems in Distribution of Scientific Knowledge: Intrauterine Contraceptive Devices and Drug Catalogs." International Journal of Health Services 23, no. 1 (1993): 173–83. http://dx.doi.org/10.2190/2fwa-1rry-vrcw-4pml.

Full text
Abstract:
Intrauterine contraceptive devices (IUDs) are a popular method of contraception worldwide. However, some serious problems have been associated with them. Finland has developed and now manufactures and exports IUDs. Therefore, drug control and the quality of drug information existing in Finland are significant for other countries, as well. This study analyzes the information in the Finnish commercial drug catalog on copper-releasing IUDs and compares it with the scientific literature, the instructions from the licensing authority, and material in its U.S. counterpart, during the last two decades. The results indicate that the distribution of scientific knowledge to the drug catalogs has often been slow. In the early 1980s Finnish manufacturers did not give any practical information on their products, and then and later the Finnish catalog was less comprehensive than the U.S. catalog. The variations in the control system in different nations were reflected in the contents of the Finnish catalog. For practitioners, drug catalogs are important sources of medical information. The results of this study demonstrate (1) that more attention should be paid to the contents of these catalogs, and (2) the continuous need for up-to-date, unbiased drug information.
APA, Harvard, Vancouver, ISO, and other styles
2

Winda, Syahdu Winda. "Formularium Nasional (FORNAS) dan e-Catalogue Obat Sebagai Upaya Pencegahan Korupsi dalam Tata Kelola Obat Jaminan Kesehatan Nasional (JKN)." INTEGRITAS 4, no. 2 (2018): 30. http://dx.doi.org/10.32697/integritas.v4i2.328.

Full text
Abstract:
In the National Health Insurance (JKN), drug governance have to implement quality control and cost control. The Government has published the National Formulary (FORNAS) as quality control and e-catalogue as price control. FORNAS and e-catalogue are expected to minimize corruption practices in drug prescription and drug procurement. Quality and cost effective drugs have been selected in FORNAS. Use of drug and restrictions are also regulated for each level of health facilities to avoid irrational using. FORNAS is expected to reduce corruption by eliminating bribery/gratification practices to doctors/hospitals by pharmaceutical companies. On the other hand, the corruption holes in the procurement are tried to be reduced through the e-catalogue system. A number of drugs needed have been tendered and negotiated by LKPP at the best price in e-catalogue. Health facilities can carry out drug procurement quickly and transparently without auction process. But in the process of applying FORNAS and e-catalogue as quality control, cost control and to minimize corruption, there are still problems that have not yet been able to reach their goals optimally. Mismatch number of drugs and item of drugs in FORNAS and e-catalogue, differences of drug lists in FORNAS with the Clinical Practice Guidelines (PPK), the absence of rules governing the minimum percentage of FORNAS in Hospital formularies, delays in drug display processes in e-catalogs and weaknesses in e-catalogue application is a series of problems that still hamper FORNAS and e-catalogue as solutions to prevent corruption in JKN drug governance. Relevant agencies (Ministry of Health and LKPP) need to make improvements in the form of regulations that encourage FORNAS compliance at each of the health facility level, fulfillment of FORNAS drug items in e-catalogue, availability of FORNAS in e-catalogue in early year and improvement of e-catalogue application features.
APA, Harvard, Vancouver, ISO, and other styles
3

Genetu Bayih, Abebe, Anjan Debnath, Edward Mitre, et al. "Susceptibility Testing of Medically Important Parasites." Clinical Microbiology Reviews 30, no. 3 (2017): 647–69. http://dx.doi.org/10.1128/cmr.00111-16.

Full text
Abstract:
SUMMARY In the last 2 decades, renewed attention to neglected tropical diseases (NTDs) has spurred the development of antiparasitic agents, especially in light of emerging drug resistance. The need for new drugs has required in vitro screening methods using parasite culture. Furthermore, clinical laboratories sought to correlate in vitro susceptibility methods with treatment outcomes, most notably with malaria. Parasites with their various life cycles present greater complexity than bacteria, for which standardized susceptibility methods exist. This review catalogs the state-of-the-art methodologies used to evaluate the effects of drugs on key human parasites from the point of view of drug discovery as well as the need for laboratory methods that correlate with clinical outcomes.
APA, Harvard, Vancouver, ISO, and other styles
4

Kalsum, Ummi. "Implementasi Pengadaan Obat Berdasarkan Permenkes RI Nomor 63 Tahun 2014 di Dinas Kesehatan Kabupaten Pelalawan Tahun 2018." Photon: Jurnal Sain dan Kesehatan 10, no. 1 (2019): 31–41. http://dx.doi.org/10.37859/jp.v10i1.1447.

Full text
Abstract:
In health, medicine saves lives and improves the quality of health. Access to medicines is a human right. Permenkes RI No. 63 of 2014 reads To ensure the availability of medicines work units in the health sector are responsible for medicine procurement. In the Dinkes Kabupaten Pelalawan in 2018, the realization of the DAK fund budget was 90.26%, the availability of drugs was 75.78% and 10 SPK had disbursement problems. Research Objectives To find out the problem and the implementation of drug procurement based on the Permenkes RI No. 63 of 2014 in the Dinkes Kabupaten Pelalawan in 2018. Qualitative and Descriptive Design. held from January to July 2019 with 5 informants. The result is lack of human resources, lack of policy socialization, lack of infrastructure. Implementation of Medicine Procurement is carried out based on the Permenkes RI No. 63 of 2014. Obstacles from providers such as lacking or slow response, drug items available in e-catalogs are inadequate, there is a time limit of absorption, the drug cannot be distributed due to stock vacancy, changes in composition, and drugs that are nearing expired.
APA, Harvard, Vancouver, ISO, and other styles
5

Abraham, Milata M., Ryan E. Denton, Richard W. Harper, William L. Scott, Martin J. O'Donnell, and Jacob D. Durrant. "Documenting and harnessing the biological potential of molecules in Distributed Drug Discovery (D3) virtual catalogs." Chemical Biology & Drug Design 90, no. 5 (2017): 909–18. http://dx.doi.org/10.1111/cbdd.13012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nelson, Matthew R., Daniel Wegmann, Margaret G. Ehm, et al. "An Abundance of Rare Functional Variants in 202 Drug Target Genes Sequenced in 14,002 People." Science 337, no. 6090 (2012): 100–104. http://dx.doi.org/10.1126/science.1217876.

Full text
Abstract:
Rare genetic variants contribute to complex disease risk; however, the abundance of rare variants in human populations remains unknown. We explored this spectrum of variation by sequencing 202 genes encoding drug targets in 14,002 individuals. We find rare variants are abundant (1 every 17 bases) and geographically localized, so that even with large sample sizes, rare variant catalogs will be largely incomplete. We used the observed patterns of variation to estimate population growth parameters, the proportion of variants in a given frequency class that are putatively deleterious, and mutation rates for each gene. We conclude that because of rapid population growth and weak purifying selection, human populations harbor an abundance of rare variants, many of which are deleterious and have relevance to understanding disease risk.
APA, Harvard, Vancouver, ISO, and other styles
7

Maryani, Herti, Lusi Kristiana, Pramita Andarwati, Astridya Paramita, and Ira Ummu Aimanah. "Pengelolaan Obat Dengan E-Purchasing Untuk Pasien Program Rujuk Balik Di Fasilitas Kesehatan Tingkat Pertama." Buletin Penelitian Sistem Kesehatan 22, no. 2 (2019): 99–105. http://dx.doi.org/10.22435/hsr.v22i2.1398.

Full text
Abstract:

 PRB is a health service provided to people with chronic diseases. The implementation of PRB has been runningsince 2014, but until now it is still not optimal, one of which is the procurement and availability of medicines. The aim of the study was to study drug management for PRB patients. The research was conducted in Surabaya 2018. This is descriptive research with cross-sectional design. Data collection by in-depth interviews with pharmacy department managers in two FKTP units and pharmacies in Surabaya. Data were analyzed descriptively. The results of the study show that FKTP doesn’t buy medicine with e-purchasing, because the drug is given by the pharmacy according to the BPJS mapping list. The pharmacy has many obstacles to ordering drugs with e-purchase, so the order is done conventionally. The pharmacy orders drugs in several ways using the Order Letter, calling PBF and ordering via the WhatsApp (WA) application. The Guidelines for Procurement of Medicines with E-Purchasing Procedures Based on E-Catalogs already exist, but socialization must continue to be carried out, especially at the level of Puskesmas and pharmacies. Periodic evaluations must be carried out so that problems and defi ciencies that occur in the fi eld can be immediately resolved.Cooperation and good intentions are needed between various parties so that all involved can benefi t from this program, especially PRB patients.
 Abstrak
 Program Rujuk Balik (PRB) adalah pelayanan kesehatan yang diberikan kepada penderita penyakit kronis. PRBsudah berjalan sejak tahun 2014, namun masih belum optimal, salah satunya perihal pengelolaan obat. Tujuan penelitian adalah mengkaji pengelolaan obat untuk pasien PRB. Penelitian dilakukan di Surabaya tahun 2018. Jenis penelitian adalah deskriptif dengan desain potong lintang. Pengumpulan data dilakukan dengan wawancara mendalam kepada pengelola bagian farmasi di 2 unit Puskesmas dan 2 Apotek di Surabaya. Data dianalisis secara deskriptif. Hasil penelitian menunjukkan bahwa Puskesmas tidak melakukan pengadaan obat secara e-purchasing, karena obat diberikan oleh apotek sesuai daftar mapping BPJS. Apotek mempunyai banyak kendala dalam melakukan pemesanan obat dengan e-purchase, sehingga pemesanan dilakukan secara konvensional. Apotek melakukan pemesanan obat dengan beberapa cara yaitu menggunakan Surat Pemesanan (SP), menelpon PBF (Perusahaan Besar Farmasi) dan melalui aplikasi WhatsApp (WA).Petunjuk pelaksanaan pengadaan obat dengan prosedur E-Purchasing, berdasarkan E-Catalogue, sudah ada namun sosialisasi harus terus dilakukan terutama di tingkat Puskesmas dan apotek. Evaluasi berkala harus dilakukan agar permasalahan dan kekurangan yang terjadi di lapangan dapat segera diselesaikan. Perlunya kerja sama dan komitmen antar berbagai pihak sehingga semua yang terlibat dapat merasakan manfaat akan program ini, terutama pasien PRB.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Anran, Bethany K. Okada, Paul C. Rosen, and Mohammad R. Seyedsayamdost. "Piperacillin triggers virulence factor biosynthesis via the oxidative stress response in Burkholderia thailandensis." Proceedings of the National Academy of Sciences 118, no. 26 (2021): e2021483118. http://dx.doi.org/10.1073/pnas.2021483118.

Full text
Abstract:
Natural products have been an important source of therapeutic agents and chemical tools. The recent realization that many natural product biosynthetic genes are silent or sparingly expressed during standard laboratory growth has prompted efforts to investigate their regulation and develop methods to induce their expression. Because it is difficult to intuit signals that induce a given biosynthetic locus, we recently implemented a forward chemical-genetic approach to identify such inducers. In the current work, we applied this approach to nine silent biosynthetic loci in the model bacterium Burkholderia thailandensis to systematically screen for elicitors from a library of Food and Drug Administration–approved drugs. We find that β-lactams, fluoroquinolones, antifungals, and, surprisingly, calcimimetics, phenothiazine antipsychotics, and polyaromatic antidepressants are the most effective global inducers of biosynthetic genes. Investigations into the mechanism of stimulation of the silent virulence factor malleicyprol by the β-lactam piperacillin allowed us to elucidate the underlying regulatory circuits. Low-dose piperacillin causes oxidative stress, thereby inducing redox-sensing transcriptional regulators, which activate malR, a pathway-specific positive regulator of the malleicyprol gene cluster. Malleicyprol is thus part of the OxyR and SoxR regulons in B. thailandensis, allowing the bacterium to initiate virulence in response to oxidative stress. Our work catalogs a diverse array of elicitors and a previously unknown regulatory input for secondary metabolism in B. thailandensis.
APA, Harvard, Vancouver, ISO, and other styles
9

Liyanage, S. Imindu, Prachi Vilekar, and Donald F. Weaver. "Nutrients in Alzheimer’s Disease: The Interaction of Diet, Drugs and Disease." Canadian Journal of Neurological Sciences / Journal Canadien des Sciences Neurologiques 46, no. 1 (2019): 23–34. http://dx.doi.org/10.1017/cjn.2018.353.

Full text
Abstract:
AbstractIn recent decades, clinical trials in Alzheimer’s disease (AD) have failed at an unprecedented rate. The etiology of AD has since come under renewed scrutiny, both to elucidate the underlying pathologies and to identify novel therapeutic strategies. Here, diet has emerged as a potential causative/protective agent. A variety of nutrients, including lipids, minerals, vitamins, antioxidants and sugars as well as broader dietary patterns and microbiotal interactions have demonstrated associations with AD. Although clinical trials have yet to definitively implicate any singular dietary element as therapeutic or causative, it is apparent that dietary preferences, likely in complex synergies, may influence the risk, onset and course of AD. This review catalogs the impact of major dietary elements on AD. It further examines an unexplored reciprocal association where AD may modulate diet, as well as how potential therapeutics may complicate these interactions. In doing so, we observe diet may have profound effects on the outcome of a clinical trial, either as a confounder of a drug/disease interaction or as a generally disruptive covariate. We therefore conclude that future clinical trials in AD should endeavor to control for diet, either in study design or subsequent analyses.
APA, Harvard, Vancouver, ISO, and other styles
10

Anggriani, Yusi, Prih Sarnianto, Siti Aisyah, and Jenny Pontoan. "Trend Price Analysis of Drug Before and After the Implementation of E-catalogue at the Hospital." JURNAL MANAJEMEN DAN PELAYANAN FARMASI (Journal of Management and Pharmacy Practice) 9, no. 1 (2019): 1. http://dx.doi.org/10.22146/jmpf.44496.

Full text
Abstract:
In 2013, Ministry of Health, Republic of Indonesia, launched a new change to drug procurement system, namely e-catalogue, to ensure the availability and affordability of medicines. This system replaces the previous auction drug procurement system. The purpose of the change into e-catalogue system is to facilitate the drug procurement in hospitals without the need to conduct complex negotiation with producers, to reduce the occurrence of mark-ups or inflating drug prices, to equalize drug prices, to support BPJS (Badan Penyelenggara Jaminan Sosial) activities, and to prevent difficulties in drug distribution in all regions in Indonesia. This study aims to get an overview and magnitude of the impact of e-catalogue application on changes in the price of drugs registered and not registered in e-catalogue at Jakarta Islamic Hospital Cempaka Putih. This research is a longitudinal time series study. The data collection was conducted retrospectively in the period of 2011-2015 taken from procurement data, purchase invoices, and e-catalogue prices from hospital pharmacy installation, which were then categorized based on similar drugs in the hospital. The result shows a decrease in the price of drugs on both e-catalogue drugs (generic, trade names and patents) and non e-catalogue drugs (generic, trade names). On the class of therapy, the biggest price reduction occurred in e-catalogue medicine, such as in antineoplastics, intravenous solution, diabetes, Anti-ashma & COPD, and psycholeptics therapy. Meanwhile, on the category of non e-catalogue, price reduction occurred in systemic antibacterials, antineoplastics, analgesics, cardiac theraphy, and A-acis A-flat A Ulcerants therapy. The magnitude of drug prices reduction ranges from 1% to more than 90% both on e-catalogue drugs and non e-catalogue drugs. On the e-catalogue drugs, the highest price reduction (82.36%) occurred in generic and patent drugs, while on non e-catalogue drugs, reduction occurred in drugs with trade names. The price reduction trend in drug prices based on both type of drugs and therapy class shows a significant decrease in drug prices in the period after the implementation of e-catalogue at Jakarta Islamic Hospital in Cempaka Putih, with a decrease of more than 80%.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Catalogs, Drug"

1

Sperandio, Olivier. "Applications et développements informatiques de protocoles de drug design et criblage virtuel." Paris 5, 2007. http://www.theses.fr/2007PA05P612.

Full text
Abstract:
Cette thèse de chemoinformatique et bioinformatique structurale s’inscrit dans l’optimisation du processus d’identification de molécules à visée thérapeutique. Elle cible les trois composantes du criblage virtuel de composés chimiques : la préparation d’une version informatique de la chimiothèque ; l’identification de nouveaux composés par similarité avec des ligands actifs (LBVS) ; et l’identification de nouveaux composés actifs à partir de la structure 3D de la cible (SBVS). Ces travaux ont consisté à : créer un programme (MED-3DMC) de génération d’ensembles de conformères 3D de petites molécules; créer un programme LBVS (MED-SuMoLig) qui permet, à partir d’un ligand actif, de cribler une chimiothèque de plusieurs milliers de composés sur la base de leur profil pharmaco-topologique; et enfin appliquer des protocoles de criblage virtuel SBVS hiérarchique afin d’identifier des inhibiteurs d’interaction protéine-membrane avec le facteur Va de la coagulation comme preuve du concept<br>This thesis in structural bioinformatics and chemoinformatics concentrates on the optimization of the therapeutics compounds identification process. It relies on the three main components of the chemical compounds virtual screening: preparation of a computational version of the chemical library to be screened; identification of novel active compounds using chemical similarity with respect to known active molecules (LBVS); and identification of novel active compounds using the 3D structure of the target binding site (SBVS). This work implied: to develop a computer program (MED-3DMC) that generates conformation ensembles of small molecules ; then to create a LBVS program (MED-SuMoLig) that can screen thousands of chemical compounds using their pharmaco-topological profile; and finally to use a hierarchical SBVS procedure to identify novel inhibitors for protein-membrane interaction using the coagulation factor Va as a proof of concept
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Catalogs, Drug"

1

Billups, Shirley M., and Norman F. Billups. American drug index 2011. 5th ed. Wolters Kluwer Health/Facts & Comparisons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Billups, Shirley M., and Norman Frederick Billups. American drug index 2013. 5th ed. Wolters Kluwer Health/Facts & Comparisons, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Dept. of Veterans Affairs, ed. Pharmacy service drug list. Richard L. Roudebush VA Medical Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Richard L. Roudebush Medical Center. Pharmacy service drug list. Richard L. Roudebush VA Medical Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

F, Muller Niels, Dessing Rudolf P, and European Society of Clinical Pharmacy., eds. European drug index. 4th ed. Deutscher Apotheker Verlag, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sittig, Marshall. Drug companies & products world guide. Sittig & Noyes, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sittig, Marshall. Drug companies & products world guide. Sittig & Noyes, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Silverman, Harold M. The pill book. 6th ed. Bantam Books, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sackett, Richard W. Films from the National Institute on Drug Abuse free-loan collection. U.S. Dept. of Health and Human Services, Public Health Service, Alcohol, Drug Abuse, and Mental Health Administration, National Institute on Drug Abuse, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sackett, Richard W. Films from the National Institute on Drug Abuse free-loan collection. U.S. Dept. of Health and Human Services, Public Health Service, Alcohol, Drug Abuse, and Mental Health Administration, National Institute on Drug Abuse, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Catalogs, Drug"

1

Brennan, Matt. "Studious drummers, selling drum outfits, standardization, and stardom." In Kick It. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190683863.003.0004.

Full text
Abstract:
Literacy, education, and standardization were key steps forward in consolidating the drum kit’s legitimacy in the 1930s. This chapter examines the biographies of many early drummers and how they learnt to play the drum kit. Arguments over how to play the drum kit were inseparable from the changing form of the drum kit itself, as manufacturers like Ludwig, Slingerland, Leedy, and Gretsch competed to sell standardized, pre-bundled drum kits in their catalogues rather than the hodge-podge, self-assembled drum kits of the past. This chapter discusses the creation of an international market for drum kits through a combination of instrument innovation, education, and old-fashioned hucksterism. Drum manufacturers created their own newsletters as a way of convincing drummers to buy their product. The chapter also examines the career of swing era drummer Gene Krupa, comparing him with African-American drummer Chick Webb, an influential but less well known drumming bandleader.
APA, Harvard, Vancouver, ISO, and other styles
2

"“Girlie Man, Manly Girl, It’s all the Same to me”." In The Comics of Alison Bechdel, edited by Anne N. Thalheimer. University Press of Mississippi, 2019. http://dx.doi.org/10.14325/mississippi/9781496825773.003.0003.

Full text
Abstract:
First published in 1983 in Womanews, and later widely syndicated, Alison Bechdel’s Dykes To Watch Out For (DTWOF) series not only created an unparalleled historical archive of queer culture, it also shaped both the lesbian comix and queer comics that came after it in remarkable ways. Through her use of a wide range of characters having pointed conversations about then-current events and politics, debating identity, desire, and shifting representation, or simply going out to dinner at Café Topaz, the local vegetarian restaurant, Bechdel catalogues a life history of these lesbians and their community—even as that community shifts in unanticipated ways, as our understanding of binary gender shifts and continues to do so today. For a strip that initially included no men, DWTOF ended up including a number of male characters in order to explore what “male” meant through drag king culture, non-binary characters, and characters who identify as transgender.
APA, Harvard, Vancouver, ISO, and other styles
3

Dulhare, Uma N., and Shaik Rasool. "Digital Evidence in Practice." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch008.

Full text
Abstract:
Advanced Evidence is any data of probative quality that is either put away or transmitted in a double frame. In today's universe of propelling advances, more data is being produced, put away and appropriated by electronic means. This requires numerous offices to build the utilization of advanced proof social affair as a regular or standard instrument in their fight against violations. Computerized proof can be helpful in an extensive variety of criminal examinations. Numerous computerized gadgets productively track client action; it is likewise conceivable to recoup erased records, both of which may influence a criminal examination. Data is similar to the backbone for associations of all sizes, sorts and industry areas. It should be overseen and secured, and when there is a break or wrongdoing conferred including spilled or stolen data, the culprits must be recognized and indicted. Expanded Internet entrance has given exponential ascent in refined assaults on Information Technology framework. Keeping in mind the end goal to make our IT framework versatile against the dangers, there is a requirement for Cyber Security. Digital criminology, likewise called PC legal sciences or advanced legal sciences, is the procedure of extricating data and information from PCs to serve as computerized proof - for common purposes or, by and large, to demonstrate and lawfully indict cybercrime. PC crime scene investigation has as of late increased noteworthy Popularity with numerous nearby law authorization organizations. It is at present utilized in extortion, robbery, drug authorization and each other implementation action. Law implementation organizations confront another test in managing digital wrongdoings. Criminal acts are being perpetrated and the confirmation of these exercises is recorded in electronic structure. Also, wrongdoings are being dedicated in the internet. Proof in these violations is quite often recorded in computerized design. It is critical that PC security experts know about a percentage of the necessities of the lawful framework and comprehends the creating field of PC legal sciences. It will clarify why Digital Evidence is a vital part of any crime scene investigation examination and why strict approaches and methodology must exist to manage the administration of confirmation. Digital examination conventions offer specialists some assistance with gathering computerized proof in a forensically substantial manner. Computerized proof is “information that is made, controlled, put away or conveyed by any gadget, PC or PC framework or transmitted over a correspondence framework that is significant to the procedure.” The section will give a brief of how Digital confirmation starts from a large number of sources including seized PC hard-drives and reinforcement media, ongoing email messages, talk room logs, ISP records, site pages, advanced system activity, nearby and virtual databases, computerized catalogs, remote gadgets, memory cards, and computerized cameras. The advanced confirmation is not virtual exist, but rather there are some different components to search for, the computerized proof can be duplicated with boundless contrasts, can be altered effortlessly, difficult to be distinguished the first asset, can be incorporated information check, and can't be seen straightforwardly without specialized procedure. The trust value of this computerized information is a basic question that advanced scientific analysts must consider. For this reason, part “advanced proof” partitioned into seven classifications. This part gives the learning important to handle advanced confirmation in its numerous structures, to utilize this proof to construct a case, to manage the difficulties connected with this kind of confirmation and ways to deal with taking care of computerized proof put away and transmitted utilizing systems as a part of a way that is well on the way to be acknowledged by law. The section presents the procedure of distinguishing, saving, examining and displaying computerized proof in a way that is legitimately satisfactory. It will clarify why Digital Evidence is an imperative part of any crime scene investigation examination and why strict arrangements and techniques must exist to manage the administration of proof. The section will give a brief of how Digital confirmation starts from a huge number of sources including seized PC hard-drives. Further the part will contain order of computerized confirmations where Digital proof can be grouped, looked at, and individualized in a few ways. One of those courses is by the substance of the confirmation. The later Section in the part will contain how the advanced proofs are gathered, what techniques and apparatuses can be utilized to safeguard the computerized confirmations.
APA, Harvard, Vancouver, ISO, and other styles
4

Dulhare, Uma N., and Shaik Rasool. "Digital Evidence in Practice." In Cyber Warfare and Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch001.

Full text
Abstract:
Advanced Evidence is any data of probative quality that is either put away or transmitted in a double frame. In today's universe of propelling advances, more data is being produced, put away and appropriated by electronic means. This requires numerous offices to build the utilization of advanced proof social affair as a regular or standard instrument in their fight against violations. Computerized proof can be helpful in an extensive variety of criminal examinations. Numerous computerized gadgets productively track client action; it is likewise conceivable to recoup erased records, both of which may influence a criminal examination. Data is similar to the backbone for associations of all sizes, sorts and industry areas. It should be overseen and secured, and when there is a break or wrongdoing conferred including spilled or stolen data, the culprits must be recognized and indicted. Expanded Internet entrance has given exponential ascent in refined assaults on Information Technology framework. Keeping in mind the end goal to make our IT framework versatile against the dangers, there is a requirement for Cyber Security. Digital criminology, likewise called PC legal sciences or advanced legal sciences, is the procedure of extricating data and information from PCs to serve as computerized proof - for common purposes or, by and large, to demonstrate and lawfully indict cybercrime. PC crime scene investigation has as of late increased noteworthy Popularity with numerous nearby law authorization organizations. It is at present utilized in extortion, robbery, drug authorization and each other implementation action. Law implementation organizations confront another test in managing digital wrongdoings. Criminal acts are being perpetrated and the confirmation of these exercises is recorded in electronic structure. Also, wrongdoings are being dedicated in the internet. Proof in these violations is quite often recorded in computerized design. It is critical that PC security experts know about a percentage of the necessities of the lawful framework and comprehends the creating field of PC legal sciences. It will clarify why Digital Evidence is a vital part of any crime scene investigation examination and why strict approaches and methodology must exist to manage the administration of confirmation. Digital examination conventions offer specialists some assistance with gathering computerized proof in a forensically substantial manner. Computerized proof is “information that is made, controlled, put away or conveyed by any gadget, PC or PC framework or transmitted over a correspondence framework that is significant to the procedure.” The section will give a brief of how Digital confirmation starts from a large number of sources including seized PC hard-drives and reinforcement media, ongoing email messages, talk room logs, ISP records, site pages, advanced system activity, nearby and virtual databases, computerized catalogs, remote gadgets, memory cards, and computerized cameras. The advanced confirmation is not virtual exist, but rather there are some different components to search for, the computerized proof can be duplicated with boundless contrasts, can be altered effortlessly, difficult to be distinguished the first asset, can be incorporated information check, and can't be seen straightforwardly without specialized procedure. The trust value of this computerized information is a basic question that advanced scientific analysts must consider. For this reason, part “advanced proof” partitioned into seven classifications. This part gives the learning important to handle advanced confirmation in its numerous structures, to utilize this proof to construct a case, to manage the difficulties connected with this kind of confirmation and ways to deal with taking care of computerized proof put away and transmitted utilizing systems as a part of a way that is well on the way to be acknowledged by law. The section presents the procedure of distinguishing, saving, examining and displaying computerized proof in a way that is legitimately satisfactory. It will clarify why Digital Evidence is an imperative part of any crime scene investigation examination and why strict arrangements and techniques must exist to manage the administration of proof. The section will give a brief of how Digital confirmation starts from a huge number of sources including seized PC hard-drives. Further the part will contain order of computerized confirmations where Digital proof can be grouped, looked at, and individualized in a few ways. One of those courses is by the substance of the confirmation. The later Section in the part will contain how the advanced proofs are gathered, what techniques and apparatuses can be utilized to safeguard the computerized confirmations.
APA, Harvard, Vancouver, ISO, and other styles
5

Dulhare, Uma N., and Shaik Rasool. "Digital Evidence in Practice." In Digital Forensics and Forensic Investigations. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3025-2.ch018.

Full text
Abstract:
Advanced Evidence is any data of probative quality that is either put away or transmitted in a double frame. In today's universe of propelling advances, more data is being produced, put away and appropriated by electronic means. This requires numerous offices to build the utilization of advanced proof social affair as a regular or standard instrument in their fight against violations. Computerized proof can be helpful in an extensive variety of criminal examinations. Numerous computerized gadgets productively track client action; it is likewise conceivable to recoup erased records, both of which may influence a criminal examination. Data is similar to the backbone for associations of all sizes, sorts and industry areas. It should be overseen and secured, and when there is a break or wrongdoing conferred including spilled or stolen data, the culprits must be recognized and indicted. Expanded Internet entrance has given exponential ascent in refined assaults on Information Technology framework. Keeping in mind the end goal to make our IT framework versatile against the dangers, there is a requirement for Cyber Security. Digital criminology, likewise called PC legal sciences or advanced legal sciences, is the procedure of extricating data and information from PCs to serve as computerized proof - for common purposes or, by and large, to demonstrate and lawfully indict cybercrime. PC crime scene investigation has as of late increased noteworthy Popularity with numerous nearby law authorization organizations. It is at present utilized in extortion, robbery, drug authorization and each other implementation action. Law implementation organizations confront another test in managing digital wrongdoings. Criminal acts are being perpetrated and the confirmation of these exercises is recorded in electronic structure. Also, wrongdoings are being dedicated in the internet. Proof in these violations is quite often recorded in computerized design. It is critical that PC security experts know about a percentage of the necessities of the lawful framework and comprehends the creating field of PC legal sciences. It will clarify why Digital Evidence is a vital part of any crime scene investigation examination and why strict approaches and methodology must exist to manage the administration of confirmation. Digital examination conventions offer specialists some assistance with gathering computerized proof in a forensically substantial manner. Computerized proof is “information that is made, controlled, put away or conveyed by any gadget, PC or PC framework or transmitted over a correspondence framework that is significant to the procedure.” The section will give a brief of how Digital confirmation starts from a large number of sources including seized PC hard-drives and reinforcement media, ongoing email messages, talk room logs, ISP records, site pages, advanced system activity, nearby and virtual databases, computerized catalogs, remote gadgets, memory cards, and computerized cameras. The advanced confirmation is not virtual exist, but rather there are some different components to search for, the computerized proof can be duplicated with boundless contrasts, can be altered effortlessly, difficult to be distinguished the first asset, can be incorporated information check, and can't be seen straightforwardly without specialized procedure. The trust value of this computerized information is a basic question that advanced scientific analysts must consider. For this reason, part “advanced proof” partitioned into seven classifications. This part gives the learning important to handle advanced confirmation in its numerous structures, to utilize this proof to construct a case, to manage the difficulties connected with this kind of confirmation and ways to deal with taking care of computerized proof put away and transmitted utilizing systems as a part of a way that is well on the way to be acknowledged by law. The section presents the procedure of distinguishing, saving, examining and displaying computerized proof in a way that is legitimately satisfactory. It will clarify why Digital Evidence is an imperative part of any crime scene investigation examination and why strict arrangements and techniques must exist to manage the administration of proof. The section will give a brief of how Digital confirmation starts from a huge number of sources including seized PC hard-drives. Further the part will contain order of computerized confirmations where Digital proof can be grouped, looked at, and individualized in a few ways. One of those courses is by the substance of the confirmation. The later Section in the part will contain how the advanced proofs are gathered, what techniques and apparatuses can be utilized to safeguard the computerized confirmations.
APA, Harvard, Vancouver, ISO, and other styles
6

Glasgow, Janice, and Evan Steeg. "Motif Discovery in Protein Structure Databases." In Pattern Discovery in Biomolecular Data. Oxford University Press, 1999. http://dx.doi.org/10.1093/oso/9780195119404.003.0011.

Full text
Abstract:
The field of knowledge discovery is concerned with the theory and processes involved in the representation and extraction of patterns or motifs from large databases. Discovered patterns can be used to group data into meaningful classes, to summarize data, or to reveal deviant entries. Motifs stored in a database can be brought to bear on difficult instances of structure prediction or determination from X-ray crystallography or nuclear magnetic resonance (NMR) experiments. Automated discovery techniques are central to understanding and analyzing the rapidly expanding repositories of protein sequence and structure data. This chapter deals with the discovery of protein structure motifs. A motif is an abstraction over a set of recurring patterns observed in a dataset; it captures the essential features shared by a set of similar or related objects. In many domains, such as computer vision and speech recognition, there exist special regularities that permit such motif abstraction. In the protein science domain, the regularities derive from evolutionary and biophysical constraints on amino acid sequences and structures. The identification of a known pattern in a new protein sequence or structure permits the immediate retrieval and application of knowledge obtained from the analysis of other proteins. The discovery and manipulation of motifs—in DNA, RNA, and protein sequences and structures—is thus an important component of computational molecular biology and genome informatics. In particular, identifying protein structure classifications at varying levels of abstraction allows us to organize and increase our understanding of the rapidly growing protein structure datasets. Discovered motifs are also useful for improving the efficiency and effectiveness of X-ray crystallographic studies of proteins, for drug design, for understanding protein evolution, and ultimately for predicting the structure of proteins from sequence data. Motifs may be designed by hand, based on expert knowledge. For example, the Chou-Fasman protein secondary structure prediction program (Chou and Fasman, 1978), which dominated the field for many years, depended on the recognition of predefined, user-encoded sequence motifs for α-helices and β-sheets. Several hundred sequence motifs have been cataloged in PROSITE (Bairoch, 1992); the identification of one of these motifs in a novel protein often allows for immediate function interpretation.
APA, Harvard, Vancouver, ISO, and other styles
7

Beinart, William, and Lotte Hughes. "Forests and Forestry in India." In Environment and Empire. Oxford University Press, 2007. http://dx.doi.org/10.1093/oso/9780199260317.003.0012.

Full text
Abstract:
The ‘riches’ of provincial India that were shown at the Punjab Exhibition of 1864 were later described in two hefty volumes by B. H. Baden-Powell of the Bengal Civil Service as the Hand-Book of the Economic Products of the Punjab. It began simply as a catalogue of all the items exhibited, but mushroomed into something more. Timber and other forest products featured alongside minerals, metals, manufacturing dyes, pottery, salt, and soils. A section was devoted to animal products such as lac (later used to make gramophone records), silk, musk, and wool; opium and 2,038 other drugs were listed, as well as the economic crops tea, cotton, flax, spices, grains, and pulses. Baden-Powell savoured the size, colour, and quality of each specimen, interspersed with grand descriptions of the countryside from which they came. But it was their uses, primarily to empire, and also to local communities, which distinguished these specimens. ‘A collection properly grouped together’, Baden-Powell wrote in the introduction, ‘becomes to the intelligent spectator a perfect history of the social condition of the country it represents’. More particularly, this provided a shopping list of tradable resources and their uses—a detailed breakdown of the natural wealth of India, about which many classical writers had enthused. Indigenous hardwoods were prime riches in this treasure trove; essential to the British army, navy, and railways, they became cogs in the conquest of India. The new demands inevitably led to deforestation. This chapter explores the debates over exploitation of India’s forests, and focuses more specifically on the rise of conservationist concerns, in which forestry played a major role. By conservation, we mean a set of ideas and practices that aimed at efficient and regulated usage of natural resources, so that they would be maintained in the longer term. We also consider forests as contested spaces, and the implications of their reservation for access to resources—in particular by local people. We have touched on conservationist views in respect of wildlife (Chapters 4 and 5) but it is important to examine forestry since it had such a major impact upon peoples and landscapes over time, it was a precursor to other forms of scientific environmental management, and the ideas and practices developed in India were exported to other parts of the Empire.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography