Sunday, December 29, 2019

Louis Armstrong A Leader And His Legacy - 960 Words

Louis Armstrong: A Leader and His Legacy Many people don’t think much about how people from the past have influenced their lives. For example, musicians from the past are often ignored by my generation, even though the music they listen to would never be the same without them. Louis Armstrong is a great example. He was an African American musician, born on August 4, 1901 and died in 1971. In his lifetime, he recorded many songs that are still played today with his trumpet solos and gravelly singing voice. He played music with a passion. He also differently than other musicians at the time, and as his popularity spiraled upward, his impact on music continued to grow. Even today, over a century after his birth, his musical pieces are still praised and he is still honored for being successful as an African American at a time when that was very difficult. To start, Louis Armstrong was a leader. He symbolized civil rights. As I have stated before, Louis Armstrong was an African American male. Because of that, he wasnâ⠂¬â„¢t easily liked. Some white critics would even go as far to say that his music was of the devil and threatened the power of reason. To put it simply, before he became successful, Louis Armstrong had to deal with the same mistreatment that was brought upon the rest of the African Americans, even though he had talent. But despite that, he succeeded. He made a lot of money, and was loved by many people for his music. Armstrong didn’t let the racism controlShow MoreRelatedThe Most Popular Instrument of All Time: The Trumpet Essay892 Words   |  4 Pagesprobably the most popular instrument of all time. With talented musicians like Louis Armstrong and Miles Davis, the trumpet has been able to endure. The purpose of this paper is to highlight the careers of Armstrong and Davis, and how the trumpet became their way into Jazz. Louis Armstrong was born on August 4th 1901 in New Orleans, Louisiana. Louis had a hard and painful childhood. In 1922 at the age of 21 Louis moves to Chicago to play cornet in a band lead by Joe Oliver. In September 1924Read MoreThe Life of Louis Armstrong Essays2727 Words   |  11 PagesThe Life of Louis Armstrong He was known as the greatest of all jazz musicians. He defined what it really was to play genuine jazz music and taught the world to swing. He included joy, spontaneity, and amazing technical abilities. Louis Armstrong was a genius when it came to his inventive musical ability. In this paper, I will tell you about who Armstrong was, his early childhood, accomplishments, and his living legacy. Louis Armstrong was born on August 4, 1901 in New Orleans, Louisiana whichRead MoreLouis Armstrong, A Man Who Was The Most Influential Trumpet Players Of All Of Jazz Music Essay1893 Words   |  8 Pagesthat we know today. One of these individuals is Louis Armstrong, aka Satchmo. Arguably one of the most influential trumpet players in all of Jazz music, Louis Armstrong appears to be a man who was able to accomplish fame with relative ease, when, in fact, Louis Armstrong faced many obstacles throughout his life that he had to overcome, before he was able to change the history of the music industry in our country. The society that Louis Armstrong was born into reflected extreme racial tensions andRead MoreJazz And Its Influence On African American Communities1141 Words   |  5 PagesSlave songs, which were known for their spiritual and gospel sound, were sung by slaves who were working on plantations, railroads, fields, and more. In addition to the spiritual sound, slave songs also featured the call-and-response idea, in which a leader sang one line and the others sang it back. This call-and-response idea became a key element in the improvisation aspect of jazz. Moreover, brass bands also played a role in the creation of jazz. Instruments that were featured in these bands, suchRead More The Work of Langston Hughes Essay1323 Words   |  6 Pages(Rampersad 3) His writing was both depressing and uplifting at times. His poetry, spanning five decades from 1926 to 1967, reflected the changing black experience in America, from the Harlem Renaissance to the turbulent sixties. At the beginning of his career, he was surrounded by the Harlem Renaissance. New York City in the 1920 ¹s was a place of immense growth and richness in African-American culture and art. For Hughes, this was the perfect opportunity to establish his poems. His early work reflectsRead MoreEssay on The Harlem Renaissance and Its Societal Effects 1133 Words   |  5 Pagescultures began to emerge and work as one and enact national organizations.†(International Encyclopedia of the Social Sciences. 2008.) Prominent leaders responsible for shaping the Harlem Renaissance and new organizations for the betterment of black environments extended from W.E.B. Du Bois to Marcus Garvey to James Weldon Johnson to A Philip Randolph. Leaders of this era worked diligently to establish themselves as powerful forces fighting for a cultural change. â€Å"In the early 1920s, Harlem came burstingRead MoreAmerica s Original Music Form : The Influence Of Jazz2552 Words   |  11 PagesAfrican percussion instruments; many likening the occurrence to the meeting between the powerful elements of weather. â€Å"Possibly, the earliest noted use of African rhythms coupled with European classical music was La Bomboula-Danse Negre composed by Louis Moreau Gottschalk in 1847.† (Birthplace of Jazz). The musicians of New Orleans, inspired by the lively tune, commandeered the music and combined it with the tunes drilled in their memories from churches and barrooms. In the process these ingeniousRead MoreEssay On Duke Ellington1506 Words   |  7 Pagesmusician was home-schooled by his parents. His father James Edward Ellington and mother Daisy Kennedy Ellington were both pianist. His father played operatic arias while parlor songs were his mother’s first choice. It is an interesting fact that Duke is not actually Ellington’s name, but it is only his nickname, which children gave him when he was a little boy for his aristocratic manners and the ability to dress elegant things. When Duke was seven years old, he began his piano training and took lessonsRead MoreMiles Davis as the Influence of Jazz Essay1777 Words   |  8 Pagescentury along with Charlie Parker and Louis Armstrong. His versatility landed him at the forefront of bebop, cool jazz, modal, hard bop and fusion (Kirker, 2005:1). His sound went on to influence many other newer forms of music today such as pop, soul, Ramp;B, funk and rap. As one of the last trumpet players, Davis employed a lyrical, melodic style that was known for its minimalism as well as introspection (Kirker, 2005:1). Davis’s influence also extended as far as his ability to assemble great up-and-comingRead MoreAnalysis Of Langston Hughes And His Harlem Dream1639 Words   |  7 PagesLangston Hughes and His Harlem Dream The 1900s found many African Americans migrating from the south to north of the United States in an event called the Great Migration. Many Southern African-Americans migrated to a place called Harlem and this is where the Harlem renaissance originated from. The Harlem renaissance began just after the first world war and lasted into the early years of the great depression. Harlem became the cynosure for blues and jazz and birthed forth a Negro Artist era called

Friday, December 20, 2019

Essay on Internship Reflection - 919 Words

Internships are a learning experience of new skills and improving on previous skills that you have gained. I have through the school tours been training to be a docent, but one day in the past two weeks I had official docent training with other students. Everyone learned the story of the Eel-Stowe and Nathan Clark-Stockade house. Also, we were taught where the lights were in each house, and how to uncover the windows, objects, and hide the covering before the visitors came to the house. Then we learned how to cover the windows and the objects once the day was done. We were told some artifacts that young children may handle when they are visiting the houses for the day. Everyone received schedules and information packets in order to†¦show more content†¦In total there were eight speakers who were trying to help draw more crowds to historical treasures. They encouraged the use of impressive costumes and trained actors and actresses to make the stories docents tell to be more engaging with the public. They did not encourage the historical societies and museums to train their own staff for this type of acting. They wanted to keep historical content within an entertainment realm, since everyone loves a performance. It must be well produced and give a good majority of historical details, but not everything. Thus led to our next few days of school tours where I tried to keep the program with the kids amusing if I was a docent. Another school tour I gave the coordinating introduction and led the students to their first station. Then I went to the Eel-Stowe house where I watched Susan who gave the first tour, and then I helped with the next two groups by doing the two upstairs rooms for the program. I talked about how the people during colonial times stayed warm in the parent’s and kids bedrooms. Once, it was the fourth rotation I watched Tim Chaucer give the tour of the Indian room to the students. After, I was done for the day I talked to Tim to tour his museum and have an archaeology day with him as part of my internship. He is an amateur archaeologist. I was coordinator during another school tour. I gave the students the rules of the Milford Historical Society. During my down time before switching groups IShow MoreRelatedReflections On My Plant Engineering Summer Internship At United Parcel Service2475 Words   |  10 PagesReflections on my Plant Engineering Summer Internship at United P arcel Service Introduction My Plant Engineering (PE) internship experience at United Parcel Service (UPS) allowed me to utilize all that I have learned at Florida Polytechnic University and apply it to real-world work experience. Thus expanding upon my previous knowledge while simultaneously allowing me to grow in new ways that cannot be taught in the classroom. Interning at UPS has helped highlight my fortes and flaws as notRead MoreInternship Reflection : Summer Internships1402 Words   |  6 PagesSummer Internship Reflection Jorry Zhang It’s no secret that internships are the most effective way for students to gain work experience before graduation. In fact, studies show that 7 out of 10 internships turn into full-time jobs. Summer internships provide extremely valuable experience in my chosen field, and they are also plentiful. Because I m too busy to commit as an intern during the school year, the summer could be a great option for me. During this summer break I interned at a network companyRead MoreInternship Reflection754 Words   |  4 PagesI had an amazing time on the ranch for my internship, and feel like I learned a lot about communication and trust. We were given so much responsibility on a daily level that you learned to communicate well with the people around you. Even when you weren’t on shift you were always helping others around the ranch with continuous projects. One thing that I felt was very inspiring was the way all the employees would work together as a unit and choose to be helpfu l when times would get tight. I believeRead MoreInternship Reflection759 Words   |  4 PagesLooking back over the past eight weeks interning with the Vanderbilt University Development and Alumni Relations team, I know that I have changed from my first time walking into the LOEWS building. From first hearing about this internship and applying to finishing two months of projects and informal interviews, I learned so much about the world of Advancement and Development. Not only has a new professional path has opened up for me, I have had a chance to flex a few skills that had not been usedRead MoreInternship Reflection1099 Words   |  5 PagesWhen I first began my Internship, I was very nervous. Ages 0-5 was a new population that I would have been working with and I had no prior experience. Therefore, I knew that there was a lot to learn in this new population. At first, it was very difficult because I had to adjust to the rhythm of the agency in regards of their work (i.e., cli ent notes, home visits, and meetings). I am only there at the agency for 2 days so our duties as clinicians can become overwhelming if not managed on time andRead MoreInternship Reflection1969 Words   |  8 Pagesbecause I never thought to become a tax attorney. At this internship I was able to do basic accounting tasks like balancing checkbooks, booking to general ledger, going over profit and loss statements, and creating balance sheets, but I was also able to do things like help work on and prepare documents for different tax cases. This opened my eyes to a possibly a new career path that I can look into taking in the future. Before starting my internship I was intimidated because I was not sure what I wasRead MoreInternship Reflection Essay987 Words   |  4 PagesMy Reflection: I have been very lucky to complete an internship with Wayne County Bank this summer. It was a rewarding experience and I have gained valuable knowledge that will be beneficial to me as I continue to pursue my career in Finance. Growing up in a small town with a bank that truly serves our community is inspiring. As a high school student, I volunteered to help WCB in any way needed at the Relay for Life or any other activity they hosted. The work day in the Bookkeeping departmentRead MorePersonal Reflection Paper : Internship Reflection2218 Words   |  9 PagesInternship reflection 1 For my internship I have chosen to do something that I am extremely passionate about. I have chosen to become a nanny for the summer. While this is a job that is very common and may be less structured than other organizations involving parents and children, I truly love the job that I do. It allows me to build a one on one connection with the children and the parents. As a speech pathology major this is something that is really important to me. I have always loved kids andRead MorePersonal Reflection : My Internship Essay1551 Words   |  7 PagesCritical Reflection Overview of my internship Mid July I was searching for an internship opportunity for the fall semester in the Lansing area. I felt that in order to separate myself from my peers and climb to the top of my class that I needed to add more work experience under my belt. After searching on multiple job posting websites, I finally stumbled across an Accounting Internship at a Medical IT company. I applied and instantly heard back that I was offered an interview. A few weeks laterRead MoreInternship Reflection Essay870 Words   |  4 Pagesthis short internship are ones that I should not have ignored. That includes ideology that social workers should be honest and trustworthy. As I reflected, I have lost my time I considered it not wasted due to the fact I have touched a few lives, while I was there. The main events that happen that seem that I am responsible for that includes an act of God the hurricane. I recalled going to an interview at Recovery First, and I thought the conversation went well and given the in ternship. I informed

Thursday, December 12, 2019

Business Cycle Theory Survey Of Methods â€Myassignmenthelp.Com

Question: Discuss About The Business Cycle Theory Survey Of Methods? Answer: Introducation In economics, the term economies of scale takes into account the phenomenon of decrease in the cost of production, on average terms, with the gradual increase in the scale of production of goods and services by any enterprise. In other words, as a company goes no expanding and increasing its production, if its average cost of production goes on decreasing eventually, then the company is said to achieve economies of scale. Economies of scale can be of two types, external as well as internal. Internal economies of scale usually occur when a firm itself reduces its cost of production and enjoys an increased production. This is entirely specific to the firm. On the other hand, external economies of scale occurs when the industry, of which the firm is a part, as a whole experiences cost effectiveness and efficiency due to increased scope of operations (David Myers CEcD 2015). Economies of scale, though can be found in many market structures, is of large importance in those markets where it is good to have a natural monopoly. In several scenarios, it may so happen that the presence of a single large firm in an industry is more efficient in terms of cost production and pricing aspects as the presence of more than one firm may increase the cost of productions for both the firms and none can enjoy economies of scale (Lewis 2013). If the commodity provided by that industry is of necessary or merit in nature, like electricity, then it is better to allow only one big firm to enjoy economies of scale and become a natural monopolist such that it can provide the commodity at a much cheaper price due to its low cost of production. It can be seen from the above diagram. As can be seen from the case study provided, the airlines industry in Australia, before the collapse of the Ansett group was more of a duopoly-structured industry with both the competitors Quantas and Ansett, enjoying nearly same market power and a considerable size of the market. However, in 2002-2003, after the collapse of the Ansett group and the emergence of the Virgin Blue group, though apparently the market structure remained of that of a duopoly, it can be considered to be an industry with one and a half enterprises (Aph.gov.au, 2017). This is because, the Quantas emerged as the more powerful and expansive and cash rich one with larger domain of operations. Virgin Blue on the other side, though started as a moderately sized enterprise, was seen to be gaining market importance in the market in spite of their services being limited and constricted, the restraints being imposed by the enterprise purposefully (Varian 2014). As can be seen from the above figure, if only one single firm would have been present in the market, under monopolistic situation, the profit of the firm would have been OP0SN, under Cornot Duopoly Model. However, with the advent of another firm, the profit of the first firm decreases to OP1CN as the price falls due to competition between the two firms. The profit of the second firm becomes NHCD (Carf and Perrone 2013). This can be related to the scenario prevailing in the aviation industry in Australia in 2002-2003, with two prominent competitors in the market. Cornot however assumes zero cost of production, which is purely hypothetical and not true for this case. However, the profits of the firms get shared as suggested by the above diagram. The business cycle of a country shows the dynamics in the economy of that country with time, including both the positive and the adverse ones, which can be seen from the performance of the country with respect to the economic indicators like the growth rates of GDP, inflation and the overall level of unemployment (Gabisch and Lorenz 2013). In this context, taking reference to the data provided for the economy of France in the current period, it can be interpreted that the economy is in its recovery phase of the business cycle. The economy went to a severe recessionary situation, in 2008-2010, much of which can be attributed to the occurrence of the Global Economic Crisis during that period of time, which had immense negative implications on the European countries as a while (Sherman 2014). The economy, with the government budget hitting as low as -7.2 during that time, is seen to slowly recover from the shock, though the budget is still in deficit, the magnitude being much less (-3.4). The GDP growth rate of the country is still low (0.4%). However, the unemployment rate prevailing in the economy has decreased from 10% to 9.6% and there has also been a moderate decrease in the rate of inflation, from 1.2% to 0.8% in the recent times. Thus, it can be asserted that the economy, though not performing extraordinarily, is c onsistently coming out of the recessionary situation and is currently in the recovery period of the business cycle. The current phase of recovery of the economy of France can be represented with the help of the AD AS Model: With the recovery in the economy, as can be seen from the improvement in the budget statistics and the decrease in the unemployment scenario, the aggregate demand of the economy is expected to increase. As can be seen from the above figure, with the increase in the government budget and the decrease in the trends of unemployment, the aggregate demand is expected to increase slowly, which in turn is expected to increase the GDP as well as the overall price levels. Persistence of this trend may help in increasing the supply in the economy in the long run (Benigno 2015). Economic growth, according to the AD AS model, can be achieved if both the management demand as well as the aggregate supply goes on increasing sustainably in the economy, such that the long term goals can be achieved. The aggregate demand consists of investment expenditures, consumption expenditures, government spending and net exports. Increase in these factors helps in increasing the aggregate demand, which in turn facilitates increase in the aggregate supply. In this context, France can experience economic growth by decreasing the interest rates, thereby facilitating investments in the economy. The government can also increase its investments in sectors like health, education and infrastructure, which helps in long-term capacity building, thereby contributing to the economic growth of the country. Employment generation is also a key method for economic growth as it facilitates increase in the aggregate household consumption spending, thereby contributing to the increase in the aggregate demand, which in turn increases the aggregate supply, thereby taking the economy on the path of sustained long term economic growth (Benigno 2015). The policy taken by Macron, regarding the reforms in the labor market of France, is that of deregulation in order to make the labor market activities more flexible. However, the policy, though targeted to increase the number of good jobs available in the market of the economy, does not specifically work towards that goal (Theweek.com, 2017). In this context, a more fruitful policy would have been investing in the development of the skills of the workers and the infrastructure in the economy, which facilitates creation of new jobs. As can be said with the help of the Cobweb Model, an increase in the skill development of the workers and a better infrastructure, in short run may create fluctuations in the labor market due to alterations in the wages and demand for more skilled workers. However, in the long run, stability can be achieved in the labor market in the following way: As can be seen from the above diagram, the Cobweb Model suggests that due to the investment in education and infrastructure, which augments the skill and efficiency of the workers, in the long run the supply as well as the demand for skilled labors increase. This in turn pushes up the real wage rate from W0 to W1 (Ehrenberg and Smith 2016). A higher wage rate, in its turn, increases the purchasing power, thereby increasing the aggregate demand in the economy: The increase in the AD, leads to an increase in the AS too, which in turn creates more scopes of employment, income generation and again an increase in the AD. This cycle goes on continuing such that in long run the economy moves to the point E1, on the Long Run supply Curve. Thus, the policy of investing on the skill development and enhancement of the workers would have been proved to be more beneficial, had it been implemented properly (Benigno 2015). References Aph.gov.au (2017).Australian Airline Industry Parliament of Australia. [online] Aph.gov.au. Available at: https://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/pubs/rp/rp0203/03RP10#dthe [Accessed 28 Sep. 2017]. Benigno, P., 2015. New-Keynesian Economics: An ASAD View.Research in Economics,69(4), pp.503-524. Carf, D. and Perrone, E., 2013. Asymmetric Cournot duopoly: A game complete analysis.Journal of Reviews on Global Economics,2, pp.194-202. David Myers CEcD, M.A., 2015. economies of scale.Economic Development Journal,14(3), p.11. Ehrenberg, R.G. and Smith, R.S., 2016.Modern labor economics: Theory and public policy. Routledge. Gabisch, G. and Lorenz, H.W., 2013.Business cycle theory: a survey of methods and concepts. Springer Science Business Media. Lewis, W.A., 2013.Theory of economic growth(Vol. 7). Routledge. Sherman, H.J., 2014.The business cycle: growth and crisis under capitalism. civil-engineering University Press. Theweek.com (2017).Emmanuel Macron has misdiagnosed France's ailing economy. [online] Theweek.com. Available at: https://theweek.com/articles/705135/emmanuel-macron-misdiagnosed-frances-ailing-economy [Accessed 28 Sep. 2017]. Varian, H.R., 2014.Intermediate Microeconomics: A Modern Approach: Ninth International Student Edition. WW Norton Company.

Thursday, December 5, 2019

Decision Making and Motivating Performance

Question: Discuss about the Decision Making and Motivating Performance. Answer: Introduction: Scentre Group has been selected for the purpose of analysis in context with the remuneration of the executives of the company. The mission of the Group is to own interest in the highest quality regional centers and to make investment in the assets through the redevelopment opportunities. It would ensure that the communities of the Group are enriched by the shopping centers by providing extraordinary retail spaces. It intends to provide the customers with leisure and unique shopping experience. The goal of the company is to ensure that the shopping centers of the Group meets the highest expectations of the customers and retailers (Crosson and Needles 2013). Discussion: Scentre group prepares the remuneration report in accordance with the requirement of the ASX corporate governance council and Corporation Act. Remuneration report focuses on the approach to remuneration of the key management personnel. Established indicators do the assessment of the performance of the executives. Remuneration of the Group needs to be aligned with the interest of the security holders and business strategy of the Group (Needles and Crosson 2013). The remuneration package of CEO of Scentre Group has remain unchanged and the fees of Chairman has witnessed an increase in the financial year 2016. Remuneration practice of Group is benchmarked against its competitors (Datar et al. 2013). Total remuneration of the executive teams such as Chairman and CEO comprise of fixed remuneration and the potential maximum at the risk remuneration through the short-term and long-term incentive plan. Fixed remuneration of Executives such as CEO and Chairman is awarded in cash. The targeted and potential long-tern incentive (LTI) and short-term incentive (STI) is calculated as a percentage of fixed remuneration. Under the short-term incentive (STI) plan, CEO, CFO and COO, 70% of short-term incentives are paid in cash and the balance amount are delivered as the performance right at the end of three years. Under the deferred STI awards, there are no additional performance hurdles. The targeted maximum STI opportunity for CEO was 127.5 and 150. For the LTI, it stood at 135 and 170 (Scentregroup.com 2017). The performance of the top executives such as CEO and Chairman is measured by establishing the KPIs under the development system and performance review. Measuring the performance of the executive against the agreed KPIs determines the actual STI awarded. Performance weighting of CEO under the financial measures comprise of 65% of the group target and for the non-financial measures, it stands at 35% (Scentregroup.com 2017). The LTI are awarded under Performance Incentive Right plan as performance rights. The performance objectives of the KPIs vary according to the role of executives. Senior executive such as CEO is subjected to the performance review in the manner discussed. Valuation of awards made to the executives under the equity-linked plan reflects the performance of the securities on the Australian stock exchange. The value of the awards of the executives fall if the price of share falls (Matherly and Burney 2013). CEO of scentre group can become one of the highest paid according to revelations at the group annual general meeting. It was thought that the remuneration was a misunderstood overpay. In lieu of this, the investors voted against the potential payment made to Mr. Allen and it was related to the structure of remuneration. Chairman of the company Brian Schwartz said that the remuneration practices of the Group is under review (Financial Review 2015). The bonus structure of the company are such that the remuneration paid to the executives are better linked to the performance rather than focusing on the components of fixed salary. On the other hand, Performance of the Scentre Group is measured by using a number of key metrics, which includes growth in the security price and earnings. The Group as the key performance measure uses FFO. FFO is an accepted measure of profitability used by the real estate industry that is recognized internationally. The key performance indicator of Scentre Group is based on financial and non-financial measures and this include construction, retail management, sustainability, strategic targets and the value of the Group. The review of the executive is done annually and there are various performance criteria. The various category of the key performance indicator of Scentre Group are development projects, digital strategy, acquisition, strategic sales, joint venture, financial targets, portfolio management and risk management (Scentregroup.com 2017). KPIs for each executive are set on the annual basis with the intention of motivating them to achieve their performance objectives. Conclusion: Scentre Group is a geographically focused business and the executives of the company has been empowered to operate with autonomy. This help them in achieving their business objectives efficiently. It is clearly observed from the above discussion that the remuneration of the senior executives are paid based on their performances. Performances of senior executives are monitored, as there are established performance indicators. The policies and practices reflecting remuneration of the executives reflect high level of governance. However, it was reviewed by the journal presented from few newspaper that the senior executives are being over paid and in light of this, there is a need to restructure the remuneration policies. Reference: Crosson, S.V. and Needles, B.E., 2013.Managerial accounting. Cengage Learning. Datar, S.M., Rajan, M.V. and Horngren, C.T., 2013.Managerial Accounting: Decision Making and Motivating Performance. Pearson Higher Ed. Financial Review. (2015).Scentre Group CEO Peter Allen could become one of country's best-paid execs. Available at: https://www.afr.com/real-estate/commercial/scentre-group-ceo-peter-allen-could-become-one-of-countrys-bestpaid-execs-20150507-ggw68l [Accessed 9 Jan. 2017]. Guinea, F.A., 2016. The Need For Managerial Accounting Systems.SEA-Practical Application of Science, (12), pp.465-470. Matherly, M. and Burney, L.L., 2013. Active learning activities to revitalize managerial accounting principles.Issues in Accounting Education,28(3), pp.653-680. Needles, B.E. and Crosson, S.V., 2013.Managerial accounting. Nelson Education. Scentregroup.com. (2017).News | Scentre Group. Available at: https://www.scentregroup.com/media/ [Accessed 9 Jan. 2017]. Scentregroup.com. (2017).News Archives | Scentre Group. Available at: https://www.scentregroup.com/news_announcements/?type=media_releases [Accessed 9 Jan. 2017].

Thursday, November 28, 2019

The Fellowship of the Ring Essay Example For Students

The Fellowship of the Ring Essay In The Fellowship of the Ring, the main character is Frodo Baggins, a hobbit from the Shire who becomes the Ring-bearer. The main villain is Sauron, the Dark Lord that forged the One Ring to take over Middle-Earth. In the fellowship, besides the ring-bearer, are three other hobbits, Samwise Gamgee, Peregrin Took and Meriadoc Brandybuck, three of Frodos closest friends. There is also Gandalf, the wizard he is a powerful wizard, second to only Saruman the White. Legolas Greenleaf, son of the Elf King of Northern Mirkwood he is an eleven archer with a true aim. The dwarf Gimli heir to the throne of Gondor, Gimli wields a powerful ax in battle and is a great craftsman. We will write a custom essay on The Fellowship of the Ring specifically for you for only $16.38 $13.9/page Order now He is the true King of Gondor hasnt yet re-claimed his throne but spends his time protecting and aiding the fellowship members, and finally Boromir, oldest son of the Steward of Gondor. He is next in line to be the Steward of Gondor, but doesnt always seem trustworthy however, as time passes he forms a bond with the Halflings (the hobbits) and is very protective of them.Yet they all have some talent or purpose in aiding Frodo in the quest. The book takes place in different parts of Middle Earth during the Third Age. The mood is often quite tense with suspense and a sense of doom. They are in constant danger, always being watched or hunted.The hobbits leave their precious homes and travel through the Old Forest to get to Bree, where they meet Aragorn and he aids them in their journey. All five later leave for Rivendell and the mood is quite tense with the Black Riders hunting them down. On the way, they stop at Weathertop, where Frodo is, unfortunately, stabbed with a Morgul blade. Luckily, they all get to Rivendell safely with the help of Glorfindel, an elf. Once there, Frodo is given time to heal before Lord Elrond summons a council and the fellowship is formed with nine members. The fellowship continue on their quest to get rid of the ring and were forced to trudge through Caradhras in order to avoid the dark and secret way. However, they were forced to take that path, after being forced off Caradhras, through the Mines of Moria where it is believed that Gandalf had fallen into shadow in their escape. They next travel to Lothlorien, where they are given food, shelter and advice. Reluctantly, they leave, sailing down the Great River Anduin, resting on its banks and there they try to decide their next destination. They are attacked by Uruk-hai and Orcs, and the Fellowship is broken up THE END. .. read the next oneThis is a really good book and if you havent read it, you should. Many people are reading it now, or re-reading it again. It has a great storyline, lovable and enchanting characters, and a whole new world was created for it. Plus they are making a movie series about it so if you saw the first movie you need to read this to compare how they close they are. Also if you have read the Hobit you owe it to yourself to read this book because it is a great sequel and better in my opinion. It really is the Book of the CenturyWords/ Pages : 555 / 24

Sunday, November 24, 2019

Softchoice Corporation is an information communication technology

Softchoice Corporation is an information communication technology Industry Profile Softchoice Corporation is an information communication technology (ICT) firm. The firm particularly deals with programming tools, database products, and obscure software, and has been authorized to deal with corporate, government, as well as educational licensing programs (Government of Canada, 2013). Canada’s ICT industry mainly comprises of small companies, numbering about 33,300 in total.Advertising We will write a custom research paper sample on Softchoice Corporation is an information communication technology specifically for you for only $16.05 $11/page Learn More A bigger percentage of this number, 86.9 percent (Government of Canada, 2013), deal in computer services and software. On the other hand, a paltry number of 6.2 percent is within the wholesaling industries (Government of Canada, 2013). Larger companies operating in the industry are comparatively few, with close to 75 companies only employing a workforce of over 500 emp loyees in 2011. In comparison, more than 28,300 companies employed not more than 10 employees, translating to 85 percent of all companies in the industry (Government of Canada, 2013). The ICT industry comprises of four main sub-sectors, including software and computer services, ICT wholesaling, ICT manufacturing, and communications services. Softchoice falls under software and computer services sub-sector, which is also the largest among the sub-sectors with an 86.8 percent volume cover of the entire industry. Industry structure and financial performance According to the â€Å"Branham top 250† (2012), the software and computer services sub-sector had combined revenue of over $ 4.997 billion in 2011. This was a marked improvement from the previous year’s revenue amount of $ 4.274 billion, representing a percentage growth rate of 16.92. The top performers in the industry, who also comprise of Softchoice’s biggest competitors, include BCE, Rogers Communications, TE LUS, CGI Group, and Open Text (â€Å"Branham top 250†, 2012). In 2011, both CGE and Rogers Communications recorded modest gains in their business operations, where each of the companies increased their sales by approximately 2 percentage points (â€Å"Branham top 250†, 2012). TELUS, on its part, registered approximately 9 percent growth in Internet and wireless sales, posting $7.98 billion.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More These companies, also referred to as the big three, have tight business competition amongst them. This increases the possibility of other smaller companies in the sub-sector to consolidate together (â€Å"Branham top 250†, 2012). During the same year of 2011, CGI Group worked towards building its new acquisition, Stanely, which was worth $923.15 million (â€Å"Branham top 250†, 2012). The company closed the yea r with its total sales figure amounting to $4.32 billion, representing a percentage growth rate of 15.84 percent from the previous year (â€Å"Branham top 250†, 2012). In a bid to enhance its performance even further, CGI Group has established new independent business units, focusing on health and government areas. The health business area generated about $350 million in global sales in 2011, which represent 8 percent of its entire sales revenue (â€Å"Branham top 250†, 2012). Open Text recorded a landmark performance in 2011 when the company’s annual sales exceeded the $1 billion sales mark in the company’s history. The company’s revenues grew by 13.30 percentage points from the previous year (â€Å"Branham top 250†, 2012). Open Text’s main strategy of business involved acquisition deals that were completed in 2011, which saw the company obtain Metastorm, StreamServe, and weComm. The graph below highlights the cumulative performance posted by Canada’s leading 250 ICT firms (â€Å"Branham top 250†, 2012). Source: â€Å"Branham top 250† (2012)Advertising We will write a custom research paper sample on Softchoice Corporation is an information communication technology specifically for you for only $16.05 $11/page Learn More From the graph above, it is observable that the ICT industry’s cumulative revenue performance has been increasing over the years. For instance, between 2003 and 2006, the annual revenue figures for each year exceeded the previous year’s sales results. The average growth indicates that the industry is set to continue with its annual growth in the future, where the companies are set to make additional sales. Although there are secluded years, specifically 2007 and 2009, where the total annual sales made were less than the previous year’s, these are isolated cases and are not expected to affect the growth pattern going forward. Co mpetitive Strategies within the Industry Buyer power The buyers have a modest bargaining power in the industry. The software and computer services sub-sector comprises of 86 percent of the total 33,000 companies in the ICT industry in Canada (â€Å"Branham top 250†, 2012). This implies that the buyers have many choices from where they can seek to acquire their software products. It is evident that the firms compete with each other as they seek to win over the market because of relatively large number of companies in the sub-sector. This competition, in turn, provides the buyers with the necessary bargaining power advantage because the firms use such aspects as price to base their competition. However, the firms also enhance their business positions because firms such as Softchoice specialize in obscure software products. This lowers the buyers’ overall power to bargain, making it generally modest. Supplier power The suppliers’ bargaining power is equally modest in this industry. With the high number of industry players exceeding 33,000, it means this huge number of ICT firms is depending heavily on the suppliers to enable them achieve their business objectives (â€Å"Branham top 250†, 2012). The suppliers deal with a large clientele base, thus making them to enjoy high frequency business. However, it is also important to note some of the players in the industry, such as BCE, TELUS, and Rogers Communication are well established and have the potential of integrating backwards (â€Å"Branham top 250†, 2012). With Softchoice’s specialization in obscure software, the company enjoys more bargaining power over suppliers. Only a few suppliers can serve the company’s needs fully, giving it the necessary bargaining power.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More New market entrants The industry has fewer barriers to entry. Although the five leading industry players have consolidated the market, many other smaller players still exist and do their business. There are numerous sub-areas within the software and computer services sector, where firms can specialize in and still establish themselves (â€Å"Canada information technology†, 2012). Although the established firms in the industry benefit from the economies of scale advantage, they focus their attention on a larger area of the ICT industry. This, in turn, gives the smaller industry players room to penetrate into the industry as they only focus on smaller areas of the industry. The smaller industry players most likely provide high quality products and services, which attracts a significant portion of the market. Threat of substitution The threat of substitution is low. Although the wider ICT industry has many players concentrating on the same market, each of these companies has foc used on specialization in different areas. Thus, customers with particular ICT need may find it difficult to locate an alternative ICT firm that deals in the exact area. Although many software and computer services firms exist in the industry, Softchoice specifically deals in obscure software. The major companies in the industry may be dealing with a wide range of service and product areas, but they also specialize in specific business areas to improve the quality of their performance (â€Å"Canada information technology†, 2012). Competitive rivalry Competitive rivalry is high in the industry. There are many companies in the industry that have a great potential and power to compete in the market. The large established companies have resorted to acquisitions to increase their competitive edge over other industry rivals (â€Å"Canada information technology†, 2012). With the industry trends indicating growing cumulative revenue each year, the players are working hard towa rds ensuring that they capture a significant portion of the total market revenue. Companies are also differentiating their services to limit competition by focusing on particular areas as a way of enhancing their quality performance. Industry Trends and Emerging Opportunities Increasing Expenditure on RD ICT industry players have been setting apart an increased volume of their revenue for funding research and development activities. In 2010, for instance, the ICT firms increased their RD expenditure to 15.44 percent compared to 14.78 percent in the previous year (Anderson, 2013). This trend highlights the fact that the industry players recognize the importance of investing in their core expertise, as well as the products and services that they deal with to increase their competitive edge within the global playing field (Anderson, 2013). With ICT relying heavily on research and development activities because of its continuous growth and advancement, there is a higher likelihood that the ICT industry players will continue experiencing a growing need to spend more revenues on the RD activities. Increased spending on research and development increases the opportunity of the ICT firm to grow even further. It increases the probability of enhancing quality and general performance, which will in turn attract more buyers. With an increase in the number of the buyers, the firms are likely to make more sales and improve their revenues. Increased RD activity is also likely to expand the Canadian ICT market to include the international buyers. Increasing Value of the Canadian Dollar over the US Dollar The Canadian dollar gained value over the US dollar towards the end of 2010 (Anderson, 2013). This was the second time that such a trend had been noticed over a period of 30 years. Over 40 percent of the Top 250 companies generated more than 50 percent of the total sales from the international market during the same year (Anderson, 2013). In particular, over 30 percent of the listed firms produced in excess of 50 percent of their total revenues within the US. This played a critical role in increasing the Canadian dollar’s value with respect to the US dollar (Anderson, 2013). A continuation of this trend will subject the Canadian ICT firms concentrating on the international market into increased competition. This is due to the high product cost influenced by the increasing value of the local currency over that of the US dollar (Anderson, 2013). In essence, the Canadian firms seeking to position themselves as efficient near-shore alternatives compared to the traditional outsourcing destinations must rely on other significant strengths. This may include looking more into innovation and leadership aspects, instead of concentrating on overall savings on labor cost (Anderson, 2013). In other words, the increase in value of the Canadian dollar over the US dollar is a threat to business for the ICT firms because it diminishes the overall profitability of the firms. Mergers and Acquisitions The ICT industry in Canada is experiencing an increase in mergers and acquisitions. Several of the established firms in the industry have acquired other companies, including both emerging startups and established firms to complement their existing technologies and entrance into new markets (Anderson, 2013). Foreign players have also acquired several other small and medium sized Canadian ICT firms to earn leverage into the market. In 2010, for instance, ICT players BreconRidge, Coretec, Protus, Brainhunter, as well as Fusepoint Managed Systems and Clarity System were all acquired by other firms (Anderson, 2013). This trend is likely to continue going forward as uncertainty in the industry pushes firms towards seeking to strengthen their presence in the market. This creates additional market opportunity for the established firms pursuing the acquisitions and mergers because it helps them to expand their potential market. It also increases their are as of specialization as the acquired firms could be specialists in different ICT areas. However, this trend is a threat to the smaller firms that seek to remain independent. It consolidates the market and gives the established firms more power to manipulate the industry to their advantage, leaving the smaller firms with little capability to challenge them. Importance of Information Technology to the Industry Technology is a critical aspect of the ICT industry. ICT as an industry will be non-existent without technology. Presently, the world is considered as a global village, where information flows very fast from one region or part to another. The entire globe is interconnected, where networks play a critical role in generating large amounts of data flow that accumulate on a daily basis (van Weert Tatnall, 2005). Technology has had its immense share in supporting and enabling this to be a reality. Improved computing devices with high performance power, including laptops, desktop com puters, and Smartphones all have the ability to browse the Internet at fast speeds and enhance the ICT interconnectivity (van Weert Tatnall, 2005). As advancements in technology continue to be witnessed, the ICT capacity is also growing. There is an emergence of a new technological trend, Internet of Things (IOT), which has made it virtually possible to connect anything via such methods as Machine-to-Machine communication (M2M) (Giusto et al., 2010). The new network is sustained by new technological developments where information sensors are embedded in home appliances, houses, machines, cars, as well as extended to such social infrastructures as transportation and energy systems. Technology is also enabling unprecedented progress where meaningful patterns are found from undertaking an analysis of the diverse and vast data flow from the Internet (Giusto et al., 2010). ICT has been settled upon as the appropriate means of enhancing back office productivity within public organization s. Many organizations are increasing their efficiency. Consequently, they are able to deal with real time information and details that they require for their operations. Technology is playing a critical role in exploiting new business areas, which have made ICT to be a virtual boundary-less area. ICT is expanding in both quality performance and reliability as more technological innovations come into play (van Weert Tatnall, 2005). By extension, the quality of life is also improving as individuals are able to learn fast, products can be produced more efficiently, firms can avert losses at the opportune time, and the health sector is capable of enhancing its performance. References Anderson, D. (2013). Canadas ICT industry: a work in progress. Retrieved from branhamgroup.com/research-reports-1/canadas-ict-industry-a-work-in-progress Branham top 250 Canadian ICT Companies 2012. (2012). Backbone Magazine. Retrieved from backbonemag.com/Magazine/2012-04/Top300-2012/canadian-ict-companie s.aspx Canada information technology report Q1 2012. (2012). Research and Markets. Retrieved from researchandmarkets.com/reports/2077623/canada_information_technology_report_q1_2012 Giusto, D., Iera, A., Morabito, G., Atzori, L. (2010). The Internet of things: 20th Tyrrhenian workshop on digital communications (1st ed.). New York, NY: Springer. Government of Canada. (2013). Information and communications technologies (ICT). Retrieved from ic.gc.ca/app/ccc/srch/nvgt.do?lang=engprtl=1sbPrtl=estblmntNo=123456129319profile=cmpltPrflprofileId=2059app=sold van Weert, T. J., Tatnall, A. (2005). Information and communication technologies and real-life learning: New education for the knowledge society. New York, NY: Springer.

Thursday, November 21, 2019

The effect of social media on Arab spring Research Proposal

The effect of social media on Arab spring - Research Proposal Example Social media diffuse social, economic, political, and cultural barriers within the society (Qualman 8). The speedy propagation and adoption of technology has fueled the use of social media as a tool for activism. The Arab Spring in Egypt, Libya, Tunisia, Syria, and Yemen demonstrate this potential. During the Arab Spring, social media played a critical role in spreading information and unifying the protesters. Social media can be defined as online media content created and shared by individuals on the cyberspace using freely and easily accessible websites. The websites employ interfaces that enable people to generate and post images, videos, as well as chat and text information. The created information can be shared with a select group of friends or the entire public domain. Social media incorporate blogs, wikis, forums, content communities, micro blogs, social networking sites, and podcasts. Social media detail characteristics such as participation, whereby individuals make contributions and receive feedback from the target groups. Similarly, it also incorporates openness, whereby social media encourage participation and feedback from all through voting, commenting, and sharing of information. Thirdly, it involves conversation, whereby social media is two-way contrasting broadcast oriented traditional media. The community aspect arises from allowing people to mutually share universal interests such as art and politics. Lastly, social media enhance connectedness by linking people, sites, locations, and resources. To a large extent, social media enhance democratization of information; transforming users from content readers to content publishers (Al-Deen & Hendricks 205). Social media effects can be classified into behavioural, attitudinal, cognitive, and emotional. Social media play a key role in the learning and social

Wednesday, November 20, 2019

BORDER SECURITY USING WIRELESS SENSOR NETWORK Research Paper

BORDER SECURITY USING WIRELESS SENSOR NETWORK - Research Paper Example Borders are critical features of any state since they define territory. Individualterritories on the other hand have specific rules and acceptable ways of conduct which must be protected. As such, it is important that borders should be protected so as to keep away intruders such as illegal immigrants, smugglers, and terrorists. WSNs are being embraced in surveillance because they are cheaper and more effective as compared to traditional surveillance methods such as radar or satellite (Wang &Guo 358). Wireless border control sensor network architecture is made up of three main components: sensor nodes, gateways, and task managers. Sensor nodes are the components at the end of the architecture which capture the data at the border (through sensing). They are also referred to as the sink, source, or actuators. As such, movement for example at unauthorized areas can be sensed from the sensor nodes. Several sensors are situated differently and are usually interconnected. The sensor nodes may do some calculations before transmitting the data at the border though a gateway (Kalita, &Kar 2). Gateways on the other hand are proxies for the wireless border control systems. They allow the system administrators to interface Motes to some relay points such as personal digital assistants and personal computers for monitoring. In short, all the interconnected sensor nodes relay their information to the administrator through the same proxy (gateway) (Maharrey, Lim, &Gao 7). Gateways may be active (allow nodes to actively relay data to the system (gateway server), passive (allows gateway to send requests to sensor nodes), or hybrid (performs tasks of both active and passive gateways) (Villegas, Tang, &Qian 4). The task managers are the receiving ends of the wireless border control sensor network architecture. After the sensor notes acquire information from the

Monday, November 18, 2019

Proposal Essay Example | Topics and Well Written Essays - 1250 words - 1

Proposal - Essay Example This means that students may have to reschedule their arrival in the early morning even if their classes are in the afternoon session just to get a better parking spot!! Further, parking space provided for faculty members is 3-4 decks high and lies partially unoccupied due to its better parking space Vs vehicles ratio. And if students use these slots during rush hour, they are penalized through issue of tickets or towing away of vehicles even if these slots were vacant. Some students prefer to park their vehicles in the off-campus parking slots like Starbucks when their classes are closer to such parking lots than student's parking area. Unfortunately, students having classes at West campus or the forum area cannot do this! Similarly, some faculties like business have their classes closer to Beaver stadium, but is it possible for all university students to change over to business faculty simply to avail of this advantage! This is an unnecessary benefit for some students which also needs to be streamlined. This acute problem of parking facility for the students often creates unnecessary anxiety in terms of finding a parking slot at the last moment, lack of parking slot during the rush hour, waiting for a bus/walking down all the way and delays on such accords leading to students being penalized for coming late, feeling of a bias among students due to underutilized parking slots for faculty members and lack of interest by the university authorities to resolve the matter. This paper aims to suggest workable solutions to the problem and thereby help them stay motivated and happier while pursuing their studies at the university. THE SURVEY With a view to finding out whether this problem is unique to this author or the case is same with all faculty members, the undersigned conducted a basic survey of 200 students on this subject. The common view was that there exists an unreasonable and acute parking problem for the students of this university which needs to be resolved on due priority. The essence/terms of reference and outcome of the survey are appended below for a quick glance by one and all: 1. Do you think the university suffers from a parking problem Ans. Yes - 145/200 2. Where do you park usually Ans Campus - 130/200. 3. Would you like to park on campus Ans. All 200 students responded with a big YES. 4. Which of the following areas is the best area for rebuilding a parking deck a) Blue area b) Red area c) Yellow area d) Black area e) Green area Ans. Black area - 70/200. 5. Which available parking deck is the most convenient one to convert a) Park 1 b) Park 2 c) Park 3 d) Park 4 Ans. Park 2 - 80/200 6. If all solutions fail due to monetary issues and/or long term solutions, are you interested to help implement a point system Ans. Yes 145/200 7. Are you interested in being part of a student organization that will proceed and help make results happen Ans. Yes - 100/200. BUILDING/CONVERTING A PARKING DECK FOR STUDENTS As is evident from this survey, Black area and Park 2 parking deck seem to be popular and convenient choices for providing parking facilities for the students. However, the final decision as to where the parking deck should be provided is up to the committee in charge of making such decisions. While one deck can be constructed at Black area, it can be supplemented economically by converting one faculty deck for use by the

Friday, November 15, 2019

Distance Measurement Using RSSI Method in WSN

Distance Measurement Using RSSI Method in WSN Distance Measurement Using RSSI Method in Wireless Sensor Networks Akhand Pratp Singh, Devesh Pratap Singh, Santosh Kumar Abstract. RSSI method gives distance measurement between beacon nodes and unknown node. RSSI is Range-based localization depends on the assumption that the absolute distance between a sender and a receiver can be estimated by one or more features of the communication signal from the sender to the receiver. RSSI measurement is not more relevant because the RF signal is affected by the environment, the exact distance between the nodes cannot obtain by RSSI measurement by RSSI. Keywords: Received Signal Strength Indicator method, RSSI method, Distance Measurement by RSSI. Introduction Wireless Sensor Networks can be generally defined as network of nodes that cooperatively sense and control the environment enabling interaction between persons or computers and the surrounding environment. WSNs are mostly used in military surveillance, industrial process control and environmental monitoring. Node localization is a big problem of wireless sensor networks applications [1].According to estimation of node localization [2][3], the localization algorithms[3] can be divided into two categories: range-based and range-free. Range-based method calculates the localization between neighboring sensors. Several ranging techniques are possible for range measurement, such as time of arrival, time difference of arrival, angle of arrival, or the receive signal strength indicator (RSSI) [3]. Range free techniques solution depends only on the contents of received messages, which does not estimate the distance or angle between the nodes. Typical range-free localization algorithms [7] inc luded Centroid, DV-Hop, Amorphous, MDS-MAP[14] and APIT, and so on [3]. Localization algorithm [7] based on range-based has higher accuracy but requires additional hardware on sensor nodes. Localization of Wireless Sensor Networks Localization [8] is the process by which sensor nodes determine their location. In simple terms, localization is a mechanism for discovering spatial relationships between objects. The various approaches taken in literature to solve this localization problem differ in the assumptions they make about their respective network and sensor capabilities. A detailed, but not exhaustive, list of assumptions made include assumptions about device hardware, signal propagation models, timing and energy requirements, composition of network via homogeneous vs. heterogeneous, operational environment via indoor vs. outdoor, beacon density, time synchronization, communication costs, error requirements, and node mobility [9]. Localization of WSNs is classified in two approaches [5]. Direct Approaches This is also known as absolute localization. The direct approach itself can be classified into two types: Manual configuration and 8GPS-based localization [5]. The manual configuration method is very cumbersome and expensive. It is neither practical nor scalable for large scale WSNs and in particular, does not adapt well for WSNs with node mobility. The GPS-based localization method, each sensor is equipped with a GPS receiver. This method adapts well for WSNs with node mobility [6]. However, there is a downside to this method. It is not economically feasible to equip each sensor with a GPS receiver since WSNs are deployed with 100 of 1000 of sensors. This also increases the size of each sensor, rendering them unfit for pervasive environments. Also, the GPS receivers only work well outdoors on earth and have line-of-sight requirement constraints. Such Wireless Sensor Networks can’t be used for underwater applications like habitat monitoring, water pollution level monitoring, t sunami monitoring [5], etc. Indirect Approaches The indirect approach [5] of localization is also known as relative localization [4] since nodes position themselves relative to other nodes in their vicinity. The indirect approaches of localization were introduced to overcome some of the drawbacks of the GPS-based direct localization techniques [9] while retaining some of its advantages, like accuracy of localization. In this approach, a small subset of nodes in the network, called the beacon nodes, are either equipped with GPS receivers to compute their location or are manually configured with their location. These beacon nodes then send beams of signals providing their location to all sensor nodes in their vicinity that don’t have a GPS receiver. Using the transmitted signal containing the location information[4], sensor nodes compute their location. This approach effectively reduces the overhead introduced by the GPS-based method. However, since the beacon nodes are also operating in the same hostile environment as the se nsor nodes, they too are vulnerable to various threats, including physical capture by adversaries. This introduces new security threats concerning the honesty of the beacon nodes in providing location information Since they could have been tampered by the adversary and misbehave by providing incorrect location information. Within the indirect approach, the localization process can be classified into the following two categories. A. Range-based In range-based [5] localization, the location of a node is computed relative to other nodes in its vicinity. Range-based localization depends on the assumption that the absolute distance between a sender and a receiver can be estimated by one or more features of the communication signal from the sender to the receiver. The accuracy of such estimation, however, is subject to the transmission medium and surrounding environment. Range based techniques usually rely on complex hardware which is not feasible for WSNs since sensor nodes are highly resource-constrained and have to be produced at throwaway prices as they are deployed in large numbers. Some range-based localization techniques are as follows Angle of Arrival, Received Signal Strength Indicator (RSSI), Time of Arrival and Time Difference of Arrival. In this paper we are discussing about the RSSI technique [12][15], RSSI technique does need require additional hardware, which will not increase the hardware cost and the size of the nodes. However, due to RF signals influenced by the environment, the exact distance between the nodes cannot obtain by using RSSI [10][11], so the localization accuracy of nodes are not high. B. Range-free Range-free[5] localization never tries to estimate the absolute point to point distance based on received signal strength or other features of the received communication signal like time, angle, etc. This greatly simplifies the design of hardware, making range-free methods very appealing and a cost-effective alternative for localization in WSNs. Typical range-free localization algorithms[7] included Centroid ,DV-Hop, Amorphous, MDS-MAP[14] and APIT,etc. Received Signal Strength Indicator (RSSI) Measurement Principles RSSI measurement [3] calculates the signal loss in the dissemination process with the theory or experience loss of signal propagation model and distance calculated between transceiver to receiver by path distance formulae. Some measure terms which are important role in RSSI measurement as follows: Path Loss Model Path loss models [3] are free space propagation model, the logarithmic distance path loss model, Hata model, etc. the logarithmic distance path loss model [3] is shown by formula (1): (1) Where d is distance from transmitter to receiver and its unit is km, n is path loss exponent that measures the rate at which the RSSI decreases with distance and the value of n depends on the specific propagation environment, XÏÆ' is a zero mean Gaussian distributed random variable whose mean value is 0 and it reflects the change of the received signal power in certain distance, d0 is reference distance and usually equals 1 meter, PL(d0) is a known reference power value in dBmilliwatts at a reference distance d0 from the transmitter. Received Signal Power at Reference distance Suppose A is the received signal power in the distance d0 between trans- mitter and receiver, the formula (2) can be generated. (2) Where Pt is power of transmitter and PL(d0) is a known reference power value in dBmilliwatts at a reference distance d0 from the transmitter. Distance Calculated by RSSI measurement The RSSI Value at the certain distance is calculated by the given formula. (3) Where RSSI is the received signal power. A is the received signal power in the sdistance of 1meter,n is the path loss index and relates to the environment. Then we select maximum RSSI value and then we convert it into distance by given formulae. After calculating the RSSI values we can obtain the maximum value of the RSSI which is known as RSSImax. (4) Where RSSImax is the maximum received signal power selected from all the RSSI values. A is the received signal power in the distance of 1meter,n is the path loss index and relates to the environment. RSSI Measurement Algorithms When we go through the RSSI method then we have to go through the following step of the algorithms as follows: Result and Analysis Our simulation is done in 10m x 10m two dimensional environment. Node deployment accuracy is very important. 9 nodes are deployed randomly we can get their coordinate and suppose one known node as unknown node and then we can find the distances, path loss, Gaussian distributed value [3]. Figure 1 Random deployed node Where +: unknown node *: Beacon node In the simulation we assume (x1,y1): (3.4855, 2.7068) as unknown Node and further we calculate the distance, maximum RSSI value in Scenario of 9 node where one node suppose to be mobile[6] by RSSI Method when n=2 ,A=8.4734 dBm and power loss at reference distance is 31.5266 dBm. Table1.Distance Calculation When we simulate we found that distance measure by RSSI principle is 1.5726 meter, but when we applied the distance formulae for the Coordinate we found that exact distance is 5.4825.So we found that there is measure margin of error. Figure2. Error in distance calculated by RSSI In figure1 we can see that the distance calculated by RSSI is not accurate, because the error percentage is 71.35. Conclusions Localization performance will depend on many things, including the localization algorithm used, the quantity of prior coordinate information, the method selected, and the accuracies possible from those measurements in the environment of interest[12]. The RSSI measurement is studied in this paper, but this method is not more accurate because the radio frequency signals is affected by the environment[12][13], the exact distance between the nodes cannot obtain by RSSI measurement. Experimental measurement and simulation results show that the distance is obtain, but measurement is not accurate. The proposed method is a good option in wireless sensor node localization, because of low cost and less complexity of the simulation. In future we can work on improving the RSSI method for the more accuracy because sometimes there is problem of accurate distance and it depends only on the measurement parameter model. The result shows that in future if we work through the RSSI method for the specif ic scenarios like war (soldier) and forest fire then the method may provide the specific result and maybe there is need of some more Improvement in this proposed method because some time the result shown by experiment is out of bound so there is need of some more improvement. References [1] Yick J., Mukherjee B. and Ghosal D., â€Å"Wireless Sensor Network survey†, Elsevier  Computer Network, vol.52, pp. 2292– 2330, 2008. [2] Mao G., BarÄ ±s F. and Anderson B.D.O.,â€Å"Wireless Sensor Network Localization Techniques†, Elsevier Computer Networks, vol.51,pp. 2529–2553, 2007. [3] Zheng J., Wu C., Chu H. and Xu Y., â€Å"An Improved RSSI Measurement In Wireless  Sensor Networks†, Elsevier Procedia Engineering, vol.15, pp. 876 – 880, 2011. [4] Patwari N., Aah J. N. and Kyperountas S., â€Å"Locating the nodes cooperative localization In Wireless Sensor Network†, IEEE Signal Processing Magazine, vol.22, No.4,  pp. 54-69, 2005. [5] Srinivasan A. and Wu J., â€Å"A Survey on Secure Localization in Wireless Sensor Networks†, Florida Atlantic University, USA. [6] Amundson I. and Koutsoukos X.D., â€Å"A Survey on Localization for Mobile Wireless  Sensor Networks†,Computer Science,Springer,vol.5801, pp. 235-254, 2009. [7] Han G., Xu H.,Duong R.Q., Jiang J.,and Hara T., â€Å"Localization algorithms of Wireless  Sensor Networks: a survey†, Telecommunication Systems, Springer, vol. 52, Issue 4,  pp. 2419-2436, 2013. [8] Zeng Y., Cao J., Hong J, Zhang S. And Xie L., â€Å"Secure localization and location very  fication in wireless sensor networks: a survey†, Springer, vol. 64, Issue 3, pp. 685-701,  2013. [9] Wei X. and Qi Y., â€Å"Research on Some Key Techniques of Wireless Sensor Network†,  Electrical Engineering, Springer, vol. 127, pp. 255-260, 2012. [10] Heo J, Kim J. H. and Hong C.S., â€Å"A Logical Group Formation and Management  Mechanism Using RSSI for Wireless Sensor Networks†, Computer Science,   Springer, vol. 5297, pp. 207-216, 2008 . [11] Erdogan S.Z., â€Å"Mobility Monitoring by Using RSSI in Wireless Sensor Net  Works†,Computer and Information Science, Springer, vol. 90, pp. 572-580,  2010. [12] Adewumi O., Djouani K.,and Kurien A., â€Å"Performance Evaluation of RSSI  Based Distance Measurement for Localization in Wireless Sensor Networks†,  Social Informatics and Telecommunications Engineering, Springer, vol.119,  pp. 74-83, 2013. [13] Ahn H., Lee Y.H., Cho H.J., Rhee S.B., and Lee J.H., â€Å"A RSSI-Based Approach for Localization of Wireless Sensor Network in Indoor†, Electrical   Engineering, Springer, vol. 120, pp. 123-127, 2012.   [14] Miao C., Dai G., Mao K., Li Y., and Chen Q., â€Å"RI-MDS: Multidimensional  Scaling Iterative Localization Algorithm Using RSSI in Wireless Sensor  Networks†, Computer and Information Science, Springer, vol. 501, pp. 164-  175, 2015. [15] Shen X., Wang Z., Jiang P., Lin R., and Sun Y., â€Å"Connectivity and RSSI  Based Localization Scheme for Wireless Sensor Networks†, Computer Sci- ence, Springer, vol. 3645, pp. 578-587, 2005.

Wednesday, November 13, 2019

Why John Brown Chose Violence :: essays research papers

Why do you believe that John Brown believed that the situation in the U.S. at the time could only be solved by bloodshed and not compromise?   Ã‚  Ã‚  Ã‚  Ã‚  I believe that there are many reasons why John Brown believed that violence was the only way he could prevail in the fight to end slavery in the United States. First of all; at this time in history, issues were moving fairly quickly. As soon as Kansas was to become a territory, supporters from both the North and South rushed to settle on the land and tried to gain control of the vote in the area. Secondly, it probably seemed that any attempts at compromise at that time had not, and would not, get very far in the issue. Lastly, the most prominent reason I believe that John Brown felt violence was the only answer, was because of his belief in God. As he stated in his speech to the courts during his trial, he felt that what he did was not wrong. Sacrificing his life was worth it; even if it was just one step towards ending slavery, something that was so cruel and wicked anyway, his violence was no worse than the slavery.   Ã‚  Ã‚  Ã‚  Ã‚  When the Kansas-Nebraska Act was introduced in the U.S., the North was upset because the new territories would probably be pro-slavery. As soon as they could, both sides of the issue sent in settlers to try and gain control. This â€Å"race for Kansas† made the race to make a final decision on the issue of slavery in the U.S. an even more urgent issue. This battle to decide what side the two new territories would be on probably pushed the issue so hard it caused a lot of discomfort and probably hurried people like John Brown into making decisions quickly, because people were afraid. I believe that the rush to make a ruling for or against slavery was one reason why John Brown chose bloodshed over compromise.   Ã‚  Ã‚  Ã‚  Ã‚  The second reason I believe Brown picked violence over negotiation was because of the lack of communication. It probably seemed a hopeless endeavor to even try to correspond with the South on the issue, especially after violence had already begun in many places; not to mention in the act of slavery itself. It would have been very hard for either side to civilly speak or negotiate with the opposition in an reasonable manner.

Sunday, November 10, 2019

Critical Response to the film “Remember the Titans” Essay

â€Å"Remember The Titans† is a film text, centered by the issue of the injustice of a persons race and how it is triumphantly overcome. It is an uplifting story how an American town, Alexandria, conquered overwhelming resentment, friction and disharmony brought on by racial discrimination and mistrust. The town is further thrown into chaos, as protests rage over the killing of an African-American youth and then the integration of the major local High school; T.C. Williams. The integration lead to the demotion of a much loved and highly successful head coach of the school state football team by the name of Bill Yoast, the job’s new occupancy went to an African-American by the name of Coach Boone, who ultimately suffers injustice because of his race and the fact he was replacing a white coach which brought chaos to the white community. The injustice displayed in the film Remember the Titians can be seen numerous amounts of times. Coach Boone sets a wonderful example of the town learning to trust each other and work together and shows the boys a funeral where people had died fighting the same fight people are still fighting today and the injustice of this situation to everyone. The film shows justice can be achieved on earth if people learn to respect each other. This barrier is overcome when one of the black teammates refuses to protect his white teammates because they wont block for the black teammates, they are made to spend time with each other and learn about each others culture which ultimately they learn to respect each other no matter what race or where they came from. This lead to friction in the community and the boys parents wanting Coach Boone fired because of the communities outrage that the highs school had been joined together and the injustice being showed to each other through murdering people becau se of there skin colour and the disrespect shown because of the persons race. As the team learns to show each other good morals, trust and respect during a time where the community were showing signs of discrimination, hate and mistrust and this is when Coach Boone showed the injustice of how his father died having to fight this same fight and the team ultimately responded and overcame the difficulties of having a multicultural team with the assistance of democratic and authoritarian coaching styles by both Coach Boone and  Coach Yoast. The coaching styles improved the players motivational skills there self fulfillment to work together and set an example to be treated equally, which made the coaches and players of different races share the same goals and perception of the injustice of the peoples mistreatment because of race. As the team became an top contender and where playing every game with such passion and serving a sense of justice to each other when people would use racial comments on the field no matter what the race every member would stand up for each other. As the team worked together and both coaches shared there perceptions the team really achieved greatly and this rubbed of into the community. As examples of the white policeman acknowledging and congratulating a black titans efforts goes to prove that justice was being achieved on our earth. The town started accepting everyone for who they are and the titans where treated very well by the community for giving them belief and a sense of pride where justice could be achieved for everyone. In one circumstance Coach Boone had been called a monkey but as the team was well disciplined and respectful of everyone this only inspired everyone in the titans to work harder for each other which resulted in a win not only for the game but for the team to change another persons perspective on racism and achieve the justice they deserved. When the injustice of Coach Yoasts hall of fame removal and the tragic accident of captain Garys car crash It showed in the final game they would win a come from behind victory and Coach Yoast would ultimately not resort to cheating and instead achieve his justice by helping his black partner Coach Boone achieve their goal togeather rather than resort to backstabbing and cheating to improve his own reputation and achieve justice on earth for himself and Coach Boon. This showed that even though Gary had his tragic accident he achieved hiss goal with his teammates of winning the final and teaching the community to respect everyone no matter what there race. This film was a great example of justice being achieved and giving everyone hopes through the Coach Boones leadership skills and charisma to inspire a team, community and a nation. The film showed how these people working together and being respectful of each other can truly inspire and set an example for everyone to achieve justice on earth. Treating everyone equally and teaching them the injustice of what had happened because of the war over race ultimately inspired the boys and the nation to achieve justice for everyone on earth.

Friday, November 8, 2019

Acknowledgement Essays

Acknowledgement Essays Acknowledgement Essay Acknowledgement Essay Chapter 1 The Problem and its Background Introduction The term RFID refers to Radio Frequency Identification, a technology which uses radio waves to automatically identify items or people. Most commonly this involves the use of an RFID tag and a reader device. In general terms, Radio Frequency Identification systems consist of an RFID tag (typically many tags) and an interrogator or reader. The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information. On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the system’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie Theater Charging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk – wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. The system was able to track whom librarian is accountable for the loss of a returned material. The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..