Monday, September 30, 2019

Palm reading

Personalities through their palms. Specific purpose: By the end of my speech my audience will learn how personality palm reading is dependent on nerves and another 3 major life lines . L. Introduction: A. Attention Getter: (I'm going to say the personality traits of a classmate) , you ask how I know all this about his about him , its all here written in own his hands. Transition: Sometimes our eyes hide what our hands read. Since our palms, hands and fingers are all maps that tell us about our personalities and where were going through our lives. B.Reason to Listen: I bet everyone here has looked to his hands ND wondered what those silly lines meant. Well palm reading provides the answer for all this. C. Thesis Statement: According to Dictionary. Reference. Com palm reading is the practice of interpreting ones character from the lines and configurations of the palm of the hand . D. Credibility Statement: Throughout my life I have always heard bad things about palm reading, since its accuracy has always been questioned because it has always been linked with forecasting and never been proven with any scientific facts to back it up. It is wrap off ! Owe could you believe in such things ! They use you in order to take your money. After deep research I concluded that its not what people actually think it is a simple process based on our biological features and our nervous system. It is an art practiced worldwide and with Indian astrology roots . E. Preview of main points: I will discuss how palm reading is related to the nerves and brain. Body A. In Order to understand how to read a palm we must first understand how does this process work . 1. Our nerves have a long path that begins with the brain and ends at our body extremities : the hands and the feet. . This connection between our nerve endings and our brains is thus what makes our mental thoughts reflect into our hands. Making everything we want, do, behave, love or hate visible. Transition: The first question asked about palm reading is which hand to read? B. The Palm reader usually chooses each person's dominant hand. 1 . The dominant hand is the passive hand the one you usually use the most and write with , it is all the experiences gained through-out your life while the non dominant hand is considered the experiences you will go through in the future . . The next step is determining the shape of the palms , we have 4 shapes unhand : the Earth hands which are square in shape with short fingers. People with Earth hands are practical, stubborn and love outdoors activities. 2. The Second shape is the air hands that are square in shape with long fingers. People with these kind of hands are curious, full of ideas, worry a lot, good communicators, but may have problems with private relationships . 3. The third shape is the fire hands that have a long palm but short fingers.People with fire hands are full of energy, spontaneous, optimistic, active, but have of lack patience . 4. The last shap e is the Water hands that are rectangular in heap with long fingers. People with water hands are very moody yet loving, caring, don't cope well with stress . Transition: Now we move on to the 3 major lines of the palm. C. Each line of the three tells a different story about each individual . 1. Im going to start with the top line in our hands, the heart line. It is the line that determines the sensitivity and the emotional aspects of a person.If the line starts below the index finger, it means that he is happily in a relationship. Whereas if the line starts below the middle finger, it means that an individual is selfish when it comes to love. If it starts in the middle, then it means that an individual falls in love very easily. However, the curvier the line is the more romantic the individual is, and the straighter it is the less romantic a person is. If it touches life line then it means that the individual is easily heartbroken.But when the line is Www then it means that the indi vidual has experienced many relationships and lovers. Finally a circle on the line means that the individual is sad with his life . 2. The Second Line , is the middle one The Head Line . Alt determines how focused or easily distracted a person is. When the line is short, it resembles that an individual is short and direct to the point, whereas the longer it is the more creative and thoughtful an individual is, but the straighter it is, it means that the individual has very clear thoughts.Finally, if the head line is wavy, it means that the individual has a lack of concentration. 3. The curves beside the thumb represent the third major line the life line, the closer they are to the thumb the less enthusiastic and passionate for life the individual is, while the curvier they are it means that an individual has a great eve for life , if it swings out it shows that the individual likes to travel often, but if there are breaks it means that the individual has a weak immune system.Any add itional line means that an individual is surrounded with positive vibes. Ill. Conclusion: A. Review of main points: So Palm reading does not tell you the number of kids your going to have , nor at what age will you die or the name of the pet your going to bring next year. It is a simple art that interprets your personality through the reading of your palms and not a fortune telling myth. B. Closure: Now that you all know everything about palm eating you can each know more about your own personality. True or not.It is an easy, fun unharmed process that takes only a couple of minutes. Palm Reading Palmistry We all wonder what awaits us in the future. We wonder about our health, our careers and of course, our love life. Well the answer to all of these questions may lie quite literally in the palm of your hand. Palmistry, or palm reading, is the practice of predicting the future outcomes through the study of the palm. This study dates back to 3000 BC in ancient Egypt and still being practiced today worldwide. Today we will discuss how our palm lines can tell us about our future and ourselves, as well as learn the basics on how to read a palm.Which will include the four major lines: the heart, head, life and fate line. First of all, how is that our future can be determined through mere palm lines? We all know that our physical health can be affected by stress and psychological negativity. Our mental outlook and attitudes also form our reactions to life’s events. According to the journal, â€Å"English Literature in Transition† by Joan Navarre, the brain, through the high concentration of nerves in the hands, can influence the condition of the palms and the patterns of the lines in them.It’s Also important to know that our palm lines are not fixed and we are not doomed to a future already set in stone. In fact, our palm lines change throughout our lifetime, some more frequently than others. As we mature and change our ways, our palm lines will modify accordingly. They may get deeper, straighter, form new lines, or some may even disappear. In addition to changing lines, as you have probably noticed already, the lines on your left and right hand differ. Your weaker hand, whether it be right or left, represents what we are born with and our private self.The stronger hand represents what we do with our lives, the actions we take and our public self. According to the article, â€Å"A Modern Palmist†, by Ania Blomberg, in the Feb 2011 issue of the â€Å"Torquay Herald Express† Your current palm lines are indicators of the likelih ood something will happen, as well as a window into your past. Our Next step is learning our major palm lines. The first of the major lines we will discuss is the heart line. It begins on the side of the hand, spans across the palm and ends in various places.If it ends under the first finger it signifies an introspective and possibly self-centered person. If under the second finger, you are a giver and always put the needs of others before your own. Ideally, the heart line should end between the first two fingers, signifying a balance between giving and receiving. A straight heart line suggests your head gets involved in matters of the heart. In other words, You don’t let your emotions make your decisions for you. A curved heart line indicates you are a romantic and always wear your heart on your sleeve.For most people the heart line is the deepest and darkest line on the palm. The second line is the head line. It begins on the side of your hand under your first finger spanni ng across the palm ending at various lengths. If your head line is straight you are logical, detail oriented and organized. If your line is curved, you are more creative and artistic. According to the book â€Å"The Hand from A-Z: The essentials of Palmistry† by Judith Hipskind, The length of the head line symbolizes your attention span and ability to concentrate. The longer the head line the more focused you are.Additionally, If there is a fork at the end of the head line, it means you can see both sides of an issue and will love debating. This is sometimes called a lawyers fork. The third of the major lines is the life line. According to humanhand. com, in modern palmistry the life line does not tell you how long you will live but how you will live. It does however represent a timeline of events. The area where it begins, between the thumb and first finger, represents the beginning of your life, then curving down around your thumb and ending at your wrist, which would repre sent old age.Lines crossing the life line signify important events, and where they are located indicates when the events are likely to happen. If your life line sweeps out toward the center of your hand, you will most likely seek independence and travel often. By contrast, If it hugs close to your thumb you are more likely to stay close to home and family. If caught in between, you may struggle between security and the need for independence. Breaks in the life line can indicate times of major illness or stress.If you notice smaller, fainter lines that connect the life and heart line, they indicate strong romantic relationships. Where they are located on the life line represents at what point in life the relationship is likely to happen. In addition, the number of these lines suggests how many of these relationships you are likely to have. Finally we come to the Fate line. This line begins near the heel of the hand and runs through the center towards the middle finger. According to p almistryfree. com, this line is volatile and only found in about 50% of the population.It is tied to your personal life path, including school, career choices, successes and obstacles. If this line is absent, you are unsure of the direction of your life. If your fate line is strong, you have specific goals and direction. If only lightly etched you could easily waver between the two. The beginning and ending of the line also plays a role. When the fate line begins on the wrist, you have always done things your own way and may be a bit of an oddball. If it begins more toward the center of your hand, it took a while for you to figure out who you are and what to want to be.Now that you know how our palm lines come to be and how to examine your own heart, head, life and fate lines, you can predict what sort of future to expect for yourself if you continue down your current path. However, it is ultimately our will that shapes our lives, not our palm. The practice of reading palm lines is not to predict doom, or even happiness. They are instead a guide. The purpose of palmistry is to help you see the way ahead so you can actively plan a successful and prosperous future.

Sunday, September 29, 2019

The Clash of the Titians

The Clash of the Titians The call to Adventure The main character and hero in the film Clash of the Titans is Perseus, his departure is when he becomes forced to set to sea in sea and with nothing but a coffin and his mother, Danae. Soon washing ashore the island of Seriphos, later as Perseus grows older he receives a sign from the gods when he was shifted to the foreign world of Joppa he never new existed. Refusal of the Call Perseus cannot believe he has changed worlds, and suspect’s action. Supernatural Aid] After receiving the acceptance of Godly actions, Perseus gets his share of supernatural aid consisting of a helmet, sword, and shield along with a message from Zeus that they will someday save his life. [Crossing of the First Threshold] Perseus learns of Andromeda and her situation, she cant marry unless her potential husband successfully answers a riddle, and any man who answers the riddle incorrectly is burned crucified in public. He believes he can’t turn back , for he has been on a quest to save the goddess-like princess by the gods. Entering the Belly of a whale] Perseus captures the magical and almighty winged horse Pegasus and follows Princess Andromeda’s spirit on her nightly journey to learn a new riddle from Calibos, a hideous a monster mortal. [Road of Trails] Armed with the answer to the riddle Perseus is nearly killed by Calibos but escapes, losing the helmet in which renders invisible powers within the swamps in the process. Perseus appears at the next ceremony where princess Andromeda’s mother asks for anyone to answer the riddle.With no hesitation, Perseus answers the riddle correctly, presenting Calibos severed hand with the answer of a gold ring. Of course he wins Andromeda’s hand in marriage. [Meeting of the Goddess] At the wedding, Queen Cassiopeia compares Andromeda’s beauty to Thetis herself, which angers the Goddess incredibly and gives her an excuse to fulfill her son’s wish the stat ue of Thetis collapses and its head comes to life, demanding Andromeda as a sacrifice to the Kraken in thirty days, or else Joppa and its people will be destroyed. Temptation] Bubo the owl leads Perseus to the Stygian witches, three blind women who share a single eye. With some effort they tell him the only way to defeat the Kraken is by using the head of another monster. [The ultimate Boon] Zeus tells his Goddess, Athena, to aid Perseus with her owl Bubo as a replacement for his forgotten helmet. Perseus transformed Medusa into a stone statue and cuts her head off with his sword. Perseus can now move forward to get rid of the Kraken. [Return] the hero goes back home he has proven himself worthy.

Saturday, September 28, 2019

Citizenship education Essay Example | Topics and Well Written Essays - 750 words

Citizenship education - Essay Example In most economies, education is a right to each and every citizen with permanent citizenship and they stretch education privileges to non-nationals who are democratically/ legally living in these states as outlined in the national task on citizenship education (Tilly, 2007, pp.13-16). Citizenship education can be viewed in two perspectives of immigrants or as a subject. As a subject it is designed to associate the learners with the cultural, social, and economic activities with the best approach as supported by Herbert and Kertz (2012, p.26) Bloor (2010, p.24) claims that â€Å"Citizenship education for immigrants is designed to prepare non-nationals/ non-citizens on their dos and don’ts so as to become legally and socially accepted as citizens of these states either on a permanent or temporal basis†. ... free interaction by people in a country exercising their rights and freedom, and taking part in legal and political activities of that country without discrimination. This forms the basis of a free and fair exchange of cultural diversities. Citizenship education platform can be gauged by multiculturalism in a state which can be simply described as a demographic make- up of the society at certain organizational levels such as schools, neighbourhoods, and cities within the state. Alternatively, Osler and Starkey (2006) define multiculturalism as â€Å"ideologies or policies that that promote institutionalization of diversified desires of human kind to express their identity in the manner they deem fit like equal respect of different cultures in the society and opportunities entitlement†(p. 11). They argue that for multiculturalism to hold a great measure of democracy needs to be put in place. An Intercultural citizen can be viewed as one who appropriately adapts valued rules, no rms and expectations of a given foreign state for a healthy relationship with the citizens and who effectively values the state’s goals and/or rewards in line with the society. This is to mean that intercultural citizen is knowledgeable enough and competent to interact freely with foreign cultures through understanding specific concepts of these cultures like perception, thoughts and feelings. Citizenship education, multiculturalism and intercultural citizenship are related in that for appropriate education, economies with multiculturalism have to come up with policies and regulations to govern interactions of foreign students/cultures and their establishment in terms of education and coexistence as described by Osler and Starkey(2005, p.11). For instance, multicultural economies will have to

Friday, September 27, 2019

Topic in Instruction Essay Example | Topics and Well Written Essays - 750 words - 2

Topic in Instruction - Essay Example In order to do this kind of advertising practices cowgirl has to link their company website to the mentioned search engines. The behavior of consumer is changing rapidly in this modern era of globalization. After the Second World War due to globalization the attraction of people is changing towards the advanced technology. Moreover by the website advertising strategy company can target a mass number of customers. This strategy will lower the advertising cost of the products of cowgirl chocolate as the company has to invest lees in this total page of commercial than the print media marketing (Ferrell and Hartline, 2010, p.153). The real fact is that many customers are linked by the internet while the readers of magazines are in limited numbers. In terms of product packaging strategy, company need not look for the creativity or artistic to pack the products. The quality of food product can do the appropriate market segmentation. Cowgirl chocolate should look for the suppliers who will supply the packaging raw material at a lower price. These two aspects can increase the profitability of the organization. Demand-based Pricing The major competency of cowgirl chocolate is that they launched chocolate products with a kick of little spiciness. Moreover the strategy will help cowgirl chocolate to expand their business market by creating various products that can attract the people of both old and new generation. It has seen from the case that their specialty regarding all the food products is on the top but people tend to buy the low price chocolate products than the expensive one. Due to different pricing of different products, customer can actually go for the better priced product. The new products like sweet chocolates are being used to appeal people to buy the products. As a result people can go for the sweet chocolates than the others due to variety of price level. When a product has higher demand then it is easy to decide when and how to increase the price of the product but when a product’s demand is decreasing then it is a tough task to do the pricing of that particular product (Stretton, 1999, p.153). They can take some strategies like customer feedback which can help cowgirl chocolates to do the market segmentation and the pricing strategies. Competition-based Pricing There are very few chocolate companies who are competitor of cowgirl chocolate. Cowgirl chocolate competes with the competitors to achieve the self-space at various retail outlets. In order to discuss the merits of competition-based pricing it is very much necessary to find who the competitors of the company are and what are the competitive advantages the company has? The advantage as well as the limitation of cowgirl chocolate has the pricing strategy due to various product lines. Cowgirl chocolate is facing the major competition from the sweet chocolate producing companies. The competitive advantages of cowgirl chocolate are attractive packaging and exceptional ta ste of products. Answer 2 Merlyn took an attempt to place her chocolates in the retail houses and got success by this attempt. However, the problem arises when cowgirl chocolate was unable to cut down the operational cost. As per as pricing, Cowgirl chocolate may consider four pricing strategies such as Promotional Pricing, Demand-based Pricing, Premium Pricing and Price lining. Cowgirl chocolate has adopted demand based pricing strategy as per different products. They

Thursday, September 26, 2019

See Below Essay Example | Topics and Well Written Essays - 1000 words - 2

See Below - Essay Example An estimated 100,000 children of mixed blood had been taken away from their mothers between 1910 and the 1970s , many of whom were subjected to humiliation, sexual abuse and ill treatment and forced to become unskilled labor. At first glance, these two incidents happening close together in geographically distant locations seem to have nothing in common, but a little reflection makes it evident that both incidents are centered around aggression. On the one hand, it is aggression of an individual against others, a classic case of the the individual’s death drive unleashing its negative energy. On the other hand, the aggression committed is by a race against another and the apology points to Freud’s theories of guilt and the conscience. Since ancient times, there have been recurring events of aggression, which took the form of conquest and pillage. Modern day conflicts have their roots in the latent fear and hatred of cultures and sex other than one’s own. Let us consider the books, Love My Rifle More than You by Kayla Williams and Bury me Standing by Isabel Fonseca. In the former, conflict is seen from the point of view of the female of the species, while in the latter, it is the victims sufferings which are highlighted.. Williams gives a graphic account of her experiences as a soldier in the U.S. army in Iraq. She served in Iraq for one year at the beginning of the U.S war against Iraq. The war was fought in the midst of civilian population. Being a female, Williams was considered to be â€Å"less threatening† than her male colleagues. As she was fluent in Arabic, she had the job of communicating with the local people. In her inimitable style, Williams narrates many disturbing incidents, from humiliating an Iraqi prisoner to aiming the gun at a child. In another incident recounted by her, she is made to humiliate a naked and weeping Iraqi

Wednesday, September 25, 2019

Business taxation Essay Example | Topics and Well Written Essays - 2000 words

Business taxation - Essay Example Understanding Revenue and Capital Expenditures Revenue expenditures such as rent of premises for conducting business, employee wages, raw materials and many such items are ongoing expenditures that are necessary to generate business profits. Revenue expenditure is also known as circulating capital that means capital changes hands to produce profit and loss. On the other hand, capital expenditures such as purchasing land or building, plant and machinery or goodwill form a long-term expenditure that accrue benefits until its useful life. The Statute ICTA88/S74 (1) (a) provides that only those expenditures are allowed for deductions that are "incurred wholly and exclusively for the purpose of trade" (BIM37035). However, capital expenditures are not allowed for deductions fully, and its treatment is governed by different statutes, as incorporated by the governing office from time to time. Capital Expenditures – Differential Treatment in GAAP and Income Tax It is important to note that accountancy and income tax laws are not fully in alignment as far as treatment of capital expenditure is concerned. ... All revenue expenditures are allowed for deduction to profit and loss statement. All capital expenditures are not allowed for deductions unless allowed by statute. For example, ITTOIA/S58 and S59 are the statues that allow deductions for the incidental costs incurred while raising a loan for business purposes (BIM45800, 2012). The statutes deal with the costs incurred while raising loans or issuing loan stock. These statutes do not provide relief for the costs incurred while raising finance through other methods such as bills of exchange, leasing assets, hire purchase, buying assets on credit or any form of equity financing. The incidental costs to obtain finance have been defined in ITTOIA/S58 (2). The allowable costs include commissions, fees, advertising, printing and related matters. It is required that the costs must be incurred, wholly and exclusively, for the purpose of acquiring or repaying the finance including its security. Some of the costs that are included under this sta tute can be described as per the following (BIM45815). a. Introduction fees, underwriting commissions, brokerage. b. Professional and legal expenses for negotiating the loan and getting the document ready. c. Valuer's fees, land registry fees incurred towards the security of the loan. d. Commitment fees. e. The costs of issuing a prospectus, postage, and the costs of advertising etc (BIM45815). Statute ITTOIA/S59 (1) provides that expenditure incurred while obtaining loan is not allowed for any deduction if it has provisions of conversion into shares or if any other securities or conversion takes place before three years from the date of loan obtaining (BIM45810). There are several deductions

Tuesday, September 24, 2019

Molecular Basis of Pernicious Anaemia Lab Report

Molecular Basis of Pernicious Anaemia - Lab Report Example This process is important because it is a requirement needed for the maturation of red blood cells, putting forward a relation with the disease2. Parietal cells are found in the gastric glands where there major function is to produce hydrochloric acid that is involved in the first stages of digestion. For gastric acid secretion, the gastric H positive or the proton pump enzyme that consists of ninety five kDa alpha subunit and a sixty to ninety kDa alpha subunit3. Auto anti bodies contained in serum from different patients having pernicious anaemia react with either or both of the alpha and beta subunits of the gastric proton pumps. Knowledge about this antibody response provides a useful diagnostic tool for the pernicious disease. Also, the most widely used method for analyzing protein mixtures is by gel electrophoresis. The most commonly used type of gel is the SDS polyacrylamide. It essential to realize that proteins are solubilized in sodium dodecyl-sulphate (SDS) , an anionic de tergent that binds to the hydrophobic regions of proteins causing them to unfold hence acquiring an overall negative charge. Inclusive is a reducing agent that is included to disrupt any disulfide bonds that are within the bonds. Avery good example of a commonly used reducing agent is the 2-Beta mercaptoethanol. On electrophoresing the proteins through a polyacrylamide gel, the negatively charged proteins migrate towards the anode and separation done with regard to their size, with smaller proteins moving the furthest. It is possible to perform an analysis of the size of proteins in the mixture if molecular weights of running proteins are known. This report tests antibody from the serum samples of different patients and the results to be used to identify if any of them reacts with gastric proton pump. The results acquired from the tests will hence provide a guide to finding a diagnosis of pernicious anaemia. For accurate results it is important to use two different methods which wil l determine the presence of anti-proton pump antibodies in serum samples4. Method one (Practical three) Separate proteins extracted from mouse stomachs by SDS poly acrylamide gel electrophoresis, and transfer the proteins to a nitrocellulose membrane. Stain a section of a mouse stomach with haemotoxylin and eosin so that it becomes familiar with the structure and cells types within the stomach. It is essential to realize that the cells in the mouse stomach are similar to those of a human’s anti-proton pump antibodies. For this reason, they cross react with the equivalent mouse proteins. Method two (practical 4) Perform Western Blotting on the gastric proteins using sera from patients who may or may not have pernicious anaemia. Western blotting has this procedure. First, an individual acquires the SDS-PAGE of mouse stomach proteins. These proteins are transferred to nitrocellulose membrane by electrophoresis. The membrane is stained with Ponceau S so as to confirm protein tran sfer from gel to membrane. After that process, the membrane is de-stained and then stored in blocking buffer until next usage. Use H19 to incubate strips of membrane and then wash the membrane strips and incubate in blocking buffer. The membranes are incubated in secondary anti-bodies and in luminous detection buffer. Lastly, the markers are reassembled and test strips are visualized with Chemi -doc system5. Also, perform immune peroxidase staining of mouse stomach

Monday, September 23, 2019

Response to 4 students with 60 words each and 2 references for each Coursework

Response to 4 students with 60 words each and 2 references for each response - Coursework Example This was in the sense that the writer looked beyond just one area or aspect of resistance to identify three clear forms of resistance. These were the individual, group and larger system (quote). With this, it was possible to outline and equip global managers with some of the major areas of organizational change that they can give their focus to especially when they want to curtail the problem of resistance (quote). It was therefore of great importance that the writer systematically divided the forms of resistance. This particular writer paid much tribute to the fact that organizational changes are inevitable and reasons why resistance to organizational change may be resistance (quote). Much attention was however given to these that not much that not much in-depth analysis could be done on ways of addressing the resistance. Meanwhile, for the manager who uses the present study, the best way that he would benefit is for him to be made aware of some of the key problem solving solutions to resistance to organizational change (quote). The writer focused on causes of resistance to organizational change. As much as this is a useful step and way of informing managers of some practices that could lead to resistance to the changes they profess to undertake (quote), it would have been more useful if specific solutions to addressing the issues were outlined. Some of these solutions could be given in a real life case study of a known

Sunday, September 22, 2019

Mistake and Creativity Essay Example for Free

Mistake and Creativity Essay Assignment: What is your opinion on the relationship between mistakes and creativity? Since the natural propensity of human makes a trend to possess a notion of newness and deviation, intelligence beings patiently seek to response those demands with the result of new creativity. Simultaneously, mistakes of any forms apparently are inherent to creativity either during or after process of creation. Such relationship between creativity and mistakes has generally illustrated in the biography of prominent and famous scientists, Robert J.  Oppenheimer and Thomas Edison. To satisfy and improve the prosperity of life on the Earth, the scientist, Oppenheimer, has a prosperous goal to advance the technological frontiers of man in nuclear physic, and has desire to succeed in controlling nuclear reaction. Ultimately, his creativity according to his goal and desire is atomic bomb. Oppenheimer’s creativity, in contrast, deeply connects him to a serious mistake in his life. His new innovation was seriously responsible for the immense destruction of the death of ten thousands people in Hiroshima and Nagasaki during World War II. Therefore, this destruction can be identified conspicuously that creativity is able to provide mistake in return. While creativity is a necessary thing for mankind, mistake can be seen as a material to pursue that creativity. Taking another famous scientist into consideration, Thomas Edison is isolated himself from the other in order to discover a furtive innovation on electricity. He finally invented electric bulb after trying 1000 times. However, his 999 failures are 999 mistakes that drive him to achieve his ultimate succession. Then, mistakes in this context are root and driver to definitely create innovation. In conclusion, the relationship between mistakes and creativity is a form of complement that affects or dominates each other. Hence, this relationship is a theory, which can also be applied to daily life of each people in the creation’s process.

Saturday, September 21, 2019

Business Messages Essay Example for Free

Business Messages Essay In a traditional workplace, memos are the usual form of business messages that are sent from officers to employees. With the advent of technology, the issuance of memorandums is often limited to topics of general interest, like organizational meetings or policy changes. If I were a lead engineer in Cards4U, Id maximize the use of faster and more efficient tools to aid me in communicating with other members of the team, as well as company executives and potential customers.    That means e-mails will be the primary source of communication among the team members, since sending and receiving messages take only a few seconds to a few minutes.   E-mail communications are convenient, does not need to be too formal, and can be accessed anytime, anywhere.   The memos will be utilized to inform the CEO or customers regarding product presentations and updates. Since Im a lead engineer in a creative design group, presentations using PowerPoint or Flash would be very useful in showcasing latest designs and innovations.   Reports are also necessary to document the progress, activities, and changes in the production department.   Face to face meetings with customers are important to establish rapport and get them to buy your designs, or get their feedback. If face-to-face meeting is not possible, conference calls can also be used.   Meeting the CEO for updates and developments would also require face-to-face encounters.   However, if the chief executive initiated conversation using e-mails, then, I should take his lead and reply using the same medium.   But if the message were sent through the more formal memorandum, then the reply would also be of that kind. More importantly, in any type of business communication that I would send, the messages should be concise, direct to the point, and professional. References Business/Professional Writing.(1995-2004). OWL at Purdue University.   Retrieved December 4, 2007, from:   http://owl.english.purdue.edu/workshops/pp/index.html#business Ramsey, L. (2005). Business E-mail Messages Professionalism.   Retrieved December 4, 2007, from, http://website101.com/email_e-mail/e-mail_business-etiquette.html Kotelnikov, V. Effective Business Communication. Retrieved December 4, 2007, from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.1000ventures.com/business_guide/crosscuttings/biz_communication_main.html

Friday, September 20, 2019

Computer Vision In Bad Weather.

Computer Vision In Bad Weather. Saswati Rakshit Aim: To take advantage of bad weather in estimation of depth of a scene from its image. As in bad weather atmosphere modulates original information of an image to the observer so based on observation,we develop model methods for recovering scene properties(e.g. 3D structure,depth etc). Scope/Application: Computer Vision is widely used in various fields now a days. It is used in Optical character recognition: Technology to convert scanned docs to text  Face detection,Smile detection: Many new digital cameras now detect faces and smiles. surveillance and traffic monitoring. Image to a 3D model : turning a collection of photographs into a 3D model Google Self driving Car uses computer vision for distance estimation Introduction : Vision and Atmosphere: Normally in good weather we assume reflected light passes through air without attenuation.so it is assumed brightness of an image point in the scene will be same.But due to atmospheric scattering,absorption and emission light intensity and color are altered. Here our main consideration is on scattering. Bad weather(Particles in space):- weather condition differ in type and size of particles and their concentration. Air (molecule): scattering due to air is minimal Haze (aerosol): haze is certain to effect visibility. Fog (water droplet): Fog and haze has similar origins.but haze extends to altitude of several miles while fog is few hundred feet thick. Cloud is present in high altitude. Rain and snow both effects in image. Here our main consideration is on haze and fog because they appear in low altitude as compared to cloud. Mechanisms of atmospheric scattering Scattering is dependent on particle size and shape.small particles scatter equally in forward and backward,medium size particle scatters more in forward direction and large particle scatters all in forward direction. In nature particles are separated from each other so they scatter independently.i.e. do not interfere others.but In multiple scattering a particle is exposed not only incident light but also light scattered by other particles. Single scattering function can be written as follows I(Ó ¨,ÃŽ »)=E(ÃŽ »).ÃŽ ²(Ó ¨,ÃŽ ») (1) Where E(ÃŽ ») is total incident flux on the volume per unit cross section area I(Ó ¨,ÃŽ ») is flux radiated per unit solid angle per unit volume of medium and ÃŽ ²(Ó ¨,ÃŽ ») is the angular scattering coefficient Objectives: To identify effects caused by bad weather that can be turned to our advantages.understanding attenuation and airlight model that is helpful to measure depth maps of scenes without making assumption about scene properties or the atmospheric conditions. System flow: Here our main goal is to estimate depth and forming 3D of a scene in bad weather condition. For this purpose we used Two different scattering model 1) Attenuation model 2) Airlight model Now first we have used attenuation model and In this model image is taken at night.so environmental illumination are minimal. To estimate depth of light sources in the scene from two images taken under different atmospheric conditions. And applying different mathematical formula used in attenuation model we can compute relative depth of all sources in the scene from two images taken under two different weather condition. Next to work with airlight model we need images in day or when environmental illumination can not be ignored.that is image of a scene is effected by airlight. After selecting the 2D image we apply mathematical formulas of airlight model and comparing the intensity of scene point depth can be easily measured an 3D reconstruction of that scene is also possible. Mathmatics And Description: Attenuation Model We know that beam of light that travels through atmosphere can be attenuated by scattering.and the radiance(intensity) decreases if pathlength increases. Attenuation model developed by McCartney is summarized below If a beam passing through a small sheet(medium) of thickness dx, intensity scattered by the sheet can be written as follows I(Ó ¨,ÃŽ »)=E(ÃŽ »).ÃŽ ²(Ó ¨,ÃŽ ») dx [it represents scattering in Ó ¨ direction] Now total flux scattered in all direction is obtained by integrating over entire spherical sheet φ(ÃŽ »)=E(ÃŽ »).ÃŽ ²(ÃŽ ») dx -(2) fractional change in irradiance at location x can be written as follows: -(3) By integrating both side of eqn(3) between limits x=0 and x=d we get E(d,)= -(4) Where I0(ÃŽ ») is the intensity of the point source and d is the distance between object and observer’ Sometimes attenuation due to scattering can be expressed in terms of optical thickness which is T= [here is constant over horizontal path] Here eqn (4) gives direct transmission which we get after removing scattered flux. Airlight Model Here atmosphere behaves as source of light.environmental illumination has several light sources including direct sunlight,diffuse skylight and light reflected by the ground.In airlight model light intensity increases with pathlength and so apparent brightness increases. If the object is in infinite distance the radiance of airlight is maximum and radiance of airlight for an object right in front of the observer is zero. To describe the geometry of that model,first we need to consider environmental illumination along the observer’s line of sight is assumed to be constant but direction and intensity is unknown. Let the cone of solid angle dω subtended by a receptor at observer end.and truncated by the object at distance d. This cone between observer and object scatters environmental illumination in the direction of observer.so it acts as airlight(source of light) whose brightness increases with pathlength. So the small volume dV at distance x from observer is dV= dω x2 dx Now the intensity of light incident on dV is dI(x,)= dV k = dω x2 dx k †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦(5) now light scatters in dV.so irradiance it produces at observer end is dE(x,) = †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.(6) [also given in eqn (4)] Now we can find radiance of dV from its irradiance as: dL(x,) = = †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..(7) by substituting (5) we get, dL(x,)= now we will find total radiance of pathlength d from observer to object by integrating the above expression between x=0 to x=d L(d,)= k (1-) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.(8) If d =∞ the radiance of airlight is maximum L(∞,=k So , L(d,)= L(∞, (1-) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦(9) Estimation of depth using Attenuation Model: In this model image is taken at night.so environmental illumination are minimal and so airlight model is not chosen.At night bright points of image are normally street light,windows of lit rooms.In clear night these light sources are visible to observer in brightest and clearest form but in bad weather condition the intensity diminish due to attenuation. Our goal is to estimate depth of light sources in the scene from two images taken under different atmospheric conditions. Here image irradiance can be written using eqn(4) as: E(d,)= g (10) [g is optical parameters of camera] If the detector of the camera has spectral response s(ÃŽ »),he final image brightness value is E/== (11) We know spectral bandwidth of camera is limited so we can assume as constant. And we can write, E/=g=g I/ (12) Now if we take image in two different weather condition i.e. in mild and dense fog then there will be two different scattering coefficient. Let it will be ÃŽ ²1 and ÃŽ ²2.now if we take ratio of two resulting image brightness we get R== -(13) Using natural log R/=ln R= †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..(14) This ratio is independent of camera sensor gain and intensity of source. In fact it is only difference in optical thickness(DOT) of the source for two weather conditions. Now if we compute the DOT of two different light source and take the ratio we determine relative depths of two source locations So we can write, = †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.(15) Since we may not entirely trust the DOT computed for any single source.so above calculation can be made more robust = †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..(16) [here we assume to find the intensity of a single source pi,which is at distance di from observer.so to calculate its relative depth from other sources we need to compute depth of all sources of the scene upto a scale factor] The main goal of using this model is to compute relative depth of all sources in the scene from two images taken under two different weather condition. Estimation of depth using Airlight Model: At noon or daytime in dense haze or fog or mild fog most visible scene points are not illuminated and airlight effects.airlight causes intensity to increase when distance increases. Here we consider a single airlight image and try to compute 3d scene structure by measuring depth cues. Let,a scene point is at distance d and produce airlight radiance L(d,).if our camera has spectral response S( The brightness value of that scene point is: E/(d)= †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.(17) Substituting it by eqn (9),we get E/(d)= †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦(18) If is constant we can write, E/(d)= †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦(19) Now Let, S= †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦(20) By substituting eqn(19) at eqn (20),and taking natural logarithm we can write, S/= ln S = -ÃŽ ²d †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦(21) Here S/ is scale factor and a 3D structure of scene can be recovered upto this scale factor The part of horizon in the image which has intensity will be the brightest region of the image.(sky background) Future work:Next we will understand and discuss about Dichromatic Atmospheric Scattering and structure from Chromatic Decomposition. References: http://www.canberra.edu.au/irps/archives/vol21no1/blbalaw.html (Accessed on 20.04.2015) Narasimhan, S. G., Nayar, S. K., â€Å"Vision and the Atmosphere†, International Journal of Computer Vision, vol. 48(3), pp. 233–254, 2002. Allard’s Law, http://eilv.cie.co.at/term/34. (Accessed on 18.03.2015) Relation between Radiance and Irradiance, 2013, http://physics.stackexchange.com/questions/68353/relation-between-radiance-and-irradiance. (Accessed on 18.03.2015) Radiaometry and Photometry, http://electron6.phys.utk.edu/optics421/modules/m4/radiometry.htm (Accessed on 28.03.2015

Thursday, September 19, 2019

Racism Kills :: Racial Relations, Racism

Racism dates back thousands and thousands of years back to the caveman times. In the short story â€Å"Desiree’s Baby†, Kate Chopin shows how discrimination by skin color can affect people. Desiree was abandoned and raised by Madame Valmonde. Armand, the father of the baby, was a member of the most notable families in Louisiana. He falls in love with Desiree and marries her. After they have a baby, their relationship quickly corrodes. A few months later, Armand realizes the baby’s skin has a darker tint than usual. He accuses Desiree of being black. Armand tells Desiree he wants her to leave so Desiree takes the baby and â€Å"disappears among the reeds and willows that grew thick along the banks of the deep, sluggish bayou† (Chopin 91) and never returns. Armand finds out that Desiree is black when he reads a letter that her mother sent her that read â€Å"she belongs to the race which is cursed with the brand of slavery† (Chopin 92). The story’s ironic ending has a connection with the story’s setting, imagery, and Chopin’s use of similies. The setting has a major role to the ironic ending because it takes place in antembellum South where blacks are not treated equally to whites. There are several hints at where and when the story takes place. First, Armand’s last name, Aubigny, was â€Å"one of the oldest and proudest in Louisiana† (Chopin 89) which tells us it takes place in Louisiana. Also, Chopin says that Armand owns a plantation and many slaves which wouldn’t have been possible after the Civil War times showing that the story takes place during the antebellum period. The name of Armand’s plantation, L’Abri, is also ironic because it means â€Å"the shelter† in French which is ironic for Desiree because it is a bad place for her not a good place. Chopin explains how â€Å"there was something in the air menacing her peace†. The story wouldn’t take place in any other time period or location because if it did, Desiree wouldn’t be discriminated f or being black, therefore wouldn’t of run of into the bayou along with the baby. Chopin’s use of imagery leads up to the irony at the end of the story the greatest because Chopin contrasts black and white skin colors.

Wednesday, September 18, 2019

Wars of National Liberation and the End of Colonialism :: essays research papers fc

Wars of National Liberation and the End of Colonialism   Ã‚  Ã‚  Ã‚  Ã‚  National liberation is a concept that has been justly and unjustly idealized for many generations. Freedom and independence are rights that every person deserves, and, sadly enough, war is often the only means by which to obtain these basic human needs. Most Americans living today know close to nothing about dictatorships, tyranny and how many people don’t have these rights, which most American people commonly ignore. National liberations are a defensive measure taken by people of a nation against an imperial power who have/are moving in on their nation. Oppressive regimes are generally the cause of a national liberation movement, Vietnam being a perfect example.   Ã‚  Ã‚  Ã‚  Ã‚  The Vietnamese people have been struggling for independence from France ever since the First Indochina War, which resulted in a temporary division of Vietnam into Northern and Southern sections. Northern Vietnam became controlled by Vietnamese Communists, opposing France, whose long term goals involved a unified communist rule of Vietnam. The United States did not favor this plan, in fact, it feared that Communism would gain popularity and eventually spread into all of Southeast Asia, a belief known as the â€Å"Domino Theory.† U.S. troops were sent to South Vietnam to prevent the collapse of the government, but ultimately, this effort failed, and caused the death of 3.2 Vietnamese, 1.5-2 million Lao and Cambodians, and nearly 58,000 Americans.   Ã‚  Ã‚  Ã‚  Ã‚  In the beginning of the Vietnam war, the United States troops were only sent in to keep the South Vietnamese government from collapsing, but with the fall of Diem, the new ruler who had deposed Bao Dai, the former emperor, a more active involvement was required of the U.S. So under president Johnson, the Army of the Republic of Vietnam (ARVN) was formed, but was proven to be less and less effective against the National Liberation Front, the NLF. The NLF was assumed to be the communist in South Vietnam therefore the US took drastic measures to subdue this group. For instance, In January 1963, 2,000 ARVN encountered a group of 350 NLF soldiers at a village called Ap Bac, south of Saigon in the Mekong River Delta. The U.S. was far better equipped and prepared, yet the losses suffered by the ARVN were over 20 times that of the NLF. Despite all this evidence, President J.F. Kennedy believed that the ARVN would be effective. Some people say it was because the NLF fought with more at stake than just their lives, they were fighting for their families and their nation existence.

Tuesday, September 17, 2019

Violent Tv Programs

violent tv programs have been blamed for causing crime rates to rise in many countries. but many people dont agree that violence is related to TV viewing. Discuss the possible reasons for both opinions. give your opinion as to wether or not violent programs should be taken off the air. It has long been asserted that watching crime on television or playing violent video games contributes to violent behavior. In other words, it is what a person watches that allegedly influences and desensitizes him. Thus he becomes violent. Consider the absurdity of such a thesis! . People who are fascinated and excited by violence and other crimes gravitate to particular types of programs and games and immerse themselves in them, some for hours each day. Their absorption with violence reflects their personality. 2. Millions of people view violence in television programming†¦ It is entertainment or news. That's it! The viewers do not consider for a moment enacting what they see. The same is true w ith playing video games. They are solely for recreation. 3. There is such a thing as a â€Å"copycat† crime.A person watches a crime enacted in detail on television and then does the same thing. His decision to do so reflects a mind that has long been fascinated and excited by crime and violence. For every person who might fantasize about, then replicate the crime, millions of people who saw the very same thing reject it, are repulsed by it, and never would be tempted to enact what they watched. Related Articles Massacre for the Media One-Way Trip to Davy Jones' Locker Porn For Pedophiles: ‘Sexy Children' On Parade â€Å"Forced† to Kill You FirstCasey Anthony Is Found Not Guilty Of Killing Her Daughter Find a Therapist Search for a mental health professional near you. Critical is not what is on the screen or in the game but what already resides in the mind of the viewer, reader, game player, or listener. A â€Å"not guilty by reason of television† defense failed many years ago in a Florida courtroom. Violent tendencies reside within the personality, whether or not the person watches programming depicting violence. The television program, the movie, or the videogame do not turn him into something alien to his basic personality.

Monday, September 16, 2019

Class and Gender Roles in Raising Arizona

In the film Raising Arizona, the scene where HI and Ed are sitting outside with Dot discussing the needs of Nathan Jr. is one that relates to our studies of America on Film. The concepts of Class and Gender roles are evident in this scene. HI and Ed can be considered part of the lower-middle class. Glen and Dot are part of the upper-middle class. One of the ways that the film distinguishes between them is that Glen’s job as supervisor shows that he has a more respectable job with higher income. Also, Glen and Dot have many children that they adopted. They are able to support all those children and are actually looking for another one to adopt. This concept of Class also relates to how each couple fits into their gender roles. Prior to marrying HI, Ed had somewhat of a career as a policewoman. She was providing for herself. HI on the other hand, was constantly in and out of prison for robbing the same convenience store. After the marriage, and having obtained Nathan Jr. , they each assimilated into their perspective gender roles. HI left his life of crime behind and got a job to support the family. Ed left her job behind and became a housewife. It was important to mention this before discussing the scene at the lunch table with Dot. The way that HI and Ed fit into their gender roles, and the fact that they are in a lower class than Glen and Dot, shapes the way the conversation takes place. During this conversation, Dot is telling Ed about all the things that they must do for Nathan Jr. Every time Dot mentions something to Ed, Ed looks to HI for answers. At this point, Ed playing the role of the housewife looks to her husband, the provider and man of the house, for all the answers. Class also comes into play at this moment. HI has no clue what the woman are talking about. Since we don’t know much of HI’s past, we can only presume that since he was constantly robbing that store, he has been part of the lower class. HI has no experience in these kinds of things like flu shots and trust funds. Class is also evident here when you consider that Dot is aware of all these things. Since she is part of the upper-middle class, she has responsibilities, or at least knows how to take care of these things. So even though Dot is a housewife and Glen provides for the family, because they are part of the higher class than Ed and HI, it slightly changes the responsibilities of the gender roles. That was a scene that stuck out, at first only the way each person fit into their gender roles. Only after giving it some thought did I come to the realization that Class plays a factor on Gender roles.

Sunday, September 15, 2019

Importance of Education Essay

Generally, at the start of a very young age, children learn to develop and use their mental, moral and physical powers, which they acquire through various types of education. Education is commonly referred to as the process of learning and obtaining knowledge at school, in a form of formal education. However, the process of education does not only start when a child first attends school. Education begins at home. One does not only acquire knowledge from a teacher; one can learn and receive knowledge from a parent, family member and even an acquaintance. In almost all societies, attending school and receiving an education is extremely vital and necessary if one wants to achieve success. However, unfortunately we have places in the world, where not everyone has an opportunity to receive this formal type of education. The opportunities that are offered are greatly limited. Sometimes there are not enough resources to provide schooling. Furthermore because parents need their children to help them work in factories, have odd jobs, or just do farm work. Since it is not traditional, in some places, to receive a formal education, the one who receives an education is usually envied, praised and even admired by members of the community. Children sometimes look at other children with awe. Just the same way as one child might envy another because he got a new pair of sneakers, and wishes he could have too. There is a sense of admiration but at the same time there is a sense of jealousy as well. Seeing your peer doing better than yourself causes some tension and jealousy because of the scarce opportunities available. As a child, it’s hard to understand why there is a difference. Learning subjects in school is not enough. One can learn history, math, science in school, and be â€Å"book-smart†. In addition, one can learn how to live life by knowing what to say when, acting a certain way in certain situations and be â€Å"street-smart†. These two types of knowledge are extremely essential to be successful in life. For example, you can have all the â€Å"book† knowledge in the world about a certain profession, but if you don’t know how to behave with your co-workers and or your superiors, having â€Å"book†Ã‚  knowledge won’t get you too far. But no matter what, education is the key that allows people to move up in the world, seek better jobs, and ultimately succeed fully in life. Education is very important, and no one should be deprived of it.

Saturday, September 14, 2019

The Party’s Over by Richard Heinberg

Energy is the critical element of our daily performance. Energy is the matter of our survival on earth. Those who possess energy possess the world, and balancing our energy needs with the availability of renewable energy sources is essential to provide us with sufficient opportunities to survive tough environmental conditions. To a large extent, we ourselves are guilty of not being reasonable in energy consumption. Moreover, we are responsible for resolving the majority of the current energy issues. Since humans are expected to be reasonable, our attitudes toward energy should be reasonable too. How often we are willing to look deeper into the causes of the major energy crises will also predetermine our chances to balance technological advancement, industrialization, the growing energy needs with the limitedness of energy resources. The Party’s Over by Richard Heinberg Introduction Energy is the critical element of our daily performance. Energy is the matter of our survival on earth. Those who possess energy possess the world, and balancing our energy needs with the availability of renewable energy sources is essential to provide us with sufficient opportunities to survive tough environmental conditions. To a large extent, we ourselves are guilty of not being reasonable in energy consumption. Moreover, we are responsible for resolving the majority of the current energy issues. Since humans are expected to be reasonable, our attitudes toward energy should be reasonable too. How often we are willing to look deeper into the causes of the major energy crises will also predetermine our chances to balance technological advancement, industrialization, the growing energy needs with the limitedness of energy resources. As humans, we constantly seek to capture the most promising sources of energy. In this context, oil has been widely recognized as the most attractive and universal source of energy. However, this impression is at least deceptive, and our energy issues grow out of our unreasonable attitudes towards the most widely used sources of energy. Heinberg (2005) is correct: â€Å"it is because living things are open systems, with energy and matter continually flowing through them, that they can afford to create and sustain order. Take away their sources of usable energy or matter, and they soon die and begin to disintegrate† (p. 11). That is one of the reasons Heinberg (2005) provides – the reasons that should push us toward reconsidering the traditional patterns of energy consumption in society. In other words, where energy serves the basis of stability and social order in society, energy should also be reasonably consumed, and the need to preserve this social order is the basic reason why we should review the traditional ways of using and consuming energy from different sources. Unfortunately, we tend to forget that energy is not inexhaustible; even the basic laws of thermodynamics suggest that the transformation of energy from one form into another is accompanied by losing of the certain amount of this energy in the form of heat. These amounts of energy are readily used but are not easy to reproduce, and if we don’t address the current energy scarcity, we will soon follow the rabbits that in their desire to inhabit Australia (another Heinberg’s example) have sentenced themselves to death. It should be noted, that the example of rabbits is very demonstrative: in simple words Heinberg (2005) tries to explain WHY and HOW we should pay more attention to HOW MUCH energy we consume and how much energy we are able to reproduce. In simple words, Heinberg (2005) explains the consequences which insufficient energy is likely to cause, and apart from disrupting social order and social stability the lack of energy resources leads humans to inevitable death. Since the proliferating rabbits may eat available vegetation at a faster rate than it can naturally be regenerated, the rabbits may actually reduce their environment’s rabbit-carrying capacity; [†¦] the rabbit population will rapidly crash – that is, the rabbits will die off† (Heinberg 2005, p. 19). Even the threat of death cannot serve an argument convincing enough to change our attitudes toward energy. Heinberg (2005) shows that changing our approaches to energy consumption is the matter of life vs. e ath, but we tend to believe that the most serious energy troubles will leave us intact. Moreover, we are not always prepared to look further into the future and to evaluate the long-term impacts of the current energy crisis. As humans, we always seek to establish our rules of the game and to gain and preserve control over the most important natural resources. However, as â€Å"energy supplies are not always limited; there is no free ride; and in the long run, it is in every species’ interest to use energy frugally† (Heinberg 2005, p. 0), our unreasonable energy consumption will lead us to losing control over the resources, and as a result, our lives. As soon as energy comes to an end, we will no longer be able to prove our dominance in the natural hierarchy of species and will be doomed to surrender to the dominant forces of nature. This is one more reason which Heinberg (2005) tries to explain in his book, and if the need to save energy does not seem persuasive, applying for power, omnipotence and natural human dominance is expected to change human beliefs about energy. Does that mean that we are at the edge of the new energy crisis? Does that mean we cannot do anything to improve the situation? Moreover, does that mean that the energy party is over? It depends on how we tend to interpret the meaning of Heinberg’s (2005) â€Å"Party†. If â€Å"party† implies the age of unreasonable energy consumption, then humanity does not have other choice but to recognize that it has finally come to an end. If â€Å"party† is associated with energy in general and energy use in particular, we have not yet lost our chance to expand our survival opportunities. Personally, we can contribute into the development of more reasonable behaviors by being more attentive toward the amounts of energy we use and lose daily. The use of renewable sources of energy may also provide humanity with a chance to preserve its natural dominant position. For example, developing the means to capture usable energy from sunlight can satisfy prodigious energy appetites of industrial societies (Heinberg 2005, p. 156). The age of cheap oil and related sources of energy has gone forever, and even if the oil price falls, we will not be able to replenish what we have lost during the last century. Changing the structure of energy sources, however, will be meaningless without changing human mentality. As a result, whether we succeed to improve our wellbeing and our chances to survive, will depend on how well we work to restructure our personal attitudes toward energy, as far as all social changes begin at the bottom of the social hierarchy. Conclusion. Energy means life, and if we want to survive the current energy crisis, we must also realize that the age of cheap oil has come to an end. Developing reasonable attitudes toward energy consumption is necessary to satisfy the growing needs of industrial societies. Renewable sources of energy could help us maintain social stability, but promoting energy changes is impossible without changing human mentality. As a result, whether we are able to develop effective energy strategies will depend on how we change our individual attitudes toward the principles of consuming and saving energy.

Friday, September 13, 2019

Acknowledgement

The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information. On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the system’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy – is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management – is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database – is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System – is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification – is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie Theater Charging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024Ãâ€"768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk – wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: †¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. †¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. †¢ The system was able to track whom librarian is accountable for the loss of a returned material. †¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: †¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed †¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button †¢ Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA.. Acknowledgement The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information. On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the system’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy – is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management – is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database – is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System – is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification – is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie Theater Charging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024Ãâ€"768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk – wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: †¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. †¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. †¢ The system was able to track whom librarian is accountable for the loss of a returned material. †¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: †¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed †¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button †¢ Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..