Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Evidence-based report on Polio contracted
Evidence-based report on Polio contracted
Evidence-based report on Polio contracted
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Evidence-based report on Polio contracted
Polio Virus
Introduction
The polio virus which causes poliomyelitis in humans is an enterovirus which belongs to the picornavirus (small, RNA) family. Polio virus is rapid, acid-resistant, stable, highly tissue specific and consists of a single-stranded, positive RNA. Polio virus is able to reside in the throat or intestinal tract of humans. Poliomyelitis is a highly contagious infectious disease which has three strains, poliovirus 1 (PV1), PV2 and PV3. Polio virus, although rare in developed countries, can be found in many under-developed countries due to the uncommonness of vaccinations there. Polio is known as a disease of development. The oldest known record of polio is in an Egyptian stone engraving of a young priest from 1350 B.C. with a withered leg, characteristic of a polio survivor. Loeffler and Frosch were the first individuals to see polio in 1898. The largest US epidemic was in 1916 in New York City.
Encounter and Entry
The polio virus affects humans by the fecal-oral route. A given individual ingests water or food contaminated with polio virus, the virus infects the individual, the individual passes the virus in their feces, the virus is in the sewage which enters a watershed where another individual ingests the water and consequently the virus. Polio virus can also spread by person-to-person contact, especially in young children. After entering the host, polio virus travels down the digestive tract to the small intestine where it replicates itself in the B-cells and T-cells of the gut mucosa lining the intestine.
Spread and Replication
Poliovirus binds to a specific cell surface protein, polio virus receptor (PVR). This protein is an immunoglobin which contains three loops, Ig domains. Polio binds...
... middle of paper ...
...the polio vaccinations contaminated with SV40 and its link to cancer.
Resources
Flint, S., Enquist, L., Krug, R., Racaniello, V., Skalka, A. (Eds). 2000. Principles of
Virology: Molecular Biology, Pathogenesis, and Control. Washington, D.C.:ASM Press.
http://cumicro2.cpmc.columbia.edu/PICO/Chapters/Cellular.html
http://cumicro2.cpmc.columbia.edu/PICO/Chapters/Pathogenesis.html
http://cumicro2.cpmc.columbia.edu/PICO/Chapters/Epidemiology.html
http://www.path.ox.ac.uk/dg/vdisease.html
http://www.upnaway.com.au/poliowa/Polio%20old%20enemy.html
http://www.molbio.princeton.edu/courses/mb427/2000/projects/0010/Polio.html
http://www.cdc.gov/nip/vacsafe/concerns/cancer/sv40-polio-cancer-facts.htm
Schaechter, M., Engleberg, N., Eisenstein, B., Medoff, G. (Eds). 1999. Mechanisms of
Microbial Diseases. Baltimore: Lippincott Williams & Wilkins.
Polio, formerly known as poliomyelitis, an infectious viral disease that affects the central nervous system and can cause temporary or permanent paralysis. A debilitating disease that was once the affliction of our very own republic. David Oshinsky’s Polio: An American Story chronicles polio’s progression in the United States, a feat it does quite well throughout the course of the novel.
...Evaluation and comparison of Hela, Hep2C and Vero cell lines sensitivity to polio vaccinal virus using micro and macro vaccine potency tests. Retrieved February 3, 2014, from http://www.archrazi.com/browse.php?a_id=319&sid=1&slc_lang=en
In “Youthful Indiscretions: Should Colleges Protect Social Network Users from Themselves and Others?” Dana Fleming presents an essay concerning the safety of social networking sites and how Universities can deal and prevent problems. This article is targeted towards school administrators, faculty, and a social networking user audience who will either agree or disagree with her statement. I believe Fleming presents an excellent, substantial case for why she reasons the way she does. Fleming gives a sound, logical argument according to Toulmin’s Schema. This essay has an evident enthymeme, which has a claim and reasons why she believes in that way. Toulmin refers to this as “grounds."
In an article written in the New England Journal of Higher Education, 2008 issue, by Dana Fleming, “Youthful Indiscretions: Should Colleges Protect Social Network Users from Themselves and Others?” Fleming poses the question of responsibility in monitoring students’ online social networking activities. Fleming’s purpose is to impress upon the readers the need for education institutions to state the guidelines and rules governing social networking, and “to treat them like any other university activity, subject to the school’s code of conduct and applicable state and federal laws” (443). She creates a dramatic tone in order to convey to her readers the idea that social networking can be sinister and their effects inescapable. Dana L. Fleming is a Boston area attorney who specializes in higher education law, with the mission of the New England Journal of Higher Education to engage and assist leaders in the assessment, development, and implementation of sound education practices and policies of regional significance. However, while Dana Fleming emphasizes the horror stories of social networking, she scatters her thoughts throughout this article springing from one idea to attempting to persuade her intended audience then juxtaposed stories about minors being hurt by poor social networking decisions contrasting the topic suggested in her title.
Polio: An American Story describes a struggle to find a vaccine on polio through several researchers’ lives, and over the course of many years. The second thesis is the struggle between Salk and Sabin, two bitter rivals who had their own vaccine that they believed would cure polio. The author David M. Oshinsky, is describing how difficult it was to find the cure to a horrifying disease, which lasted from the Great Depression until the 1960’s. Oshinsky then writes about how foundations formed as fundraisers, to support polio research. Lastly, the author demonstrates how researchers were forced to back track on multiple occasions, to learn more about polio.
Jonas Salk, a virologist at the National Foundation for Infantile Paralysis (NFIP), used inactivated viruses (virus particles grown in culture and then killed by a form of heat) to create a polio vaccine. Salk drew blood from about two million children, which the NFIP checked for immunization. Through the collection of many HeLa cells and trial and error, the polio vaccine was ready in a year.... ... middle of paper ... ...
Higher education law attorney Dana L. Fleming voices her controversial opinion in favor of institutionalized involvement in social network protection in her article “Youthful Indiscretions: Should Colleges Protect Social Network Users from Themselves and Others?” (Fleming). Posted in the New England Journal of Higher Education, winter of 2008 issue, Fleming poses the question of responsibility in monitoring students’ online social networking activities. With a growing population of students registering on social networks like Facebook and MySpace, she introduces the concern of safety by saying, “like lawmakers, college administrators have not yet determined how to handle the unique issues posed by the public display of their students’ indiscretions.” However, while Dana Fleming emphasizes the horror stories of social networking gone-bad, she neglects the many positive aspects of these websites and suggests school involvement in monitoring these sites when the role of monitoring should lie with parents or the adult user.
One of the other notable important advances was the “Conquest of Polio” this disease usually caused paralysis in the people who contracted the virus. Back then there...
The virus is primarily spherical shaped and roughly 200nm in size, surrounded by a host-cell derived membrane. Its genome is minus-sense single-stranded RNA 16-18 kb in length. It contains matrix protein inside the envelope, hemagglutinin and neuraminidase, fusion protein, nucleocapsid protein, and L and P proteins to form the RNA polymerase. The host-cell receptors on the outside are hemagglutinin and neuraminidase. The virus is allowed to enter the cell when the hemagglutinin/ neuraminidase glycoproteins fuse with the sialic acid on the surface of the host cell, and the capsid enters the cytoplasm. The infected cells express the fusion protein from the virus, and this links the host cells together to create syncitia.
Polios epidemiology can be broken down into its basic definition, causation, and origin. According to the Healthline website “Polio…is a highly contagious disease caused by a virus that attacks the nervous system”. Polio is most commonly found in children younger than five but can also be found in adults as well.This viral disease is caused by the poliovirus that may come in one of three different forms; all of which are part of the enterovirus genus. This virus is spread through direct person-to-person contact, contact with infected mucus or phlegm from the nose or mouth, and contact with infected feces. There are three types of the polio disease which are subclinical infections, non-paralytic, and paralytic. Subclinical is the most common form and accounts for “approximately 95% of polio cases” (Healthline). Patience with this form of Polio may n...
...ntake of breaths. Secondly, whilst exercising there is a stronger rush of airflow into lungs that assist in clearing mucus. The purpose of mucus is protects and lubricate however it can accumulate becoming problematic (Fahy & Dickey, 2010). Excess mucus affects lung capacity causing it to decline, potentially block airway and increase risk of infections (Cavazos, 2013; Fahy & Dickey, 2010). Lastly, long-term physical activity leads to the expansion of capillaries. Capillaries are small blood vessels increasing gas exchange movement. In other words, long term exercise help capillaries increase delivery of oxygen in body and remove waste products (Cavazos, 2013). Ultimately physical activity exercise strengths the capability of the respiratory system. It assists in the maintenance of an efficient even as it is affected and decreasing in its capability due to aging.
The situation revolving around these sites is not likely to clear up any time soon; in fact, as freshmen enter higher education institutions, more activity regarding social networking will take place. Christine Rosen, “a fellow at the Ethics and Public Policy Center in Washington” (2), said that the amount of freedom and control that technology gives us also provides a direct route for marketers to advertise products to these users. In addition, she says that college administrators use Facebook as a means of snooping around to find evidence of illegal activity of students. Many of these administrators and employers also create fake profiles in order to conduct these investigations, although, as spokesman for Facebook Chris Hughes says, creating...
mostly children, and in the first half of the 20th century the epidemics of polio
John F. Nash, Jr was an American mathematician mostly known for winning the Noble Prize back in 1994, the prize was for his landmark work of Economics. His differential geometry and partial different methods to equations have provided understanding into the forces that govern chance and events inside complex systems in our daily life. John’s concepts are used in market economics, computing, evolutionary biology, and artificial intelligence, accounting and military theory. He was a senior researcher mathematician at Princeton University in New Jersey, later in his life Nash, shared his Noble Memorable Prize in Eco Sciences with game theories with John Harsanyi and German mathematician Reinhard Selten . The game theory was developed to understand
...lations” (Garber, p. 1). Administrations are not solely concerned with the privacy and safety of its constituencies, but their freedom of speech in the cyber world. A student’s activity on social media may be considered ‘private’ and personal business, but it is also done online in a public forum; thus reiterating the blurred boundary lines in Maranto’s findings. The lines between public and private, and social and professional lives of students and staff have become increasingly distorted as new advances in technology and social media emerge (Armstrong et al., 2008; Maranto et al., 2010). Considering much of the activity on social media takes place in the digital world off-campus, one of the greatest challenges social media presents higher education institutions with is the difficulty of keeping up in order to institute some form of control (Armstrong et al., 2008).