Friday, November 29, 2019
Acknowledgement Essay Example
Acknowledgement Essay Chapter 1 The Problem and its Background Introduction The term RFID refers to Radio Frequency Identification, a technology which uses radio waves to automatically identify items or people. Most commonly this involves the use of an RFID tag and a reader device. In general terms, Radio Frequency Identification systems consist of an RFID tag (typically many tags) and an interrogator or reader. The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tagââ¬â¢s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequencyà electromagnetic fieldsà to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the schoolââ¬â¢s library is using the ââ¬Å"Library Systemâ⬠in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the systemââ¬â¢s database which can only store very limited information. We will write a custom essay sample on Acknowledgement specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Acknowledgement specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Acknowledgement specifically for you FOR ONLY $16.38 $13.9/page Hire Writer On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the systemââ¬â¢s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the systemââ¬â¢s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), ââ¬Å"Integrated RFID and Sensor Networks: Architectures and Applicationsâ⬠, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled ââ¬Å"RFID Based Library Management Systemâ⬠which is very similar to the study being conducted by the proponents. In their studyââ¬â¢s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled ââ¬Å"Research Trends in RFID Technologyâ⬠wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, ââ¬Å"Student Recognition Using Radio Frequency Identification for Tarlac State Universityâ⬠, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the ââ¬Å"Design of RFID Interface System: A Prototypeâ⬠conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the studentââ¬â¢s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled ââ¬Å"Study on The Requirements and Options For RFID Application in Healthcareâ⬠proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, ââ¬Å"Storing and Reading Sensor Data from Battery Assisted Passive RFIDâ⬠, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled ââ¬Å"Automated Bus Fare Systemâ⬠is related to the system that the researchers is planning to create. In Balbacalââ¬â¢s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the userââ¬â¢s capability to pay. However, Aquino et. alââ¬â¢s (October 2009) ââ¬Å"Automation of the Movie Theater Charging Procedures Through the Use of RFIDâ⬠proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchersââ¬â¢ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villameââ¬â¢s (2010) research entitled ââ¬Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readersâ⬠, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the systemââ¬â¢s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITOâ⬠¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer ââ¬â an electronic device uses to manipulate data. B. USB Flash Drive ââ¬â is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk ââ¬â wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper ââ¬â use for writing down the documentation and other important information. E. Internet ââ¬â the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials ââ¬â used for additional reference. G. Printer ââ¬â used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the systemââ¬â¢s reliability and the userââ¬â¢s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: â⬠¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. â⬠¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. â⬠¢ The system was able to track whom librarian is accountable for the loss of a returned material. â⬠¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: â⬠¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed â⬠¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button â⬠¢ Module to Include visitors who donââ¬â¢t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA.. Acknowledgement Essay Example Acknowledgement Essay Chapter 1 The Problem and its Background Introduction The term RFID refers to Radio Frequency Identification, a technology which uses radio waves to automatically identify items or people. Most commonly this involves the use of an RFID tag and a reader device. In general terms, Radio Frequency Identification systems consist of an RFID tag (typically many tags) and an interrogator or reader. The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tagââ¬â¢s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequencyà electromagnetic fieldsà to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the schoolââ¬â¢s library is using the ââ¬Å"Library Systemâ⬠in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the systemââ¬â¢s database which can only store very limited information. We will write a custom essay sample on Acknowledgement specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Acknowledgement specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Acknowledgement specifically for you FOR ONLY $16.38 $13.9/page Hire Writer On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the systemââ¬â¢s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the systemââ¬â¢s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), ââ¬Å"Integrated RFID and Sensor Networks: Architectures and Applicationsâ⬠, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled ââ¬Å"RFID Based Library Management Systemâ⬠which is very similar to the study being conducted by the proponents. In their studyââ¬â¢s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled ââ¬Å"Research Trends in RFID Technologyâ⬠wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, ââ¬Å"Student Recognition Using Radio Frequency Identification for Tarlac State Universityâ⬠, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the ââ¬Å"Design of RFID Interface System: A Prototypeâ⬠conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the studentââ¬â¢s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled ââ¬Å"Study on The Requirements and Options For RFID Application in Healthcareâ⬠proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, ââ¬Å"Storing and Reading Sensor Data from Battery Assisted Passive RFIDâ⬠, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled ââ¬Å"Automated Bus Fare Systemâ⬠is related to the system that the researchers is planning to create. In Balbacalââ¬â¢s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the userââ¬â¢s capability to pay. However, Aquino et. alââ¬â¢s (October 2009) ââ¬Å"Automation of the Movie Theater Charging Procedures Through the Use of RFIDâ⬠proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchersââ¬â¢ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villameââ¬â¢s (2010) research entitled ââ¬Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readersâ⬠, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the systemââ¬â¢s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITOâ⬠¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer ââ¬â an electronic device uses to manipulate data. B. USB Flash Drive ââ¬â is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk ââ¬â wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper ââ¬â use for writing down the documentation and other important information. E. Internet ââ¬â the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials ââ¬â used for additional reference. G. Printer ââ¬â used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the systemââ¬â¢s reliability and the userââ¬â¢s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: â⬠¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. â⬠¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. â⬠¢ The system was able to track whom librarian is accountable for the loss of a returned material. â⬠¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: â⬠¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed â⬠¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button â⬠¢ Module to Include visitors who donââ¬â¢t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..
Monday, November 25, 2019
Fellowship Opportunities for Writers in Berlin
Fellowship Opportunities for Writers in Berlin Berlin has long been known for its thriving international arts and literary communities. It is equally known for the support that exists for writers and artists in the city. Centrally located within Europe, it is an easy train ride or flight to other major cultural destination cities, including Barcelona, Florence, Paris, and Prague, and serves as a font of inspiration for creative people from all artistic walks of life. Many are familiar with writers such as Christopher Isherwood, Franz Kafka, and Robert Walser, who found inspiration for their stories in Berlin, and musician David Bowie, who recorded three albums while living in the city. Since moving to Berlin in July 2013, I have immersed myself in the local literary community and have found the following resources for international writers seeking short-term residencies here. American Academy in Berlin americanacademy.de/ Located in the lakeside Hans Arnold Center in the Wansee neighborhood of Berlin, the American Academy offers annual Berlin Prize fellowships to scholars, writers, and artists who represent the highest standards of excellence in their fields. Past Fellows include poets Susan Howe, Tom Sleigh, and C.K. Williams, and novelists Kiran Desai, Jonathan Safran Foer, and Ha Jin. The upcoming class of Fellows for 2014-2015 includes writers Mary Jo Bang, Tom Drury, and Adam Ross. Fellows commit to spend one academic semester (fall or spring) at the Academy, and the prize includes a monthly stipend, partial board, and a residence at the Center in Wansee. The deadline for applications for 2015-2016 is September 29, 2014. Deutscher Akademischer Austausch Dienst/German Academic Exchange Service DAAD North America daad.org The Artists-in-Berlin Program (Berliner Kà ¼nstlerprogramm) of the German Academic Exchange Service (commonly referred to as DAAD) provides about 20 grants to international artists in the fields of visual arts, literature, music, and film, for an approximately one-year stay in Berlin. The grant includes a monthly stipend, an apartment, workspace (studio), and funds for projects. U.S. writers who spent a year in Berlin through the program include Eugene Ostashevsky, Robert Creeley, and Rosmarie and Keith Waldrop. The deadline for applications to the program is January 1, 2015. ZK/U-Zentrum fà ¼r Kunst und Urbanistik zku-berlin.org/ The ZK/U-Zentrum fà ¼r Kunst und Urbanistik (Center for Art and Urbanistics) provides residencies of two to eight months for artists, scholars, and practitioners (curators, activists, autodidacts, etc.) interested in cross-disciplinary theory and practice dealing with the city. Recent participants include poet Stephen Motika and novelist Alan Cunningham. For individual fellows selected for the program, depending on the studio-apartment and the length of the stay, costs can be between 500 and 800 Euros per month. ZK/U will work with selected fellows in support of efforts to obtain funding to cover the cost through external grants. The deadline for applications for the Autumn-Winter 2014-2015 residency is July 27, 2014. American poets who wish to spend time in Berlin, Germany (or other cities abroad), can also consider applying for the competitive Amy Lowell Traveling Scholarship (amylowell.org/), which awards one scholarship of approximately $54,000 to an American poet who agrees to spend the entire year abroad. The deadline for applications for the scholarship is October 15, 2014. Inspiration can be found everywhere. But sometimes, the opportunity to travel can bring you out of a rut and lead your writing in unexpected, and exciting, directions.
Thursday, November 21, 2019
SUMMARY of The Untold Story of Milk chapter 14 Essay
SUMMARY of The Untold Story of Milk chapter 14 - Essay Example The consequence of this realization was the invention of homogenization since it could fix the milkââ¬â¢s emulsion. As such scientists in the late 1890ââ¬â¢s invented the homogenization process as a means of emulsifying margarine. This process entailed the [passing of milk through hair-like tubules machine that helped in breaking the fat particles to much smaller granules hence the milk would remain in an emulsified state. another advantage of pasteurization was that it allowed milk to be transported for long distances. Hence both pasteurization and homogenization ensured that milk would stay emulsified and fresh for longer periods. However, these practices were not easily embraced by the consumers because these processes changed both the milkââ¬â¢s flavor and eliminated the famous cream line present in the traditional milk. Therefore, the industry players had a hard time convincing the consumers about the advantages of skimmed milk. In addition, to the rigidity in the adoption of skimmed milk there are other untold stories behind pasteurized and homogenized milk. Kurt Oster a native German scientist, who fled the Nazi war for America, was the first scientist to research on the connection of skimmed milk and cardiac diseases. His curiosity was however, triggered by the absence of plasmalogen in the arteries and the presence of xanthine Oxidase (XO), a hormone that should not be present in the blood arteries. His initial study was aimed at investigating plasmalogen which forms a substantial part of the surrounding muscles of the heart as well as the cells that form the arteries walls. The lack of plasmalogen in these tissues triggered an urge in Oster to do more research especially after associating it to atherosclerosis. In addition, Oster experienced two heart attacks and this created the rage to research more on cardiac ailments. However, as he researched he did not find
Wednesday, November 20, 2019
The term globalization used in relation to a host of social, economic, Essay
The term globalization used in relation to a host of social, economic, cultural and political processes - Essay Example To provide the reader with a broader meaning of globalization, I provide lists of selected definitions from recent authors and writers. These experts are from different disciplines and organizations as well as from both poor and rich countries. The organizations include the United Nations systems, universities, and leading media outlets. The disciplines include management and journalism. Still, the list must be seen only as a small sample and is not intended to be comprehensive. "It is the inexorable integration of markets, nation-states and technologies to a degree never witnessed before-in a way that is enabling individuals, corporations and nation-states to reach around the world farther, faster, deeper and cheaper than ever before, and in a way that is enabling the world to reach into individuals, corporations and nation-states farther, faster, deeper, cheaper than ever before." "Globalization is the growing interdependence of the world's people a process integrating not just the economy but culture, technology, and governance. People everywhere are becoming connected-affected by events in far corners of the world." "Present day globalization is a unique convergence of technological, economic and political forces of daunting power and influence, having a massive impact on all aspects of public and private life in economic, social, political and cultural affairs at global, national and local levels. As it influences states and their partner actors, it is also exploited and shaped both positively and negatively by those with the foresight and resources to appreciate its power. Yet, so diverse and overwhelming is globalization's manifold influences that no one group or sector can control or stop it. As such, it has been responded to and manipulated by a range of actors in the public, private and civil society actors, is instigated in good and bad motives, and has benefited some social and economic groups, but has hurt others who have become more vulnerable and disempowered due to its influence." -United Nations (2000:10) "Globalization has three dimensions: cultural-ideational, politico-institutional, and economic. There are three ordinarily ranked levels of economic integration: existence of global infrastructure, harmonization and convergence of economic policies and institutions, and/or borderlessness. To understand the policy implications of cross border economic integration, we need to focus on flow of goods and services as well as factors of production-land, labour, capital, entrepreneurship, and technology." -Aseem Prakash and Jeffery A. Hart (1998:611) "All institutions have to make global competitiveness a strategic goal. No institution, whether a business, a university, or hospital, can hope to survive, let alone to succeed, unless it measures up to the standards set by the leaders in its field, any place in the world. The world economy is increasingly becoming global. National boundaries are impediments and cost centers." -Peter F. Drucker (1999:61, 63)"We cannot live as isolated individuals. As market
Monday, November 18, 2019
The role of a project manager Essay Example | Topics and Well Written Essays - 2000 words
The role of a project manager - Essay Example roject manager is an individual who has the general responsibility for the successful planning, initiation, execution as well as closure of a project. A project manager is a person who is responsible for carrying out all the tasks and operations that are included in project management. Thus, the project success as well as failure centralizes on the project managerââ¬â¢s shoulders (Haughey, 2009). This paper presents a detailed analysis of roles and responsibilities that a project manager carries out. The purpose of this research is to analyze the impact of project managerââ¬â¢s performance on a project. This paper will also outline some examples of bad project management. Project management is a systematic way to scheduling and managing project activities and resources from beginning to end. Additionally, these project activities are divided into five phases, first phase is initiation, second is planning, third phase is executing, fourth is controlling, and last phase is completion or termination of the project. In addition, these phases of project management can be used in approximately any kind of project, since their purpose is to organize the different processes of project development (TechTarget, 2008).The fundamental reason for starting a project is to achieve particular objectives. In other words, the purpose for managing the processes as a project is to put attention on the jobs and control for the accomplishment of the objectives on small group or an individual. Additionally, a project is normally a temporary endeavor encompassing a lot of interconnected operations or processes, assigned a considerable cost, and continuing for few weeks or, months, or years. However, the management of a project is a complex and challenging task and the roles of project managers vary with the project requirements (Turban et al., 2005, p.309; Meredith & Mantel, 2006, p.13). The role of a project manager changes with the nature projects. Since, every project has unique nature,
Saturday, November 16, 2019
Definition Nature And The Humanities
Definition Nature And The Humanities Nature is the vague and elusive subject of millennia of thought. It is the tangible self evident life found in both backyards and expansive forests. Nature is a container for and of life, created but uncreatable. It is thought by some to be the creation of deliberate intention but which is unable to be created by human efforts. Of all the elusive traits attributable to this vague object of thought, an important concept may be found behind all of the endless contradictions Nature so fervently thrusts upon its observers: Nature itself may actually be a symbol for something greater which poets and authors have alluded to. The nature of Nature is living. Many descriptions can be attached but dead, lifeless, empty, exanimate are not among them. Often those words are readily employed to describe a place where Nature once was found but no longer resides. Reflecting the ever apparent principle of duality Nature exhibits its closeness to Divinity by being both the most accepting and the most rejecting of forces. Nature will accept any outcast and might very well be so rejecting as to kill anything that dares step into the expansive realm it dominates. Many inhabitants live in the home Nature creates but those creatures only reflect what Nature has given them: life. Yet the recipients are not Nature. Nothing in it can be taken and said to be Nature itself but without the creatures which inhabit it, Nature ceases to live. The closer an object tends to be to the source of life of all that is living, the more it is subject to symbolic attribution. It becomes an archetype. In addition Nature is nebulous, which compounds the capacity for symbolic usage. And the authors who grasp this concept are only able to describe it in a nebulous manner, as they see it. The preceding three cardinal examples lead up to the concluding example of why Nature is so conducive to symbolic attributions. There is a cornerstone reason, more important than all the others as to why Nature holds so much meaning to humans, without which nothing else would matter in our understanding. It is a truth everyone knows but few truly know. This apparent self contradiction so characteristic of Nature gives another hint at what it is. If a person looking for red on a rainbow has found yellow then orange, red is not far off. This leads to the conclusion Nature is an objectively real, living entity given life by its observers. Nature is living but apparently not conscious. Nature is objectively real but cannot maintain its separate existence without the life given to it by both its observers and inhabitants. Nature gives life to everything without which nothing would have life. These truths lead to understanding Nature is alive but might only have a collective unconscious for a mind. Depending on the readers beliefs this may be due to the Creator of life not giving a single physical holding place for consciousness to function. Or it may be because Nature has not evolved enough to have developed an unconscious, let alone a conscious mind. But there may be a more sublime possibility, one which helps explain its symbolic and powerful nature. Nature might be cognisant at the self conscious level of awareness but at a scale unobservable by humans, similar to how cells in a brain exhibit many characteristics of Nature but at a much smaller scale. This is a practical reason, as opposed to the more nebulous reasoning it might at first seem to be. Nature might be too big to be within the human realm of comprehension. And humans might be so small they are outside of Natures ability to grasp. Cells live and die, form into individual types and perform individual functions, attack and defend themselves from other cells, eat and breathe. If the cells veer too far into the expanse of the body they might die from conditions harsh compared to where it was formed. At this time so much space is allotted to the universe as to render numbers hardly meaningful in relation to it, allowing instead only the ruthless application of an equally incomprehensible symbol: the infinite. Beyond the realm of both human comprehension and mathematics, N atures awareness might be found in the infinite. With archaic properties as powerful as these it is no surprise Nature is a strong a hook for symbolism. Still, Nature might only be a symbol for something greater than itself, something that holds the true properties which Nature can only symbolize. Authors who write on the subject seem to allude to not only Nature itself but the power behind it. This seems to refer to a God or Creator. Or it may be a divinity from the complete composition of everything. Authors do not write in consensus of a single Creator but do seem to agree that there is something behind Nature. Not so much religious as spiritual, these writers lead the reader to the conclusion there is a force there. It is a force that Nature is both symbolic and reflective of. Similar attributions can be derived from both this Great Spirit and Nature: living, powerful, dangerous, accepting, and rejecting. Nature may also at the same time, independent of spiritual symbolism, be a symbol of the self. People may go into Nature to reconnect to themselves. We might go to Nature to recharge and get away from artificial lifestyles. To project characteristics of the self onto a hook in psychology is called projecting. This allows for us to hook our own characteristics onto something that is outside us. So Nature could be either a powerful subjective hook which is similar to us in many ways or it might actually posses those traits. Either could be true or both at the same time and still lead people to seek out themselves in Nature as they have always done. Nature dominates. It is a force to challenge the self, allowing for outside experiences representative of internal workings. It waits to dominate or be dominated. Ironically and again consistent in its self contradictory nature, the dominator is waiting for domination. Either created or evolved, Nature remains a battleground to test the self against. It is a force to give meaning to the ability of anyone who puts themselves in its way. To survive a tornado, earthquake or even a night in a tent after roasting marshmallows at a cozy campfire with friends is a symbolic victory of the self over Nature. Nature fulfills a part of the soul which needs to dominate. By accepting this challenge and leaving a much safer civilized city, even for a short period, can give renewed vitality and meaning to life, if you survive. The symbolism of Nature is too expansive to be reduced to a definition any paper is able to give but applied and reasonable thought leads to both some comprehension of Nature and of the divinity it may be a symbol of. People who go to Nature to find themselves will. And people who turn to Nature as a place to recharge their lives with meaning and power will succeed. As long as life exists so will Nature. Although Nature may be damaged by human pollution or other non human events, Nature will live as long as life itself exists. A symbol for life, God and each every individual, it remains a powerful subject for authors, poets and others who have always and will rightfully continue to attribute those symbolic characteristics to Nature.
Wednesday, November 13, 2019
Descartes Skeptical Argument And Reponses By Bouwsma And Malcolm Essay
Descartes' Skeptical Argument and Reponses by Bouwsma and Malcolm In this essay, I will examine Rene Descartes' skeptical argument and responses by O.K. Bouwsma and Norman Malcolm. I intend to prove that while both Bouwsma and Malcolm make points that refute specific parts of Descartes' argument in their criticisms, neither is sufficient in itself to refute the whole. In order to understand Descartes' argument and its sometimes radical ideas, one must have at least a general idea of his motives in undertaking the argument. The seventeenth century was a time of great scientific progress, and the blossoming scientific community was concerned with setting up a consistent standard to define what constituted science. Their science was based on conjunction and empirical affirmation, ideally without any preconceived notions to taint the results. Descartes, however, believed that the senses were unreliable and that science based solely on information gained from the senses was uncertain. He was concerned with finding a point of certainty on which to base scientific thought. Eventually he settled on mathematics as a basis for science, because he believed mathematics and geometry to be based on some inherent truths. He believed that it was through mathematics that we were able to make sense of our world, and that the ability to think mathematically was an innate ability of all human beings. This theory becomes important in Descartes' Meditations because he is forced to explain where the mathematical ideas that he believed we were born with came from. Having discussed Descartes' background, I will now explain the specifics of his argument. The basis of Descartes' entire argument is that the senses can not be trusted, and his objective is to reach a point of certainty, one undeniable truth that fixes our existence. He said it best in his own words, "I will . . . apply myself earnestly and openly to the general destruction of my former opinions."1 By opinions he meant all the facts and notions about the world which he had previously held as truths. Any point which had even the slightest hint of doubt was discarded and considered completely false. Descartes decided that he would consider all things until he found that either nothing is certain, which is itself a point of certainty, or he reached the one undeniable truth he was searching for. In order to accom... ...admirable case for the validity of the senses, but upon careful examination he says very much the same thing as Bouwsma. Namely, that the senses are real to us. Bouwsma came to this point by examining the idea of the evil genius and the idea of "illusions". Malcolm came to it through examining the differences between fact, belief and sensory information. Despite the differences in how they discovered it, they both came to the same conclusion. The point is valid and their reasoning is sound, but it does not prove that Descartes is wrong. The strength of the skeptical argument lies in the fact that it can not be completely disproved. No one can prove or disprove the existence of an evil genius, they can only go so far as to say that it does not matter. This is essentially what Bouwsma and Malcolm have done. They tried to prove that the existence of the evil genius would not make a difference in our lives. For this reason, I believe that although Bouwsma and Malcolm have made a valid point, they have only touched the surface of Descartes' argument. They have succeeded in proving that life is not meaningless, but that was not the purpose of Descartes' argument to begin with.
Monday, November 11, 2019
Student Success
Within the past nine weeks of this course I have learned and used many different strategies that will help improve the continual growth in my education and accomplish my academic goals. Some of the strategies and skills that I will apply in achieving academic success are Axiaââ¬â¢s educational resources, upholding academic honesty, setting and achieving my future goals, managing my time wisely, improving reading comprehension and retention skills, as well as applying my personality and learning styles. Since using Axiaââ¬â¢s educational resources I feel it has brought me one step closer to achieving my academic goals. Axia College has many useful technological tools that provide easy and functional methods of learning. One of the educational tools that I tend to use often is the Center for Writing Excellence. I like this tool because it provides many useful links such as the write point checker, plagiarism checker, as well as the Grammar Mechanics that provides grammar and punctuation rules, notes, and definitions that follow with the skills and drills quizzes. Another tool that is helpful in achieving academic success would be the University Library. Axiaââ¬â¢s University Library is a great tool that provides different search engines like EBSCOhost and Gale Power Search. These search engines provide article database searches, journals, books, theses, encyclopedias and many more. Axia Library is a great search engine that is more beneficial for student success with providing the option to search peer reviewed articles, find a specific publication, choose database by subject, and view all databases alphabetically. The University Library is a useful tool that I will take advantage of in furthering my education and achieving academic success. One major think I have learned in this class was upholding academic honesty is a major and serious policy that we as students must follow. Plagiarism is presenting someone elseââ¬â¢s work, ideas, and accomplishments as your own. I feel that plagiarism is wrong in every aspect whether or not you meant no harm; plagiarism is a serious violation of the student code of conduct and carries many penalties. By me learning and understanding what plagiarism is, this allowed me to create my own work without worrying about paying the consequencesââ¬â¢ for steeling someone elseââ¬â¢s words. Some examples of disciplinary actions you could encounter if caught for plagiarism can include a failing course grade, suspension, or even expelled from the University. Some strategies I have learned to avoid plagiarism would include submitting my assignment to the plagiarism checker at the CWE prior to posting my assignment to my instructor. I have also used the technique paraphrasing the information into my own words by using the dictionary and thesaurus provided by Microsoft Word. Another strategy I have learned was to make sure I am correctly citing my sources; because it indicates that I have respected the ideas of others. I have learned that it is very important to me as a student to uphold academic honesty throughout the rest of my education. Another strategy I have learned and will continue to take advantage of is setting and achieving my goals. I have the skill to set up and accomplish my future goals in life, as well as follow through with the end result in mind. One major long-term educational and career goal that I have set for myself would be to become head radiologist of a Medical Imaging Center. My short-tem goal I have set to reach my long-term goal would be to continue my current schooling with a high grade point average and finish my bachelors in science. Some obstacles I have encountered are juggling school, work, and family responsibilities. I have learned to prioritize my goals as well as arrange and handle things in order of importance. I have realized that Axia degree relates to my future goals with being able to juggle other responsibilities and have the convenience of online schooling without a dedicated time of day to still accomplish my future goals in life. Managing time wisely is another strategy I will use to accomplish my goals. It is very important to me to manage my time because I have so many daily activities on top of getting my school work done. I know that for me to succeed in life and accomplishing my goals I need to put aside extra time for class and studying. I also have to put time aside for working, and taking care of my other responsibilities. For me to manage my time wisely I will have to manage my goals progress as well as using school resources and technology that it provided for me. Another skill that I have learned and still are improving on would the reading and comprehension and retention skill. This is a very important skill to take advantage of for reading comprehension and mastering academic material. Some of these techniques include a few simple steps such as making sure to eliminate any possible distractions for example television, cell phones, etcetera. Also making sure you are in a quiet relaxed atmosphere. Analyzing your environment prior to reading to improve your comprehension is another useful technique on mastering academic material. Another useful tool that I have learned and will use in future courses to come to help improve mastering academic material would be the Survey, Question, Read, Recite, Review study technique as well as pulling vocabulary words from material. The SQ3R is very beneficial with the concept of grasping the material and content in academic readings. The last strategy I will apply to my continual growth in education and accomplishing academic goals would be applying my personality and learning styles. Since I began distance learning I have realized; that when I use certain learning strategies for my personality type and intelligence such as, bodily-kinesthetic intelligence or interpersonal intelligence it makes distance learning easier to manage. Since learning about my multiple intelligences and personality type; it has giving me many study techniques and strategies to apply to my future academic success. Since distance learning I have encountered people with many different intelligences and personality types allowing me to learn each otherââ¬â¢s learning strategies and techniques to build and improve on my weaker learning intelligences and personality types. By making all aspects of my intelligences stronger I will become an active and responsible thinker with the skill to accomplish my goals, the will and self-awareness to learn, as well as the ability to self-manage and monitor my progress. By following these strategies I will be off to a great start in pursuing my continual growth in education and accomplishing my future academic goals.
Saturday, November 9, 2019
The First Amendment
The First Amendment The United States government was established immediately after the American Revolution. This means that the there was no American government before 1776. This also means that the American people were governed by the British for more than a century.Advertising We will write a custom research paper sample on The First Amendment specifically for you for only $16.05 $11/page Learn More The founding fathers were not only aware of the abuses of the British Crown but also the problems that tyranny and the suppression of human rights has brought to the people of Europe and then in the New World. Thus, when after the founding fathers wrote the U.S. Constitution they added an amendment known as the First Amendment, a mere 45 words of legislature that ensured the basic freedoms of all Americans from the late 18th century up to the present. The freedom that Americans experience comes at a price because there are conflicts and problems that arise from the interpretation and implementation of the First Amendment, however, many legal experts are saying that it is simply the price to pay for freedom. and with regards to children it is the responsibility of the parents to The First Amendment can be argued as a safeguard against the rise of tyranny and even the abuses of the majority. The founding fathers knew fairly well what it means to be under the influence and control of the powerful few, the most influential and the elite. They wanted to be sure that there will not come a time that the most dominant group can force others to do their bidding and perform acts against their conscience. More importantly the founding fathers understood the perils of having a national religion ââ¬â even Christianity has different forms of expression ââ¬â and made a way to prevent bloodshed and unnecessary conflicts. The First Amendment thus reads: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or ab ridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances (The First Amendment to the U.S. Constitution) According to legal experts the First Amendment is just a short set of words and yet it has proven its effectiveness for more than 200 years (Smith, 2008). Consider the fact that ââ¬Å"between 1971 and 1990, 110 of the worldââ¬â¢s 162 national constitutions were either written or extensively rewrittenâ⬠and that ââ¬Å"an average of five new constitutions are adopted somewhere in the worldâ⬠(Haynes et al., 2003, p.9).Advertising Looking for research paper on government? Let's see if we can help you! Get your first paper with 15% OFF Learn More Canada for instance had its most recent revision to its constitution completed in 1982 and the French have written and rewritten their own for a total of 15 times (Haynes et al., 2003, p.9). The reason why the U.S. Constitution required no revision for the past 200 years can be partially explained by the brevity, simplicity and power of the First Amendment which has prompted French commentator and one of the most respected observers to American democracy Alexis de Tocqueville to exclaim: Let us look to America â⬠¦ less to find examples than instruction; let us borrow from her the principles, rather than the details, of her laws. The laws of the French republic may be, and out to be in many cases, different from those which govern the United States; but the principles on which the American constitutions rest, those principles of order of the balance of power of true liberty of deep and sincere respect for right, are indispensable to all republics (as qtd. in Haynes et al., 2003, p.9). Much of what Tocqueville wrote can be found in the First Amendment. His praise for the U.S. Constitution can be magnified even further as one begins to analyze the deeper meaning and implications of the First Amendment. Consider for instance that this short stanza contains the following basic freedoms: the first is freedom of religion; the second is freedom of speech; the third is the freedom of the press; and the fourth is the freedom to demand that the government must stop doing wrong (Smith, 2008, p.8). The First Amendment assures that an American democracy is indeed a government by the people and for the people. By creating a constitution that guarantees these four basic freedoms to future generations of Americans is like having a government handing over its power to its citizens. The Federal government is still powerful by all means but it can no longer abuse its power. It was as if the founding fathers made sure that the problems of Medieval Europe will never be replicated in America. For more than 200 years this dream came true. There is no perfect system, there are still problems in this country but the government cannot impose its will on the populace. There are also c itizens who abused these rights but on the brighter side, every U.S. citizen has the freedom to pursue his or her goals in life ââ¬â in pursuit of happiness ââ¬â without someone telling him how to do it.Advertising We will write a custom research paper sample on The First Amendment specifically for you for only $16.05 $11/page Learn More It can be argued that without the First Amendment the United States may have become a free but weak nation. It could have been a weak government with a weak economy because its citizens do not have the license to experiment, to explore and to express what they felt inside. But more importantly the First Amendment guarantees against suppression of basic human freedom and would easily turn this country into a predictable and repressed society where ideas and innovations are stifled. A legal expert was able to describe succinctly the consequences of a rule book without the First Amendment and he wrote: ââ¬Å"Without t he First Amendment, religious minorities could be persecuted, the government might well establish a national religion, protesters could be silenced, the press could not criticize government, and citizens could not mobilize for social changeâ⬠(Buchanan, 2010, p.1). In other words the First Amendment is a safeguard against the tyranny of the few or the many. The value of each member of society has been enhanced because of this amendment to the U.S. constitution. Critique However, there are problems when it comes to interpretation and implementation of the First Amendment and therefore it is inevitable for conflicts to arise. Take for instance the freedom of religion. This is an important component of the First Amendment if one will consider the history of religious persecution in Europe and even in the early days of the American colonies. Therefore, freedom of religion became a major principle incorporated into the U.S. constitution. This means that the Federal Government cannot disrupt Sunday services if the President feels that a particular religion does not conform to his own belief system. This is especially true when it comes to children (Saunders, 2003). There is an argument that children must be protected from the impact of First Amendment rights. For instance children walking past a store selling nude pictures this will have an effect on them but at the same time the store owner has the right to sell his merchandize. There are also pornographic materials that are readily available through the Internet and a child will simply have to have a basic understanding of how a computer works in order to access these sites. However, many legal experts are saying that it is the responsibility of the parents to take care of their children.Advertising Looking for research paper on government? Let's see if we can help you! Get your first paper with 15% OFF Learn More Thus, freedom of religion gives peace of mind to every family who simply wanted to worship their own way. On the other hand there are those who would like to use this freedom to perform acts and establish a belief system that is offensive to the mindset of other people. Take for example religious cults that allow leaders to totally dominate the lives of their members ââ¬â taking their money and their personal freedom away (Snow, 2003). Think of the suicide cults that are responsible for the demise of innocent people. This is just an example of the problematic aspects of the First Amendment. The freedom of speech is another important component of this tenet. This allows individuals and even organizations to voice out their concerns and beliefs. Everyone is entitled to express what he or she feels to be important. Consider for example the freedom to voice out an opinion or a discovery. Without the First Amendment scientists can be ordered to keep their research findings to themsel ves. So the person who discovered the pollution effects of fossil fuel can be silenced by those who may find the report damaging to their business interests. Think of how the world will become if brilliant minds and people of substance are not allowed to speak. The freedom of the press is also another critical component of the First Amendment because censorship can paralyze a democracy. Since a democratic country like the United States is run by elected officials then it is imperative for the voters and the general public to know what their leaders are doing. This is especially important when it comes to government spending because the state collects taxes from its citizens. What if elected officials are able to smother the freedom of the press? Then there will be ample opportunities for corruption because no one is allowed to blow the whistle so to speak. There will also be a severe lack of accountability because no one will know. On the other hand the press can abuse this right. J ournalists can use their tremendous power to destroy the reputation of people. Journalists can be biased in their reporting and will not adhere to the principles of balanced and fair journalism. It is good to know that there are laws in effect that acts as a counterbalance to the freedom of the press. The freedom to assemble is also another major facet of this principle. This freedom goes beyond safety and security. This freedom allows American citizens to complain about mediocrity. In the previous discussion the basic freedoms protects the individual from the tyranny of the strong and the few but this time around the freedom to assemble and to petition the government to redress grievances is the reason perhaps why America is one of the most powerful in the world. It allows the citizens to continuously improve the kind of government that rules over them. However, peaceful demonstrations can easily turn into an ugly riot and disrupt peace and order in a certain place. There are probl ems and conflicts when it comes to the interpretation of the First Amendment but one legal expert was able to put it in correct perspective when he said ââ¬Å"Such difficulties are the price of freedom of speech and religion in a tolerant, open societyâ⬠(Buchanan, 2010, p.1). Americans must see the big picture in order to appreciate the importance of the First Amendment. Conclusion The First Amendment is one of the most important amendments to the U.S. Constitution. By writing it down the founding fathers assured the stability and continuous progress of the United States. There are conflicts and problems that result from the interpretation and application of the First Amendment but if one will look at the big picture the bad outweigh the good. This is because the First Amendment assures everyone that they have the freedom to think and to choose what they believe is right in the path towards success and happiness. The problems that may arise as a consequence of these liberties must be considered as the price to pay for freedom in a wonderfully open and tolerant society. Buchanan, Brian. About the First Amendment. First Amendment Center. 25 Nov. 2010. Web. Haynes, Charles et al. The First Amendment in Schools: A Guide from the Firstà Amendment Center. VA: Association for Supervision and Curriculum Development, 2003. Smith, Rich. First Amendment: The Right of Expression. MN: ABDO Publishing, 2008. Snow, Robert. Deadly Cults: The Crimes of True Believers. Westport, CT: Praeger Publishers, 2003.
Wednesday, November 6, 2019
Going to the Dogs Essay Example
Going to the Dogs Essay Example Going to the Dogs Essay Going to the Dogs Essay Provide two or three reasons to support your argument. My position on this issue Is both ways good and bad, I like dogs as much as some people who Likes them as well. I believe some dogs are friendly and helpful to so many Individual and family. I dont agree with the term to have your dog come to work with you every day, Im k with the once a year like Take Your Dog to Work Day its not much of an effect. However, they are two reasons to point out that, one is Ewing aware of those who may be allergic and those who may be frighten by them. These two reasons are key factor especially in the workplace where people are mostly trying to concentrate within their workplace. Someone who is allergic to a dog may lose focus in their work; however, someone who is frightened will be stressed out and feared to finish up the work. 2. If you were an HER manager of a company, what pet policy would you set and how would you Implement it? If I was an HER manager of a company, I dont know If I would be able to set up any type of policy. : As manager I fervently ought to have each employee and staff perform some type of survey to determine a certain decision that may perhaps be best for everyone within the company as whole. The safety and health of the employee and staff member are my main concern in this matter. However, after a briefly making a decision based upon the survey if certain number of employees out number a small of amount of other employees then something may have to be compromise or accommodate. 3. How would you decide the case of Elizabeth Booth, and which law would you base your decision on? Explain. In Booth case since she has a Doctor note that is understandable due to her medical condition. Someone who is diagnosis with quadriplegic may not be able to reach out for small objects that has falling on the floor. Booth requested for her small dog that Is well trained to help her out In situation Like this. The law that applies to Booth condition Is Americas with Disassembles a law that was passed by the congress In the early ass. Moreover, If the company had a policy that didnt allow dog within the workplace a Reasonable accommodation can take place. Reasonable accommodation includes making acclivities accessible and usable to disable persons, restructuring jobs, permitting part-time or modified work schedules, reassigning to a vacant position, changing equipment, and/or expense (Snell Blander, 2013, p. 107). For example, since she unable to reach out for small objects that has fallen unto the floor we could provide her with a pick up stick grabber to make things easier on her behalf. Snell, S. , Blander, G. (2013). Managing Human Resources: Equal Employment Opportunity and Human Resources Management (up. 106-107). Mason, OH: South- Western.
Monday, November 4, 2019
Strategy management Essay Example | Topics and Well Written Essays - 3500 words - 1
Strategy management - Essay Example According to the author innovation is a discipline that can be learned and practices through different levels and strategic movement of an organisation. Drucker (2014), has evaluated that entrepreneurial strategies are the practices and policies of organisations to establish as well as re-establish the fundamental relationship with the external organisational environment. The author has illustrated that innovation in entrepreneurial strategies assist organisation to adopt changing economic characteristics of market, product, process and industry. It also enables entrepreneurs to search and occupy specialized as well as ecological niche (Drucker, 2014). Druker (2014), has evaluated the importance of innovation in the entrepreneurial approach towards the formulation and implementation of organisational strategies. The analysis of the role of innovation and entrepreneurial approach in the organisational strategies has illustrated various important attributes which as aimed to lower down the barriers towards changes that often discouraged by top management. The author has explained that innovation and entrepreneurial approach has allowed organisations to reform their strategies to secure the leadership position by introducing new products, processes and services. This approach influences the organisations to become more risk-averse while offering greater rewards upon success. The innovative approaches of the business strategy of Blackberry can serve as an important example in this context (Drucker, 2014). Their undeniably captivating and irresistible mobile e-mail facility innovation has assisted the marketers to gain a rapid popularity within global market. Their market strategy to become first-to-market has neutralized the effects of their premium pricing strategy. Hence, the incorporation of innovation and entrepreneurial approach has assisted the organisation to secure leadership position in the market. Alternatively,
Saturday, November 2, 2019
Achieving Food Security in Saudi Arabia with Sustainable Foreign Research Paper
Achieving Food Security in Saudi Arabia with Sustainable Foreign Direct Investment - Research Paper Example The climate of the country is very hot dry in summer and mild cold in winter. The country is blessed to have the biggest oil reserve in on earth, offering its citizens high living standards to enjoy a comfortable living. Nevertheless, the water resources in the country are insignificant making it very hard to the government to be independent in agriculture particularly with the fast population increase. As Saudi Arabia was always relies on imported food, it is untrustworthy particularly with todayââ¬â¢s politics between laws and countries. In addition, Saudi Arabia cannot spend in local agriculture because of water shortages. Therefore, Saudi Arabia sought to put their funds in foreign nations for agriculture. A lot of these investments in deprived nations are not sustainable because of extreme poverty, bad infrastructure and political unsteadiness in some nations particularly in Africa which can put Saudiââ¬â¢s agricultural investment at a high risk. This study is rooted in pr evious analysis and studies, which were carried out in the field of food security in Saudi Arabia through looking at significant academic resources on the topic of FDI, and some cases concerning agricultural investments in deprived nations, which specified on the matter of neo-colonialism and land grabbing. This article investigates agricultural investments overseas and its objective to make agricultural investments further sustainable. It can be used by agricultural bodies and investors to evaluate the risk of FDI in agriculture and also give solutions concerning sustainability to grant food security. This article is split into eight parts. First, it will talk about the global food crisis. Secondly, it will talk about the food security in Saudi Arabia. Thirdly, it will talk about the concept of FDI and its uses on agriculture. Fourthly, it will talk about the challenges of FDIs. Fifth, it will discuss Neocoloniasm and then the Negative aspects of FDI. Finally, it will give the reco mmendations as per the findings along with the conclusion. Global Food Security Over one billion individuals, almost a sixth of the globeââ¬â¢s populace, suffer from chronic (severe) hunger (Heady & Fan, 2010). It is a disaster with devastating and extensive effects. Lack of food weakens the immune system and also slows down a childââ¬â¢s development. 50% of all cases of childrenââ¬â¢s death are caused by hunger (Heady & Fan, 2010). Under nutrition, as well as chronic hunger, mainly arises from widespread poverty. Individuals who are poor cannot afford to buy food. Hungry households use more than half of their income to purchase the food they require to survive with. Food cannot travel from excess to shortage areas across and within a country due to barriers at the border, poor roads, as well as checkpoints along the way (Heady & Fan, 2010). Without adequate food, grownups struggle to work and children, on the other hand, endeavor to learn, making sustainable financial deve lopment tough to attain. The global society normally uses the phrase "food security" to explain not just the availability of food, but also the capability of purchasing food. Food security refers to having a dependable source of food and adequate resources to buy it. A family is regarded to be food-secured when its members do not live in fear of starvation or hunger. Guarantying worldwide food security will only become more complex in the future as the need for food is projected to go up by 50% over the next two decades (Heady &
Subscribe to:
Comments (Atom)