Saturday, January 18, 2020

The Best of Times the Worst of Times

Comfort women were women and girls forced into a prostitution corps created by the Empire of Japan. [1] The name â€Å"comfort women† is a translation of a Japanese name ianfu ( ). [2][3] Ianfu is a euphemism for shofu ( ) whose meaning is â€Å"prostitute(s)†. [4] The earliest reporting on the issue in South Korea stated it was not a voluntary force,[5] and since 1989 a number of women have come forward testifying they were kidnapped by Imperial Japanese soldiers. Historians such as Lee Yeong-Hun[6] and Ikuhiko Hata stated the recruitment of comfort women was voluntary. 7] Other historians, using the testimony of ex-comfort women and surviving Japanese soldiers have argued the Imperial Japanese Army and Navy were either directly or indirectly involved in coercing, deceiving, luring, and sometimes kidnapping young women throughout Japan's occupied territories. [8] Estimates vary as to how many women were involved, with numbers ranging from as low as 20,000 from some Jap anese scholars[9] to as high as 410,000 from some Chinese scholars,[10] but the exact numbers are still being researched and debated.A majority of the women were from Korea, China, Japan and the Philippines,[11] although women from Thailand, Vietnam, Malaysia, Taiwan, Indonesia and other Japanese-occupied territories were used for military â€Å"comfort stations†. Stations were located in Japan, China, the Philippines, Indonesia, then Malaya, Thailand, Burma, New Guinea, Hong Kong, Macau, and French Indochina. [12] According to testimony, young women from countries under Japanese Imperial control were abducted from their homes.In many cases, women were also lured with promises of work in factories or restaurants. Once recruited, the women were incarcerated in â€Å"comfort stations† in foreign lands. [13] A Dutch government study described how the Japanese military itself recruited women by force in the Dutch East Indies. [14] It revealed that a total of 300 Dutch wome n had been coerced into Japanese military sex slavery[15] The Best of Times the Worst of Times Comfort women were women and girls forced into a prostitution corps created by the Empire of Japan. [1] The name â€Å"comfort women† is a translation of a Japanese name ianfu ( ). [2][3] Ianfu is a euphemism for shofu ( ) whose meaning is â€Å"prostitute(s)†. [4] The earliest reporting on the issue in South Korea stated it was not a voluntary force,[5] and since 1989 a number of women have come forward testifying they were kidnapped by Imperial Japanese soldiers. Historians such as Lee Yeong-Hun[6] and Ikuhiko Hata stated the recruitment of comfort women was voluntary. 7] Other historians, using the testimony of ex-comfort women and surviving Japanese soldiers have argued the Imperial Japanese Army and Navy were either directly or indirectly involved in coercing, deceiving, luring, and sometimes kidnapping young women throughout Japan's occupied territories. [8] Estimates vary as to how many women were involved, with numbers ranging from as low as 20,000 from some Jap anese scholars[9] to as high as 410,000 from some Chinese scholars,[10] but the exact numbers are still being researched and debated.A majority of the women were from Korea, China, Japan and the Philippines,[11] although women from Thailand, Vietnam, Malaysia, Taiwan, Indonesia and other Japanese-occupied territories were used for military â€Å"comfort stations†. Stations were located in Japan, China, the Philippines, Indonesia, then Malaya, Thailand, Burma, New Guinea, Hong Kong, Macau, and French Indochina. [12] According to testimony, young women from countries under Japanese Imperial control were abducted from their homes.In many cases, women were also lured with promises of work in factories or restaurants. Once recruited, the women were incarcerated in â€Å"comfort stations† in foreign lands. [13] A Dutch government study described how the Japanese military itself recruited women by force in the Dutch East Indies. [14] It revealed that a total of 300 Dutch wome n had been coerced into Japanese military sex slavery[15]

Friday, January 10, 2020

Sources Of Law Introduction To The Malaysian Legal System Sources Of Law

SOURCES OF LAW INTRODUCTION TO THE MALAYSIAN LEGAL SYSTEM SOURCES OF LAW The sources of Malaysian law refer to the legal sources i. e. the legal rules that make up the law in Malaysia. The sources of Malaysian law comprise: 1)Written law; and 2)Unwritten law Federal and State Constitutions Written Legislations & Delegated Legislations SOURCES OF MALAYSIAN LAW Judicial Decision English law Unwritten Islamic law Customary Law SOURCES OF LAW: UNWRITTEN LAW Unwritten law is the portion of Malaysian law which is not being enacted by the Parliament or State Legislative Assemblies and is not found in the Federal & State Constitutions.It is found in cases decided by the courts, local customs etc. – The unwritten law comprises the following: – i. Principles of English law applicable to the local circumstances. ii. Judicial decisions of a superior courts e. g. the High Courts, Courts of Appeal and the Federal Court. iii. Customs of the local inhabitants which have been accepted a s law by the courts. iv. Islamic law UNWRITTEN LAW – ENGLISH LAW English law comprises of the common law, the rules of equity and statutes :The common law is the unwritten law which was developed by judges in England based on customs and usages of the society.The common law is recognized and enforced through decisions of courts rather than through parliament or the executive branch of the government. The rules of equity is a body of legal rules formulated and administered by the Court of Chancery in England to supplement the rules and procedures of the common law. Statutes are the laws which are enacted by the legislature/parliament. Reception and Application of English Law in Malaysia ? Started with the informal reception in the Straits Settlement. ? Led to the Malay States through the intervention of the British Resident and advisors. As for the Borneo states since they became British protectorates in 1888, they too informally received English Law. ? The English Law was for mally received under three statutes: ? Civil Law Ordinance 1956 for Peninsular Malaysia ? Application of Laws Ordinance 1951 for Sabah ? Application of Laws Ordinance 1949 for Sarawak ? All the three statutes are now incorporated into the Civil Law Act 1956 ? The principles of English law can be applied in Malaysia by virtue of section 3 and 5 of the Civil Law Act 1956.It provides for the application of the principles of English law in Malaysian courts provided that: ? i) there is a lacuna in law, and ? ii)the principles of English law is suitable to the local circumstances. ? Lacuna = a blank gap or missing part ?Sec. 3(1)(a) of the Civil Law Act 1956 provides that the Court shall in West Malaysia apply the English common law and rules of equity as administered in England on 7 April 1956. This means that only English law, which was used in England as at 7 April 1956 can be used in West Malaysia.Further development of English law after this date cannot be so applied. However, they m ay be persuasive, especially in the absence of local statutory provisions or case law. ?Sec. 3(1(b) of the the Civil Law Act 1956 provides that the Court shall in Sabah apply the English common law, rules of equity and statutes of general application as administered or in force in England on 1 December 1951. ?As for Sarawak , sec. 3(1)(c) of the Civil Law Act 1956 allows the Court to use English common law, rules of equity and statutes of general application in force in England on 12 December 1949. English Commercial Law ? As for English commercial law, sec. 5(1) of the Civil Law Act 1956 provides that for West Malaysia (except for Penang and Malacca), the principles of English commercial law as at 7 April 1956 shall be applied in the absence of local legislation. ? As for the states of Penang, Malacca, Sabah & Sarawak – sec. 5(2) of the Civil Law Act 1956 provides that the principles of English commercial law as at the date on which the matter has to be decided is to be used , where there is no Malaysian legislation on that area. However, as there are an increasing number of Malaysian statutes on commercial law, sec. 5 Civil Law Act 1956 is of diminishing importance. ? The local circumstances clause in sec 3 Civil Law Act 1956 is absent in sec 5 Civil Law Act 1956 , but in practice, sec 5 has been interpreted as if it is subject to this clause as – Shaik Sahied bin Abdullah Bajerai v Sockalingam Chettiar (1933) Section 5 [Specific Application Commercial Matters] ? S 5(1) – All West Malaysia states (Except Penang & Malacca) apply English Commercial Law including statutes on 7/4/1956 S 5(2) – Penang, Malacca, Sabah & Sarawak apply the relevant and applicable English Commercial Law on the date of trial HIERARCHY OF COURTS IN MALAYSIA Federal Court Courts of Appeal High Courts Sessions Courts Magistrates’ Courts Penghulu‘s Courts UNWRITTEN LAW – JUDICIAL PRECEDENT court decisions which make up the ? Judicial decision s are common law of a country. The courts make law by applying the existing law to new situations and by interpreting legislations. Judicial decisions form part of the law of Malaysia through the doctrine of judicial precedent. A judicial precedent is commonly defined as â€Å" a judgment or decision of a court of law cited as authority for the legal principle embodied in its decision†. ? Doctrine = a principle The Doctrine of Judicial Precedent. ? This doctrine states that an earlier decision of a higher ranked court is binding on a later lower ranked court, if the facts in both cases are similar. Thus the cases heard in a higher ranked court lay down legal principles which must be followed by the lower ranked court. Once a precedent is made, it remains binding unless and until overruled by a later decision. The doctrine of judicial precedent is based on the principle of stare decisis, this means that like cases should be treated alike. The general rule is that all courts ar e bound to follow decisions made by courts higher than themselves in the hierarchy and appellate courts are usually bound by their own previous decisions although there are exceptions. ? stare decisis = stand by what has been ? This practice of following precedent is also known as stare decisis (stand by what has been decided).It is a legacy of the English common law system. ? If a judge fails to follow a binding precedent, the decision will be legally wrong and it is likely to be reversed on appeal. Where there is no appeal, it can be overruled in a later case. ? The general rule is, where the subsequent case is in pari materia The Application of the doctrine of Binding Precedent in Malaysia to the earlier case: a) Courts of lower rank in Malaysia are bound to follow the decisions of the courts of higher rank in this country. However, there are exceptions: I.When there is a conflict of decision between higher courts of the same rank : in the case of two conflicting decision of the Court of Appeal, the lower court is entitled to decide which one to follow; in the case of two conflicting decision of the Federal Court the lower court must follow the later decision (because it represents the existing state of the law). Dalip Bhagwan Singh v PP (1998) In pari materia = upon the same matter or subject I. The decision of the higher court though not expressly overruled, cannot in the opinion of the court stand with a decision of the Federal Court. II.Distinguishing precedent – a judge may distinguish the case when there are material differences in facts between the case before him and the case laying down the precedent. ? Hierarchy of the Courts: Federal Court v Court of Appeal v Superior Cts. High Court v Sessions Court v Magistrates’ Court Subordinate Cts. ? Only superior courts are entitled to set up judicial precedents whereas the subordinate courts are duty bound to follow precedents. ? The Federal Court ? The highest ranking court and the final ap peal court. ? The decisions of the Federal Court are binding on all lower Courts. The Federal Court is only bound by its own decision in civil cases. ? Decision of The Court of Appeal ? The Court of Appeal is bound by the decision of the Federal Court. ? The Court of Appeal's decision is binding on all lower courts, including the High Court. ? The Court of Appeal is also bound by its own decision ? Decision of The High Court ? The High Court decision is binding on all subordinate courts. ? The High Court is not bound by its own decision. ? Decision of The Subordinate Court ? The Sessions Courts and Magistrates’ Courts are bound by the decision of the Superior Courts. The Sessions Court and Magistrates’ Court decisions are not binding on any court, including themselves . UNWRITTEN LAW – CUSTOMS ? The regular pattern of social behaviour, accepted by a ? ? ? ? given society as binding upon itself. Customs are proved through repeated acts practiced over a long perio d of time, leading to the conclusion that by common consent they have become the accepted norm, or the law of the place, to the exclusion of ordinary law. In Malaysia, the term is also known as adat or ‘native law & custom’ Art 160 of Federal Constitution includes ‘customs & usages having the force of law’ in the definition of law.This definition distinguished between customs that have legal consequences and those that do not. ? There is no common customary law for all communities. ? Malays – Adat Perpatih & Adat Temenggung ? Natives of Sabah & Sarawak – Native law & custom ? Chinese – Chinese Customary law ? Indian – Indian Customary law ? Customary law consists of customs and traditions including Malay adat, old Chinese and Hindu customs and native law. UNWRITTEN LAW – ISLAMIC LAW ?- Islamic law is another important source of Malaysian law.It refers to the legal rules that are part of the Syariah and enacted as legislati on in accordance with the Federal and State Constitution. incorporation of Islamic principles into land laws and banking laws. Islamic law applies to all Muslims and of particular importance are the laws relating to family matters (marriage & divorce) & division of assets/properties of the deceased persons. ? It is increasingly being applied in our local laws e. g. through the ? In Malaysia the Islamic law applied is of the Shafii school of jurisprudence (mazhab), with some modification by Malay adat (customary) law. Islamic law is applicable only to Muslims and is administered in the Syariah court. Except for the Federal Territories, the states have the power to administer the Islamic law. ? Article 121(1A) of the Federal Constitution states that the civil courts have no jurisdiction in respects of any matter within the jurisdiction of Syariah court. It posseses civil jurisdiction in proceedings between parties who are Muslims, and limited criminal jurisdictions over offences by Mu slims against religion. ? The Sources of Islamic law are: The Quran, Sunnah, Ijma’, Qiyas etc. SOURCES OF LAW: WRITTEN LAW –Written law is the most important source of law in Malaysia. It is in writing and includes the following: the Federal and State Constitutions, legislations and subsidiary/delegated legislation Federal Constitution is the supreme law of the country and no law can go against it. It sets out the structure of the government and states that Malaysia is a system of parliamentary democracy with no separation of legislative and executive branch. However, the judiciary is a separate branch. The Federal Constitution also states the basic rights of every citizens, such as rights to education, citizenship rights and voting rights.There is also freedom to practice one’s own religion, although Islam is the religion of the Federation. – – – – The State constitution sets out the structure of the state governments and provides fo r the existence of a State Legislative Assembly in each state. The function of the state Legislative Assembly is to enact laws for the state. Legislation is enacted by the Parliament at federal level and by the state Legislative Assembly at the state level. The Federal and State legislatures are not supreme as they can only enact laws in accordance with the stipulated procedures in the Federal and State Constitutions.Law made by the Parliament is called an ‘Act’ while law made by the State Legislative Assemblies is called an Enactment or Ordinance. Subsidiary or delegated legislation arises when parliament delegates its rights to make law to another body such as the Minister concerned or a local authority. These laws are known as regulations or by-laws. There is a need for delegation as the Parliament’s time is limited and sometimes specialized expertise in certain areas of the law is required WRITTEN LAW – FEDERAL CONSTITUTION ? The meaning of the term â €˜Constitution’ It is used in two senses: ?The body of legal and non-legal rules concerning the government of a state ? A single written document having special legal status, which establishes the state, and sets out the structure and powers of the state ? In Malaysia, there are 13 states and three federal territories ? There is one Federal Constitution and 13 States Constitutions ? The Federal Constitution is the supreme law of the land. – The FC sets out the structure of the country’s government and states that Malaysia applies the system of parliamentary democracy. It lays down : i) the power of the Federal and State Governments ii) fundamental rights of ndividual such as the rights to education, voting & freedom to practice one’s own religion, although Islam is the official religion of the country. iii) Citizenship iv) the judiciary v) Financial provisions vi) Public Services vii) Relationship between Federation and the States viii) etc. WRITTEN LA W – STATE CONSTITUTION ? Each state has its own constitution. ? This constitution regulates the government of that particular state. ? The powers of a state is provided in the ‘State List' of the Federal Constitution. Example of matter which falls under the State List is Islamic personal and family laws. WRITTEN LAW – LEGISLATION Also known as primary legislation ? Refers to law enacted by: ? Parliament – at federal level ? State Legislative Assemblies – at state level ? Article 74(1) –Parliament makes laws on matters listed in the Federal List or Concurrent List ? Article 74(2) – State Legislature makes laws on matters listed in the State List or Concurrent List. ? Article 75 – if state law inconsistent with federal law the federal law prevails. Types of Legislation ACTS Enacted by Parliaments ENACTMENTS Enacted by State Legislative Assemblies ORDINANCES Promulgated by the YDPA During Emergency & Laws enacted by Sarawak State L egislative Assembly Laws enacted by the Parliament btw 1st Apr 1946 – 10th Sept 1959 ? Also known as delegated/ subordinate legislation ? Law made through powers delegated by the legislature to a WRITTEN LAW – SUBSIDIARY LEGISLATION body or person via a parent statute ? Sec 3 of the Interpretation Act 1948 & 1967 defines SL as: ? ‘Any proclamation, rule, regulation, order, notification, bylaw or other instrument made under any Act, Ordinance or other lawful authority & having legislative effect. ’ ? Why SL is needed: i. The legislature has insufficient time ii.Better to leave the highly technical aspect of the legislation to the experts or administrators on the job iii. The legislature is not continuously in session & the procedures are cumbersome The Federal Constitution The general features of the Malaysian Federal Constitution: ? The Supremacy of the Federal Constitution. – In Ah Thian v Government of Malaysia (1976), Suffian LP pointed out that the doctrine of Parliamentary Supremacy does not apply in Malaysia. Here we have a written constitution. The power of Parliament and state legislatures in Malaysia is limited by the Constitution. The legislature, the executive and the judiciary and all institutions created by the Federal Constitution and deriving their powers from it are subject to the provisions of the Federal Constitution. – Article 4(1) of the FC declares that the FC is the supreme law of the federation and any law passed after the merdeka day that is inconsistent with FC is (to the extent of the inconsistency) void. – Art 162 – pre merdeka laws shall be applied with such modifications as may be necessary to make them accord with the FC – In Dewan Undangan Negeri Kelantan & Anor v. Noordin Bin Salleh & Anor.The Supreme Court declared that a law passed by the Kelantan State Legislative Assembly to be void as the said state law contravened the provisions of the Federal Constitution that guaranteed the freedom of association. ? Fundamental Liberties/ Basic Human Rights ? The Constitution highlights and safeguards certain fundamental human rights essential for the continuance of human race. ? The constitution protects our freedom an restrains any law or any other power from encroaching and taking away our basic rights. ? Examples: o Article 5 – No one shall be deprived of his life or personal iberty except through the provisions of law. A person may not be unlawfully detained, he must be informed of the ground of his arrest and must be produced before a Magistrate within 24 hours. o Article 6- prohibits slavery and forced labour. o Article 7- protects against retrospective criminal laws and repeated trials. o Article 8 –provides for equality before the law and equal protection of the law. o Article 9 – provides for freedom of movement o o o o Article 10 – freedom of speech, expression and association. Art 11 – Rights to profess & pr actice & propagate religion Art 12 – Rights of education Art 13 – Rights to propertyRestraints†¦ ? Art 5 – i) Govt. entitled to stop/prevent individual from leaving/visiting country for various reasons. E. g. political boycott, threat of war, pending criminal charges, etc . , ii) Internal Security Act – detention w/o trial : exempted from complying with Art 5 ? Art 6 – compulsory service for national purposes – work incidental to serving of imprisonment are not considered slavery/labor force ? Art 7 – the acquitted/convicted can be subjected to disciplinary action by a domestic tribunal for the same offence, OR being tried under difference statute Art 8 – Art 153 allows reservation of quotas for bumiputras – AG is given power to discriminate individual for public interest – Certain people – enjoy immunity. E. g. monarch, diplomat, special rapporteur for UN ? Art 9 – subject to banishment order m ade by Deputy Minister of Home Affairs under s 2(i) of Restricted Residence Enactment ? Art 10 – Freedom of speech: Defamation Act 1957, Sedition Act 1948, Official Secrecy Act, Printing Presses & Publications Act 1984 Freedom of Assembly : Permit is sin qua non. Has to satisfy the police the assembly is not prejudicial & excite disturbance of peace Art 11 – Propagation is subjected to clause 4 where the state & federal law may restrict, control the act of propagation of any religion among persons professing Islam Clause 5 – In exercising religious practices, The FC forbids any act which may lead to public disorder, affect public health or public morality. Case: (Halimatussaadiah v Public Service Commission, Malaysia, Anor [1992] ? Art 12 – subject to Art 152 : national language and Art 153 : bumiputra quotas. Case: Merdeka University v Govt of M’sia [1982] ? Art 13 – subject to acquisition by the govt. ut entitled to receive fair & reasonab le compensation. Case: K’jaan Negeri Johor & Anor v Adong bin Kuwau & Ors [1998] ? Amendment of the Federal Constitution ? All institutions created by the Federal Constitution and deriving their powers from it are subject to the provisions in Federal Constitution . ? The provisions that are written in the Federal Constitution can only be amended by certain methods provided for by the Federal Constitution itself. ? Article 159 provides for 4 methods by which the Federal Constitution can be amended: 1. Requiring Special Majorities 2. Requiring Consent of Conference of Ruler 3.Requiring Consent of Sabah & Sarawak 4. Not requiring Special Majorities DIVISIONS/CLASSIFICATIONS OF LAW ? Legal rules can be divided up in many different ways. ? Not all legal rules are of the same type ? They show differences in purpose, in origin and form, in the consequences when the rules are breached and in matters of procedure, remedies and enforcement. EXAMPLES OF DIVISION OF LEGAL RULES ? 1. stat ute v common/case law ? 2. criminal law v civil law ? 3. national law v international law ? 4. public law v private law Criminal law v civil law ? Criminal law means the law relating to crime. Civil law means the law not relating to crime. ? The difference relies in the nature of the proceedings and the sanctions that may follow DIFFERENCES BETWEEN A CRIME AND A CIVIL WRONG CRIME ? 1. A crime is a public CIVIL WRONG ? 1. A civil wrong is an wrong. It constitutes breaches and violations of public rights and duties due to the community as a whole. infringement of a private civil right which belongs to an individual. ? 2. A crime is prosecuted by ? 2. A civil wrong is filed by the public prosecutor on behalf of the government; criminal charges cannot be filed by an individual.An act is a crime if the sanction is enforced at the discretion of the state using a criminal procedure. the damaged or wronged individual. An act is a civil wrong if the sanction is enforced at the discretion of the party whose right has been violated, using a civil procedure. ? 3. If the outcome of the ? 3. Civil wrongs are usually procedure is punishment in the form of sentencing after a finding of guilt, then the act or wrong is a crime. Crimes are punishable by imprisonment, fines or capital punishment. resolved through awarding monetary damages to the wronged individual.If the outcome is a judgment for damages, compensation, restitution, declaration of rights, order of specific performance, a prerogative order, etc. , then the act or wrong is a civil wrong. ? 4. The punishment for ? 4. There is no set limit on crimes has already been set down in rule and punishment is generally decided by the type of crime that was committed, the seriousness of the offence and, in some instances, the history of the offender. the amount one found guilty of a civil wrong can be made to pay. PUBLIC LAW V PRIVATE LAW ? Public law is concerned with the distribution nd exercise of power by the state and the legal relations between the state and the individual. ? For example, the rules governing the powers and duties of local authorities, the regulation of building standards, the issuing of passports, the compulsory purchase of land to build motorway all fall within the ambit of public law. ? Private law is concerned with the legal relationships between individuals such as the liability of employers towards their employees for injuries sustained at work, consumer’s rights against shopkeepers and manufacturers over faulty goods or owners’ rights to prevent others walking across their land.

Thursday, January 2, 2020

Definition and Examples of False Friends in Language

In  linguistics, the informal term  false friends refers to  pairs of words in two languages (or in two dialects of the same language) that look and/or sound the same but have different meanings. Also known as false (or deceptive) cognates. The term false friends (in French, faux amis) was coined by Maxime Koessler and Jules Derocquigny in Les faux amis, ou, les trahisons du vocabulaire anglais (False Friends, or, the Treacheries of English Vocabulary), 1928. Examples and Observations Youd think you can figure out the meanings if you come across the words embarazada, tasten, and stanza in Spanish, German, and Italian respectively. But watch out! They actually mean pregnant, to touch or feel, and room in the respective languages.(Anu Garg, Another Word a Day. Wiley, 2005)At the simplest level there can be trivial confusion between everyday words such as French carte (card, menu, etc.) and English cart or German aktuell (at present) and English actual. But more problematic conflicts of meaning arise with trade names. Americas General Motors had to find a new name for their Vauxhall Nova car in Spain when it was discovered that no va in Spanish means doesnt go.(Ned Halley, Dictionary of Modern English Grammar. Wordsworth, 2005)An example of a  false cognate  is the English  jubilation  and the Spanish  jubilacià ³n. The English word means happiness, while the Spanish one means retirement, pension (money).(Christine A. Hult and Thomas N. Huckin,  The New Century Handbook. Allyn and Bacon, 1999) Interference: Four Types of False Friends Interference is the phenomenon that we experience when linguistic structures that we have already learnt interfere with our learning new structures. Interference exists in all areas—for example, in pronunciation and spelling. Incidentally, interference exists not only between two languages, but also within one language. In semantics, one therefore refers to intralingual and interlingual false friends. Since a word may change its meaning in the course of time, this problem cannot be viewed only in the light of the current (i.e., synchronic) situation. Because the historical (i.e., diachronic) development must also be taken into consideration, there are altogether four types of false friends.(Christoph Gutknecht, Translation. The Handbook of Linguistics, ed. by Mark Aronoff and Janie Rees-Miller. Blackwell, 2003) French, English, and Spanish:  Faux Amis [I]n order to illustrate how deceitful false friends may become, the best we can do is to resort to the term false friends itself . . . As I have just pointed out,  false friends is a calque from the French term faux amis, although this translation is at least unsuitable, despite being lexicalised now. And the reason is that treacherous, disloyal or unfaithful friends are not usually called false friends and falsos amigos, but bad friends and malos amigos in English and Spanish, respectively.Yet, the term false friends is the most widely spread in the literature on this linguistic phenomenon . . .(Pedro J. Chamizo-Domà ­nguez, Semantics and Pragmatics of False Friends. Routledge, 2008) Old English and Modern English The vocabulary of Old English presents a mixed picture, to those encountering it for the first time. . . Particular care must be taken with words which look familiar, but whose meaning is different in Modern English. An Anglo-Saxon wif was any woman, married or not. A ​fugol fowl was any bird, not just a farmyard one. Sona (soon) meant immediately, not in a little while; won (wan) meant dark, not pale; and faest (fast) meant firm, fixed, not rapidly. These are false friends, when translating out of Old English.(David Crystal, The Cambridge Encyclopedia of the English Language, 2nd ed. Cambridge University Press, 2003)

Tuesday, December 24, 2019

Imtiaz Super Market - 2448 Words

IMTIAZ SUPER MARKET, a renowned super market, was formed in the 1955s as a small grocers outlet in Bahadurabad by Mr.Hakim Khan Abbasi, father of Mr. Imtiaz Hussain Abbasi .Imtiaz II came into being in 2003 located in Main Shahrah-e-Faisal. The outlet trusted for providing its customers with â€Å"Safe, Healthy and Qualitative product and services† has been functioning for approximately 55 years and during these 55 years given it’s widely applauded efforts to uphold quality, quantity and content it has rapidly introduced new product items. Their devotion, determination, dedication and diligence made it possible to win the hearts and minds of people who would visit their super market in its early days. Their elders set a new standard in†¦show more content†¦* All use News papers, internet, pamphlets and booklets because it contains detailed introduction about the business and its products. * Metro, Ary and Makro are in a wholesale business whereas Naheed and Agha are retailers. * They all have teams for customer service * Hire logistics for transportation * Focus on proper shelf placement of product SUPPLIERS Increase in raw material prices will have a knock on affect on the marketing mix strategy of an organization. Prices may be forced up as a result. A closer supplier relationship is one way of ensuring competitive and quality products for an organization. At Imtiaz they deal with their suppliers with integrity and fairness and treat them as partners in their operations. 1. Imtiaz has the basic strength of low prices with high quality. 2. Serving the customers with the wide variety of products 3. Having the strong retailing business background. 4. Best location for such kind of big store and also covering many areas. 5. Efficiently using the place and excellent layout 6. Friendly and co-operative staff 7. Computerized data base system which helps both customer and Imtiaz 1. Although the location for a big store is suitable but it is not suitable for all customers living in other areas 2. No parking facilities for the customers 3. Only deals in retailing 4. Absence of some products 1. Expansion in major cities and areas 2. Online shopping isShow MoreRelatedStrategic Planning on Imtiaz Supermarket2912 Words   |  12 PagesImtiaz Superstore Strategic Deficiency | Human Resource Management | Marketing / Brand Management | Supply Chain Management | IT/E-Commerce | * High Employee Turnover * Continuous Recruiting * Lack of Training * Stressful Environment | * Improper Marketing Campaign * Instable Pricing | * Warehousing * Improper Merchandising * Poor Fixtures amp; Density * Lack of Space | * Official Website * Lack of electronic cash counters * Lack of Retail and Inventory managementRead MoreQuality of the Sunrise Bread Products1192 Words   |  5 Pagescite area Karachi. The SUNRISE BREAD Company was established in 1996. It is one of the prominent bread manufactures in Pakistan. They took 30 to 35% of the market of all bread products in KARACHI. After the beginning stage of their operations they gradually resilient their base and struggle to categorical arrive into the international market. SUNRISE OBJECTIVES: They have a mission to provide admirable and superior quality by following all the principles of their institute that support to accomplishRead MoreDeveloping a Marketing Plan to Introduce a New Product or Service for Tausif Iternational3170 Words   |  13 Pages TAUSIF ITERNATIONAL. GROUP NAME: THE XPLORER MKT 201 Section 3 Autumn 2008 Submitted to Nawshad Naqueeb Submitted by Tanvir Hasan. ID: 0720005 Tahsin Tasnim. ID: 0720034 Tazina Afrin Nisha. ID: 0720061 Ahmad Imtiaz Sobhan. (Group coordinator) ID: 0720078 A.K.M. Ehsanul Hossain. ID:0720248 Progga Parmita Anika. ID: 0630014 Date of Submission November 24, 2008 [pic] School of Business INDEPENDENT UN I V E R S I T Y, BANGLADESH Read MorePage: Meat and Beef Products8094 Words   |  33 PagesEconomic Factors: 2 Social Factors: 3 Technological Factors: 3 PORTER’S FIVE FORCES MODEL 4 SWOT ANALYSIS OF K amp; N’S 4 Strengths: 4 Weaknesses: 5 Opportunities: 5 Threats: 6 TARGET MARKET AND SEGMENTATION 6 POSITONING 7 Perceptual Maps 7 Brand personality 8 COMPETITOR ANALYSIS 8 METRO: 8 CITY SUPER MART: 9 LOCAL BUTCHER SHOPS: 10 PRICING 15 PLACEMENT 18 PROMOTION 18 STORY BOARD OF OUR ADVERTIZEMENT: 20 Use of Red color in our Ad 23 Jingle 23 Analysis of Jingle: 24 ConclusionRead MorePromotion Mix of Pepsi16533 Words   |  67 PagesAnnual Report 2010 Askari Income Fund Invest with AIM A Wholly Owned Subsidary of Title Inside vision The leading quality investment advisor providing excellent returns in a dynamic market place, based on the superior expertise of a committed team of professionals who value “service to the customer” Askari Investment Management Limited Good people. Sound advice. Great returns. contents FundÂ’s Information 01 DirectorsÂ’ Report 03 Fund Managers Read MoreShaheen Air International14539 Words   |  59 PagesNETWORK OF CHANNELS TO REACH END CONSUMER 5 DOMESTIC ROUTES 6 INTERNATIONAL ROUTES 7 PRODUCT LINE 7 PRODUCT LIFE CYCLE (PLC) 11 SERVICE FACILITIES 11 INDUSTRY ANALYSIS 12 MAJOR COMPETITORS 15 MARKET SIZE AND MARKET GROWTH 18 PAKISTAN/SOUTHWEST ASIA TRAVEL GROWTH FORECAST 20 PAKISTAN DOMESTIC MARKET CAPACITY, TRAFFIC YIELD 20 AIRLINE OPERATING COSTS 21 REASONS FOR FAILURE 22 CURRENT ISSUES IN THE COMPANY 23 ANALYSIS OF EXTERNAL ENVIRONMENT 24 ECONOMIC FACTORS 24 GDP 24 WORLD OIL PRICESRead MoreEntrepreneurship in Pakistan20067 Words   |  81 Pagesopportunities for entrepreneurship. In Pakistan innovation and risk taking is severely inhibited by the intrusive role of government in the marketplace. From the early days of planning when protection and subsidy polic ies determined winners in the market place, entrepreneurship has been diverted to seeking government favours. Government economic policy also seeks to promote growth through a basically ‘mercantilist’ approach where domestic commerce through seriously neglect is heavily regulated

Monday, December 16, 2019

If You Read Nothing Else Today, Read This Report on Ielts Essay Samples of Band 5

If You Read Nothing Else Today, Read This Report on Ielts Essay Samples of Band 5 A number of authentic reading texts cover the scope of text types found in the true exam. Another great supply of reference is the band 8 onwards essays that you're able to find easily on the web. The topics are somewhat more specific and the academic level is greater. Improving your grammatical accuracy is most likely likely to be a slow and gradual practice. What's Truly Going on with Ielts Essay Samples of Band 5 After the structure is correct, using the language is slightly more advanced, and the thought procedure is thorough, obtaining a Band 8 or higher for an essay should not be an issue. There's a lesson here that explains the significance of identifying the task to be sure you fully answer all regions of the question. To take a very simple example, if you're writing about the pros and cons of something, you might wish to have one paragraph about each. For numerous reasons, some folks believe that music is crucial, and the next essay will explain them in details. Whether you've got to create a paper of one-of-a-kind flawlessness, just purchase an essay here and our writers will provide help. Even if today you think you're a lousy writer, you can learn how to deal with your essay and make it far more efficient. Meditate on it using a commentary. The academic writing isn't like your usual essay writing where you are able to think while writing. You are going to be surrounded by writing professionals throughout the plan of order placement, and the moment you opt to purchase essay and pick an allocated writer, things will get even more exciting. This lessons supplies you with grammar ideas to answer these questions. If you've got a writing teacher obviously this will help since they can examine your work. Facts, Fiction and Ielts Essay Samples of Band 5 You should understand the 4 marking criteria employed by the examiner to fulfil the prerequisites of the score you desire. Due to your essay approaches which helped me to get the wanted score. If you're a professional hoping to acquire the proper IELTS score to land that dream job, you're in the most suitable spot. When you're graded, you will be provided a score for every one of these, and this will then be averaged. You need to show you can use a wide selection of s entence structures and have a high amount of accuracy. Hopefully it's also going to contain some fantastic ideas (i.e. vocabulary). Using tons of new words you don't understand how to use properly could make your writing worse, so be mindful! Only use words you learn how to use properly. The Pain of Ielts Essay Samples of Band 5 There's no longer enough organic resources to sustain current levels of financial growth. It is better to safeguard the environment but it needs to be done after providing the necessities to the people. Around the planet, children often utilize computers from an extremely young age. For instance, some children utilize the web to find information on distinct subjects. To conclude, reading is indeed a superb habit for IELTS candidates. Both versions are written by a seasoned IELTS trainer. To summarize, too little exercise and having an unhealthy diet are the principal reasons for folks to put on weight. Thosein favour of prohibiting people from getting involved in dangerous sports have a tendency to center on the risk element. Therefore, concerns over the security of extreme athletes are very irrelevant. In addition to that, individuals should quit taking the ready meals containing chemical ingredients, particularly, saccharin. The Upside to Ielts Essay Samples of Band 5 Furthermore, there are a couple more scenarios in which music is imperative. Beside pop music, the youthful generation nowadays expose to a variety of different sorts of music. Since my parents are music-lovers and in addition, they have very fantastic tastes, I was exposed to the previous kinds of music at a rather young age. The Hidden Gem of Ielts Essay Samples of Band 5 To conclude, it is obvious that computers are now part of our routine life. From a personal perspective, computers can help young individuals to learn more regarding the world.

Sunday, December 8, 2019

Security Vulnerability of Health Care Industry

Question: Discuss about the Security Vulnerability of Health Care Industry. Answer: Introduction: The second largest telecom company of Poland, Netia suffered a cyber-attack, where security to the companys network has been breached and personal information carrying some major confidential data of its clients and users has been leaked online (Waqas 2016). The incident took place on July 7th, 2016, following the incident; website of the company was down for the entire day and night. It has been stated that the attack has been carried out by a Ukrainian hacker. The hacker has gained access to 14 GB of clients and users personal data. Impact of Attack The main victims of the attack are the clients and users of the company Netia. Some of their very confidential information has been leaked such as information related to their bank accounts (Adamowski 2016). The hacker posted multiple SQL files on the net that contains important database files which includes records such as IP Trade Doubler, IP Block Lead, device and product offers and Blue Media Transactions. The attacker also posted a file that contains an SQL file with around 342k lines containing information like home addresses, first and last name of clients and users, their email addresses, phone numbers, IP addresses and other similar data. All the data on the network was last updated in the year 2014 that means data stolen contains valid data almost about 95-98 percent (Adamowski 2016). Researchers of the breach incident also stated that they have even found a long 9GB file which has been stolen and contains users details regarding their browser, agent type, session IDs and operating system on their respective systems. Altogether, a total of 14GB data has been stolen which was followed by dumping around 615,627 unique email addresses which includes, 118,989 of Gmail addresses, 150,440 of Polands 6th largest web portal Wirtualna and around 64000 of O2 users. Fig: List of Top Ten Email Domains Compromised Although investigators could not find any file related to passwords of these emails but it was possible for them to detect the database of logger which holds session IDs of clients, which simply means that Identify theft is very simple in this case as the malicious user could use this sensitive data to authenticate himself as original user. How was the attack carried out? Although no exact reports have been stated by now upon the flaw that caused the attackers to intrude into the company website, still there are many speculations which are been interpreted and could be the cause of attack. One of them is SQL injection which is an established attack to which websites are vulnerable. The hacker publically announces that he warned the company of the attack before but they didnt seem to care. He stated that I somehow warned them about a bug bounty program which they should use but they did not (Russon 2016). Preventive Measures to stop further Attacks The damages done could not be undone but there are always possible solutions to it, which could prevent something like that in future. After the attack on Netias company website, Tony Pepper, CEO of Egress Software Technologies stated that web forms which are provided to users for getting information from them must be encrypted too along with other data as these forms are normally submitted in plain text and in unencrypted form which even sometimes contains the most confidential information about a client and could result in a hack. This type of forms even contains bank details of the user which need to be kept very secured, hence the idea of encrypting forms (Russon 2016). The other measures to prevent cyber-attacks are: Stay Updated: Companys must know about the types of cyber threats which are in news. If even a basic knowledge of threat is known, it could be prevented. Restricted Access: This includes login credentials to every other confidential information that resides on the network. Access rights must be provided only to those who actually need it and are safe. Public key and Private Key procedure could be used in order to maintain data integrity. Tighten Network Security: Session timings should be very short and if the user is idle for more than 10 minutes it should automatically log-out. Validate password to make them Strong and a need to change them frequently. Using SSL: The SSL Protocol used to transfer clients confidential data amid website and companys database must go through an encryption technology. Anthem medical data breach case 2015 Problem Statement An American health insurance company WellPoint Inc. which is known as Anthem Inc. since 2014, faced a serious cyber-attack in early months of 2015. Anthem disclosed the information on security breach on 4th of February, 2015 (Riley 2015). They informed that the criminals had stolen approximately 38 million of personal identifiable information records though hacking companys system and servers. On 24th Feb, 2015 they revised the number of records been hacked and the toll rose to 78.8 million. Department thinks that, this was planned over the course of several weeks and must have started around December 2014 (Mathews 2015). Impact of attack The former and current members, who are or were associated with any health plans affiliated by Anthem since 2004, have been impacted by the cyber-attack. Also, few of the members of Blue shield Plans and Blue cross, who takes health services in any area which is served by Anthem might have been impacted (Riley 2015). In few of the cases non-Blue Plan members along with non-Anthem members might have been impacted too in case they have been offered options related to non-Anthem or Anthem plans by their employer. Attackers explored database system of Anthem and stolen information such as their names, birthdates, social security numbers, employment information, email address, home address and health care ID numbers including income data and the individuals who data hacked stole could bear problems related to identity theft for the rest of their life (Mathews 2015). Anthem believes that neither information related to banks or credit card has not been stolen nor any evidence has been colle cted against medical information for example diagnostic codes, test results or claims, was obtained or targeted (Mathews and Yadron 2015). How was the attack carried out? In the month of January last year, one of the administrators at Anthem Health Insurance Company observed that their system network is running through an unknown complex query which they initially thought has been run by one of their employee, but in minutes it was known that it is coming from external environment and company has been targeted for cyber-attack (Mathews and Yadron 2015). Investigators stated that hackers might have tricked the employees of Anthem, to click on a phishing mail which they must have presented as an internal message or something. After that mail was clicked hackers were able to gain access to the Anthems database using Administrators credentials along with five other employees credentials. According to a news channel Bloomberg, the hacker belongs to the country China and carried out the data breach from there itself. It was not clear whether the employee who raised the alarm was one of these five employees whose credentials were used. Attackers might have made use of Adobe vulnerabilities, Windows or Java to get the credentials. What could have been done to prevent the attack? There are two ways security breach must have taken place. Either it could be an inside attack where an employee of the company might have used its own credentials of the account to stole the information or some external hacker might have phished the employees to get their credentials. Whatever is the case, intruders were already inside the walls and any type of firewalls or other security measures could have no effect in preventing it (Terry 2015). Anthem was also in debate about its data encryption techniques. It was stated that Anthems database was not encrypted in storage and on the wire. It is very crucial when a hacker attacks the security on some network and stoles the information from the database. If the data on the system is encrypted using high techniques, it could prevent the hackers from accessing the data. In case, the data is attacked by an insider, this could not be a useful technique as employees need to view data in unencrypted form and they have rights to view data to perform their job activities, hence encrypting data is also not the solution to the problem. There are two measures which could have been taken to diminish the damage or it could have even prevented any loss at all. These measures are: Context-aware access control: In this prevention measure, system checks for every authentication session that where it is coming from, what platform is being used, what is the date and time and similar other things. This would help preventing an outsider to login into companys network even if the intruder is using valid credentials which he might have received through some phishing techniques (Whitney 2015). Behavioural Analysis: Keeping a track of employees activity on the network and comparing it to their previous history records and with the network activities of other employees on the same role or position. This could be achieved using automated systemised analysis as part of Real Time Security Intelligence, which when observe any doubtful activity will either raise a flag or will close down the access of the employee temporarily (Abelson and Creswellfeb 2015). Awareness also has a major role in preventing these kinds of frauds. It has been recommended that employees must be aware of the cyber threats; they must remain attentive for incidents which are related to cyber frauds (Weise 2015). They should also be aware of the scam email campaigns which are mainly targeting individuals at their personal mail-ids. This type of scam mails are designed to detect private information of an employee and are designed in a manner appearing as they are from the company itself which includes links like Click here to monitor credentials. Employee should not reply or click on any such type of mails and not even try to reach out the sender. In case, a link has been clicked, do not supply any information on that link and never open any attachments that must have come with any such email (Abelson and Goldstein 2015). They must also ensure all their members that they will not be calling to get their personal information such as information related to credit card or similar. References Riley, C. (2015). Insurance giant Anthem hit by massive data breach, Retrieved 23rd August 2015 from https://money.cnn.com/2015/02/04/technology/anthem-insurance-hack-data-security. Mathews, A. (2015). "Anthem: Hacked Database Included 78.8 Million People", Retrieved 24th August 2015 from https://www.latimes.com/business/la-fi-mh-anthem-is-warning-consumers-20150306-column.html. Abelson, R. and Goldstein, M. (2015). "Anthem Hacking Points to Security Vulnerability of Health Care Industry", The New York Times. Weise, E. (2015). "Massive breach at health care company Anthem Inc.". USA Today. McLean, VA: Gannett. ISSN 0734-7456. Whitney, L. (2015). "Anthem's stolen customer data not encrypted - CNET", Retrieved 23rd August 2015 from https://krebsonsecurity.com/2015/02/data-breach-at-health-insurer-anthem-could-impact-millions/. Mathews, A. and Yadron, D. (2015). "Health Insurer Anthem Hit by Hackers - WSJ", Retrieved 23rd August 2015 from https://www.usatoday.com/story/tech/2015/02/04/health-care-anthem-hacked/22900925/. Abelson, R. and Creswellfeb, J. (2015). "Data Breach at Anthem May Forecast a Trend - NYTimes.com". The New York Times. New York: NYTC. ISSN 0362-4331. Terry, N. (2015). "Time for a Healthcare Data Breach Review Bill of Health", Retrieved 23rd August 2015 from Center for Health Law Policy at Harvard Law School. Waqas, H. (2016). Ukrainian Hacker Hacks Polish Telecom Giant Netia; Leaks Massive Data, Retrieved 23rd August, 2016 from https://www.hackread.com/ukranian-hacker-hacks-polish-telecom-netia/. Adamowski, J. (2016). Polish telecom suffers major data breach following hack, Posted in SC Magazine, Retrieved 23rd August, 2016 from https://www.scmagazineuk.com/polish-telecom-suffers-major-data-breach-following-hack/article/510290/. Russon, M. (2016). Polish telco operator Netia suffers massive data breach, exposing 300,000 customer credentials, International Business Times, Retrieved 23rd August, 2016 from https://www.ibtimes.co.uk/netia-data-leak-polish-telco-operator-hacked-14gb-customer-credentials-posted-online-1570051. Muncaster, P. (2016). Polish Telco Netia Suffers Major Breach, published on info security, retrieved 23rd August, 2016 from https://www.infosecurity-magazine.com/news/polish-telco-netia-suffers-major/.

Sunday, December 1, 2019

Phosphate Dehydrogenase Deficiency Disease Essay Sample free essay sample

Abstraction:Glucose-6-phospate dehydrogenase lack ( G6PD ) . an X-linked familial disease. is due to the deficiency of glucose-6-phosphate dehydrogenase. This enzyme is present in ruddy blood cells and its lack can take to haemolytic anaemia. Red blood cells carry O and G6PD protects these cells from natural O chemicals that may construct up when you have a febrility or take certain medicines. If there are excessively many of these oxidative chemicals. they can destruct the ruddy blood cells. doing haemolytic anaemia. The G6PD enzyme catalyzes the oxidization of glucose-6-phosphate to 6-phosphogluconate piece besides cut downing NADP+ to NADPH. which is a needed cofactor in many biosynthetic reactions. NADPH maintains glutathione in its decreased signifier that serves as a forager for risky oxidative metabolites in cells. With the aid of the enzyme glutathione peroxidase. reduced glutathione besides converts unsafe H peroxide to H20. Red blood cells depend on G6PD activity since it i s their lone beginning of NADPH. We will write a custom essay sample on Phosphate Dehydrogenase Deficiency Disease Essay Sample or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Consequently. people missing G6PD can non take oxidative drugs or usage certain chemicals because their ruddy blood cells undergo rapid haemolysis under this emphasis ( Carter ) . Introduction:Glucose-6-phosphate dehydrogenase ( G6PD ) is an enzyme in the pentose phosphate tract. a metabolic tract that supplies cut downing energy to cells. chiefly RBCs. It does this by keeping the degree of the co-enzyme nicotinamide A dinucleotide phosphate ( NADPH ) . NADPH in bend maintains the degree of glutathione in these cells that helps protect the ruddy blood cells against oxidative harm. Glucose-6-phosphatase dehydrogenase ( G-6-PD ) lack is the most common disease-producing enzymopathy in worlds. which affects 400 million people worldwide with more than 300 reported discrepancies ( Carter ) . It besides presents with protection against malaria. which most likely histories for its high cistron frequence. Some research has even shown that G6PD seems to diminish the susceptibleness to malignant neoplastic disease. cardiovascular disease. and stroke. G6PD lack is an X-linked recessive inherited disease that preponderantly affects work forces. While it affects all races. there appears to be a higher incidence in people of African. Asiatic. or Mediterranean heritage. The high frequence of type 2 diabetes and high blood pressure in Afro/Caribbeans in the West can besides be straight related to a G6PD lack ( Gaskin ) . The lack is a mutant in the G6PD cistron venue at Xq28. The cistron is 18 kilobases long with 13 coding DNAs. which makes up an enzyme of 515 aminic acids. Most of the mutants are single-base alterations that result in an amino acid permutation. Female bearers can hold a mild signifier of G6PD. which is dependent on the grade of inactivation of the unaffected X chromosome. In the rare instance of homozygous females. there is co-incidence of a rare immune upset called chronic granulomatous disease. G6PD deficient RBCs have a instead reduced life span and at hazard to lyse when faced with oxidative emphasis. Patients with G6PD lack are at hazard of haemolytic anaemia in provinces of oxidative emphasis. This can be in terrible infection. medicine and certain nutrients. Some drugs that can convey on symptoms include: antimalarial agents. acetylsalicylic acid. Macrodantin. quinine. Quinidex. sulfa drugs. and many others. Broad beans contain high degrees of vicine. divicine. convicine and isouramil — all are oxidizers. Recent research has besides shown chemicals like henna. used in dyes for hair and tegument. has besides shown to convey on strong reactions. In provinces of oxidative emphasis. all staying glutathione is consumed. Enzymes and other proteins are later damaged by the oxidizers. taking to electrolyte instability. membrane cross-bonding and phagocytosis and splenetic segregation of ruddy blood cells. The haemoglobin is metabolized to bilirubin. increasing the hazard of icterus. or excreted straight by the kidney. which is known to do acute nephritic failure. Nerve pathway: Discussion:Preservation of the unity of the RBC’s membrane relies chiefly on its ability to bring forth ATP and NADH from glycolysis. NADPH is produced by the pentose phosphate tract and utilised for the decrease of oxidised glutathione to cut down glutathione. Glutathione is indispensable for the remotion of H2O2 and lipid peroxides generated by reactive O species. In normal ruddy blood cells. the uninterrupted coevals of superoxide ion from the nonenzymatic oxidization of haemoglobin provides a beginning of reactive O species. Under normal fortunes. the RBC removes superoxide with superoxide dismutase. which converts superoxide to hydrogen peroxide. Glutathione peroxidase reduces the H peroxide to H2O which oxidizes glutathione to the disulfide signifier. Glucose-6-phosphate dehydrogenase converts glucose-6-phosphate into 6-phosphoglucono-?-lactone and is the rate-limiting enzyme of the pentose phosphate tract. In a individual with lacking G6PD. oxidizers react with glutathione doing the cellular degrees of reduced glutathione to fall to such an extent that critical sulfhydryl groups in some cardinal proteins can non be maintained in decreased signifier. In bend. a sufficient sum of NADPH. which is besides required for formation of azotic oxide. is non produced. As a consequence. the tract promotes Heinz organic structure formation. and haemolysis can happen. Heinz organic structures are fundamentally denaturized haemoglobin formed by harm to the haemoglobin constituent molecules and go cross-linked by disulfide bonds. Lack of G6PD in the alternate tract causes the buildup of glucose and therefore there is an addition of advanced glycation terminal merchandises. In decision it is clear to see patients with glucose 6-phosphate dehydrogenase lack must be highly careful in their usage of merchandises that could perchance do oxidative emphasis. However. it seems that is an highly difficult undertaking since there are so many merchandises on the market and unless more research is done it would be impossible to cognize what is safe and what is non. Another hazard lies non merely on the custodies of the patients. but besides on the doctor. Recent research in Iran. where G6PD lack is highly common. was done to prove blood bags used for transfusions or exchange. Samples were taken from 261 blood bags and examined by topographic point fluorescence for G6PD lack. In add-on. patients having blood were examined for haemoglobin. haematocrit. and hematoidin before and after transfusion. They were besides examined for haemoglobinuria. factors involved in haemolysis due to G6PD lack. and oxidizers. The consequences were amazing and showed that 37 of the bloo d bags had the G6PD lack and about 81 % of the transfusion receivers had at least one hazard factor for haemolysis. This merely goes to demo the earnestness involved in monitoring such a status. Plants Cited: Carter SM. Gross SJ. Glucose-6-Phospate Dehydrogenase Deficiency.hypertext transfer protocol: //www. emedicine. com/med/topic900. htm ; 29 Aug 2005.Gaskin RS. Estwick D. Peddi R. G6PD lack: its function in the high prevalence of high blood pressureand diabetes mellitus. Ethn Dis 2001 ; 11:749-54. PMID 11763298. Nabavizadeh SH. Anushiravani A. The prevalence of G6PD lack in blood transfusionreceivers. Hematology 2007 ; Vol. 12 Issue 1. p85-88.