Featured Post

Writing An Essay? Here Are 10 Effective Tips

Writing An Essay? Here Are 10 Effective Tips The first type is instantly taking the phrases from a supply and using them in your paper wi...

Wednesday, April 22, 2020

The Code of Ethics for Engineers

One of the main conditions of the modern society’s successful development is its dependence on the moral principles and canons which are worked out and accepted by the society in order to regulate the character of relations within it. Moral principles belong to the field of ethics which influences all the aspects of the people’s life.Advertising We will write a custom essay sample on The Code of Ethics for Engineers specifically for you for only $16.05 $11/page Learn More Thus, people are oriented to following the moral norms which are developed to control the elements of their personal life and interpersonal relations, and there are also moral codes and canons which can be successfully used for realizing business activities and business relations. These principles are in the field of the business ethics. Moreover, each profession has its own code of ethics according to which the relations within the definite industry or company are realize d. It is important that the codes of ethics for different professions as the aspects of the people’s life depend on the traditional approaches to moral norms and principles which were argued by such philosophers as Aristotle, Kant, and Bentham. Thus, the canons, rules of practice, and professional obligations for engineers are based on the elements of the ethics developed by these philosophers in the context of the person’s voluntary nature to perform this or that action, with dependence on his or her moral duty for this action, or on discussing this action according to its right or wrong consequences. It is stated in the preamble to the code of ethics for engineers that â€Å"the services provided by engineers require honesty, impartiality, fairness, and equity, and must be dedicated to the protection of the public health, safety, and welfare† (â€Å"NSPE Code of Ethics†). Thus, the activity of engineers as professionals is oriented to those moral concep ts which are also accentuated as influential ones in the persons’ everyday life. Furthermore, these concepts are also associated with the group of moral virtues such as truthfulness, forgiveness, and integrity which were determined by Aristotle. Shrader-Frechette indicates with references to Aristotle that â€Å"one can deliberate only about what is within one’s power to do† (Shrader-Frechette 187). That is why engineers should focus on their specific responsibilities with paying attention to their code of ethics which regulates the moral aspect of the relations between the employers, employees, partners, and clients.Advertising Looking for essay on ethics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The code of ethics for engineers is based on a range of the fundamental canons in relation to which the rules of practice and professional obligations are stated. Thus, engineers should â€Å"hold paramount the safety, h ealth, and welfare of the public† (â€Å"NSPE Code of Ethics†). That is why engineers should orient to the necessities of the public, and one of the engineers’ professional obligations is based on this principle, and it is formulated in such a way that â€Å"engineers shall at all times strive to serve the public interest† (â€Å"NSPE Code of Ethics†). In this case, Bentham’s ideas about the benefits of the actions are met, and Kant’s categories of the universal law and the moral duty are realized according to which a person uses his or her will and control the actions in order to address the interests of the society (Birks; Velasquez). These notions are addressed in the context of engineers’ rules of practice in which the main accents are made on the justice, legitimacy, and truthfulness. The mentioned principles are also associated with the canon according to which engineers should â€Å"issue public statements only in an obj ective and truthful manner† (â€Å"NSPE Code of Ethics†). Thus, objectivity and truthfulness as the representations of Aristotle’s moral virtues become the main aspects of the positive atmosphere of the professional communication. One of the rules of practice for engineers states that they â€Å"shall perform services only in the areas of their competence† (â€Å"NSPE Code of Ethics†). Why is this rule so significant with references to the ethical canons? A person should be always responsible for his or her actions. The person’s actions should be supported by the sincere desire of realizing the good action and motivation to do it in relation to the highest good to which it is aimed. Thus, Aristotle indicates that there are many goods which depend not only on the virtues and the balance between the extremes but also on the human voluntary nature and the person’s intention to reach the happiness in the life (Curzer).Advertising We w ill write a custom essay sample on The Code of Ethics for Engineers specifically for you for only $16.05 $11/page Learn More If Aristotle accentuates the human voluntary nature, Bentham develops this notion and indicates that people in their actions should orient to the benefits which could satisfy a number of persons. That is why these actions should be not only good but also competent. Moreover, the person’s actions should be so good that they could be perceived as addressed to the universal laws and that is why, according to Kant, they should form the categorical imperative. Thus, not to make harm to those people who are involved in the process, engineers should be competent in their actions and be responsible for their performing. Engineers’ professional obligations also include such a point according to which engineers should â€Å"adhere to the principles of sustainable development in order to protect the environment for future generatio ns† (â€Å"NSPE Code of Ethics†). The problem of the technological sustainability is closely connected with the possible technological risks which can be the results of the industry’s activity. Shrader-Frechette argues the fringe between the advantages of those technologies which are risky and the moral obligation of those persons who are involved in their producing (Shrader-Frechette). If the person’s moral task is to orient to the benefits for the people, is it possible to realize the hazardous technologies which can be harmful for the public and nature? According to the ideas of Utilitarianism, these technologies have both the right and wrong consequences for various people and different aspects of life (Birks). However, according to Kant’s principles such a situation is morally wrong because it is not universally good (Velasquez). To present the universally good actions, a person should not be influenced by any other opinions or visions of this or that issue. From this point, Aristotle emphasizes the necessity of the personal self-control and liberality as one of the influential virtues (Curzer).Advertising Looking for essay on ethics? Let's see if we can help you! Get your first paper with 15% OFF Learn More To be satisfied and happy without the inclination to experience the impact of the other people’s ideas on the morality, an individual should be independent and should not concentrate on his or her financial state and as a result, betray the moral principles. However, one of the main risks for the person is the orientation to the pleasure which is accentuated as an important concept by Aristotle and Bentham. People can also strive to reach the pleasure with references to immoral or wrong actions. That is why it is mentioned in the list of the engineers’ professional obligations that they â€Å"shall not be influenced in their professional duties by conflicting interests† (â€Å"NSPE Code of Ethics†). This obligation is associated with the problem of the person’s moral choice. In spite of the fact the majority of people are inclined to admit the necessity of following the life according to the moral virtues proclaimed by Aristotle and according to th e principles stated by Kant and Bentham, a person always tries to find the most beneficial approach for his or her, and this approach can be based on any bad factors which can lead to the negative consequences. Thus, the origins of the person’s morality and the person’s own code of ethics are in his voluntary nature which forms motivation and in his will and duty. To follow the universal moral laws or live according to the moral virtues are not an easy task, but according to the philosophers, it is a single way to the happy life full of pleasures which is in harmony with the laws of nature. That is why people develop the codes of ethics in relation to which it is possible to regulate the aspects of life in society and also use these principles in the organization of their professional activity. Any company functions as a group of people which are in constant relations, and to guarantee the development of the company with a minimum of negative and conflict situations, i t is necessary to work out the code of ethics according to which the interactions are regulated and controlled. Moreover, many professions have their specific features which should be also reflected in the code. That is why the code of ethics for engineers which depends on the main moral principles is significant for the profession’s development. Works Cited Birks, Thomas Rawson. Modern Utilitarianism; or, the Systems of Paley, Bentham, and Mill Examined and Compared. USA: Nabu Press, 2010. Print. Curzer, Howard. Aristotle and the virtues. USA: Oxford University Press, 2012. Print. NSPE Code of Ethics for Engineers 2006. Web. www.onlineethics.org/Resources/ethcodes/EnglishCodes/9972.aspx. Shrader-Frechette, Kristin. â€Å"Technology and Ethics†. Philosophy of technology. Eds. Robert Scharff and Val Dusek. Malden, MA: Blackwell Publishing, 2003. 187-190. Print. Velasquez, Manuel. â€Å"Moral Reasoning†. The Blackwell Guide to Business Ethics. Ed. Norman E. Bowie. USA: Blackwell, 2002. 102-116. Print. This essay on The Code of Ethics for Engineers was written and submitted by user Arjun Morgan to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, March 17, 2020

The Wars by Timothy Findley Essay Example

The Wars by Timothy Findley Essay Example The Wars by Timothy Findley Paper The Wars by Timothy Findley Paper Essay Topic: Literature Push Precious Women are a mans mother, sister, daughter, best friend, and lover. A woman can leave a character-altering impression on a man. An unhealthy or devastating relationship between a man and a woman can lead to a strife within himself. In the novel The Wars by Timothy Findley, the role of female characters causes internal conflicts in the male characters. This is made clear through Roberts relationship with his sister Rowena, the acts of Barbara dOrsey, and finally the absence of a close relationship between Robert and his mother. Roberts first recollection of interacting with a woman, focuses on Rowena, his sister. Rowena is the first woman Robert can remember as a child. It is made evident from the beginning of the novel that Roberts relationship with Rowena is very important to him. Rowena suffers from hydrocephalus which puts her life in danger. It is impossible for Robert to be with Rowena all day, everyday. The day of Rowenas death Stuart takes her to the stables so she can play with her rabbits. It was Stuarts job to watch Rowena, so the death was Stuarts fault but no it wasnt Stuarts fault. It was Roberts fault. Robert was her guardian and he was locked in his bedroom. Making love to his pillow (Findley 21). Robert put all the blame of his sisters death on himself. He believes that it is his duty to make sure Rowena is safe. It seems ridiculous for him to believe he should be with her at all times. Robert was a caring brother, and very attentive to her. The guilt that he experiences for the death of Rowena leaves him feeling empty and alone. As well, Robert cares for Rowenas wishes and possessions; it seems as though anything that is a part of Rowena, is also a part of Robert. Including her precious rabbits that she cared for. When Robert is thinking about the death of his sister he recalls a conversation they had when she asked, Robert? Yes, Rowena? Will you stay with me forever? Yes, Rowena. Can the rabbits stay forever, too? Yes, Rowena (22). Robert is very dedicated to Rowena and they have a very strong connection. Robert always wants to be true to her. He feels he has let Rowena down once by not looking after her resulting in her death. He can not let Rowena down again by killing her rabbits. The killing of Rowenas rabbits leaves Robert believing he has betrayed his loved one, which adds to his internal conflict. The death of Rowena contribute to Roberts decision to go to war. Robert lived with the guilt of believing Rowenas death was his fault everyday of his life. In conclusion, the continuing rage that Robert builds up inside himself over Rowenas death plays a great role in his eventual self-destruction. Secondly, Barbara dOrsey makes herself an important part of many mens lives, and this ends in devastation. It is also made visible by other characters in the novel. Barbara, and Taffler go to visit James Villiers, Barbaras past lover while he is in the hospital. Robert witnesses the visit and the nurse approaches him saying, Just dont ask me about that woman. I dont know how she dares to come here (89). The nurse is angry that Barbara shows no compassion to the injured Villiers. Not only is Villiers in physical pain but the emotional pain which Barbara inflicts on him visiting, while accompanied by another man is devastating to him. James real feelings on the situation cannot be voiced because of the extent of his injuries, but due to his reaction the reader may assume he is emotionally distraught. Even Barbaras sister Juliet comments on her sisters behaviour. Juliet writes in her transcripts that, after the visit to Villiers, the affair between [Barbara] and Robert Ross developed quickly. ] It seemed inhuman. Barbara never went to see Taffler again (152). The inhumanity which leaves Juliet shocked and dismayed reveals how selfish and ignorant Barbara is to her lovers. As soon as Barbara spots a weakness in her lovers she abandons them and moves on to the next man. Barbara shows no shame in her actions. In conclusion, at the times her lovers need her the most she is not there to help them deal with emotional anxiety which leads to their internal destruction. Thirdly, it is made visible at the beginning of the novel that the absence of a mother figure in Roberts life has an emotional effect on him. Robert does not remember his mother being around very much as a small child. Mrs. Ross has gone through many losses in her life beginning with her father, brother, and now her daughter. This causes Mrs. Ross to breakdown and place copious amounts of grief on Robert which contributes to his internal destruction. Robert is deemed to be Rowenas guardian which makes him responsible for her possessions after her death. Mrs. Ross explains to Robert how it is his duty to kill Rowenas rabbits but he questions, Why do the rabbits have to be killed? Because they were hers. But that cant possibly make any sense. Nonetheless, they must be killed' (22-23). Mrs. Ross believes that it must be Robert who kills Rowenas rabbits because they are a constant reminder of Rowena. Since Robert was Rowenas guardian it is his responsibility to get rid of her most beloved possessions. If the rabbits are gone then Robert will realize that Rowena is gone too. Robert refuses to kill the rabbits because he feels he has let Rowena down once by not watching her, causing her death. He would not let her down again by killing her rabbits too. Robert resents his mother for asking him to do this and it contributes to his decision to leave for war. Ever since Rowenas death, Roberts mother begins to drink heavily. After Rowenas funeral, Mrs. Ross becomes intoxicated and has a conversation with Robert. She knows he is going away to become a soldier and she tells him he can go to hell. Im not responsible. Im just another stranger. Birth I can give you but life I cannot (28). She wants Robert to know that she did give life to him by giving birth to him but it is impossible for her to keep someone alive. Mrs. Ross is distancing herself from Robert because she knows that he is going away to war and there is a good chance he too will die. This conversation is the final push which leads him leave for war the next morning. Thus, going to war is Roberts ultimate downfall which leads to his destruction. In conclusion, woman are an important part of the mental stability of men. Through Rowena, Barbara, and Mrs. Ross it is evident that woman characters give male characters emotional problems. In the novel The Wars by Timothy Findley, female characters cause internal conflicts between the male characters and themselves. Women influence men everyday without even knowing it.

Saturday, February 29, 2020

Acknowledgement

The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information. On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the system’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy – is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management – is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database – is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System – is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification – is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie Theater Charging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024Ãâ€"768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk – wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: †¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. †¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. †¢ The system was able to track whom librarian is accountable for the loss of a returned material. †¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: †¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed †¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button †¢ Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA.. Acknowledgement The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information. On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the system’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy – is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management – is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database – is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System – is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification – is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie Theater Charging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024Ãâ€"768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk – wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: †¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. †¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. †¢ The system was able to track whom librarian is accountable for the loss of a returned material. †¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: †¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed †¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button †¢ Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..

Thursday, February 13, 2020

Marketing for Construction Essay Example | Topics and Well Written Essays - 2500 words

Marketing for Construction - Essay Example According to the CCS wesite, â€Å"The construction industry has a huge impact on all our lives, with many construction works in sensitive locations. If all construction sites and companies presented an image of competent management, efficiency, awareness of local environmental issues and above all neighbourliness, then they would become a positive advertisement, not just for themselves but for the industry as a whole.† The construction industry consists of the property owner, real estate business, legal and regulatory body, property seeker and buyers. The marketing environment for construction industry consists of the industry competitors, suppliers, buyers, threat of substitute and potential entrants. The factors influencing the demand and supply of the construction industry are the social and technological factors, political and legal conditions, economic and environmental factors. The social factors include the demographic factors like age, sex, education level, ethnic diversity of the target group, social groups, social attitudes and other. The political condition, law, regulations and policies, taxation are some of the factors of the political and legal environment. The economic factors includes the level of income, CPI, Inflation, employment, availability of funds/loans and the overall economic condition of the nation. Environmental factor include the factors like regulations, environmental impacts like contamination, construction waste, power conservation and others. This provides information on the segment rivalry. The numbers of firms are more than 192,404 small and big firms. This sector is one of the largest sector employing more than 200,000 people. The segment rivalry is high in the industry. The economic turmoil has intensified the segment rivalry. The high exit barriers of the industry are high due to heavy capital and investment requirements. The suppliers are integrated part any industry. This is a

Saturday, February 1, 2020

Training and Development in Proctor & Gamble Assignment

Training and Development in Proctor & Gamble - Assignment Example From this discussion it is clear that performance management theories will be used to create a theoretical background for this report.This study outlines that  training and development plays cordial role on aligning strategic objectives of management with human resource pool of organization. There are four basic pillars of training & development and they can be summarized in the following manner. Training- Increasing the performance standard of employees by giving them proper instruction and practice. Develop- This technique creates bigger impact on human resource pool and systematically increases their skill level to perform the work. Educate- Giving instruction to employees in terms of social, intellectual and moral responsibility.  Learn- Employees gain knowledge from their past mistake or they can get experience from ongoing management activity. In 1984, Farnham has indicated that training and development are more relevant to organization’s point of view but education and learning are more relevant to education and academic industry.  Performance management has three discrete components, 1- performance definition, 2- measurement of performance and 3- communication between supervisor and employees.  They have stated that performance appraisal is more closely related to second component of performance management.  Nature of the strategy depends on business objectives of the organization.... In 1989, Harrison defined development as primary activity helping employees and organization to grow in terms of achieving potential up to highest standard (Lundy & Cowling, 1996, p. 243). 2.0 Performance Management Performance management has three discrete components, 1- performance definition, 2- measurement of performance and 3- communication between supervisor and employees. In 1999, Banks & May have clearly segregated performance management from performance appraisal. They have stated that performance appraisal is more closely related to second component of performance management (Landy & Conte, 2009, p. 234). In 1992, Institute of Personnel Management has defined performance management as strategy related to every functional department of organization and designed to co relate with various aspects of organization like culture, style, human resource capital and communication system. Nature of the strategy depends on business objectives of the organization (Armstrong & Baron, 200 5, P.7). One of the fundamental tasks of the performance management department is to look after the performance of employees. Furthermore it ensures effective and efficient performance from the employees. Some of the modern techniques include feedbacks from the supervisors and subordinates, setting benchmarks and comparing with that, 360 degree appraisal method and most importantly applying the concept of Balance scorecard. Balance scorecard gives importance on maintaining coordination between various departments of large organizational structure. Interlinked network of the departments help management to implement balance scorecard concept in two ways. 1- It helps every employee to understand organizational objectives and

Friday, January 24, 2020

Japanese Canadians :: essays research papers

Japanese Internment of WW2   Ã‚  Ã‚  Ã‚  Ã‚  “They spoke of the Japanese Canadians,'; Escott Reid, a special assistant at External Affairs, would recall, “in the way that the Nazi’s would have spoken about Jewish Germans.'; Just like in that statement, I intend to expose you to the ways that the Japanese were wronged by Canadians throughout the Second World War. As well, I intend to prove what I have stated in my thesis statement: After the bombing of Pearl Harbour, the Japanese in Canada were wronged by being torn from their homes to be put into internment camps to serve Canadians through hard labour. The Decision to Uproot Japanese Canadians   Ã‚  Ã‚  Ã‚  Ã‚  Within hours of Japan’s attack on Pearl Harbour, the federal Cabinet declared war on Japan. The federal cabinet supported their decision by calling Japan’s attack “a threat to the defence and freedom of Canada.   Ã‚  Ã‚  Ã‚  Ã‚  The Japanese Canadians in Canada were devastated by Japan’s attack on Pearl Harbour and fearful of what it would mean for themselves. Some 3,600 Japanese had become naturalised Canadians before 1923 when nationality made it very difficult for Japanese to obtain it. One of the first decisions made by the government gave the Royal Canadian Navy the power to impound any vessels that belonged to Japanese Canadians and assemble them at special ports along the coast where they were moored to the shore. The government explained the impounding of the Japanese boats as a defensive measure.   Ã‚  Ã‚  Ã‚  Ã‚  Within five days of the Pearl Harbour attacks, the Canadian Pacific Railway began discharging its Japaese section hands and other Japanese porters. At the example of the CPR, hotels and sawmills in Vancouver discharged all of their Japanese employees.   Ã‚  Ã‚  Ã‚  Ã‚  On Jan. 8, 1942, a conference was held to discuss what should be done about the Japanese Canadians. The conference ended three days later without anything having been agreed upon. A couple of weeks later, King and the cabinet agreed that all Japanese Canadians should be removed from the West Coast. The day that the Japanese people had been dreading had finally come on Feb. 27, 1942. The war measures act announced the planned evacuation and internment of all persons that come from Japanese ancestry. Coping   Ã‚  Ã‚  Ã‚  Ã‚  The Japanese were stunned as they heard the announcement that all Japanese Canadians were to be moved from the Pacific Coast into internment camps until the war ended. Five days after the announcement that all Japanese were to be interned, the cabinet passed an order-in-council which empowered the BCSC (British Columbia Security Commission) to remove and detain “any and all Japanese Canadians.

Wednesday, January 15, 2020

Prohibition Research

Others suggested that those who drank should be: D hung by the tongue beneath an airplane and flown over the country o exiled to concentration camps in the Aleutian Islands o excluded from any and all churches o forbidden to marry tortured o branded o whipped o sterilized o tattooed o placed in battleship cages in public squares o forced to swallow two ounces of caster oil a executed, as well as their progeny to the fourth generation. ; A major prohibitionist group, the Women's Christian Temperance Union (WEST) taught as â€Å"scientific fact† that the majority of beer drinkers die from droopier (edema or swelling). Prohibition agents routinely broke the law themselves. They shot innocent people and regularly destroyed citizens' vehicles, homes, businesses, and vii other valuable property. They even illegally sank a large Canadian ship. Bathtub gird' got its name from the fact that alcohol, glycerin and juniper jug was mixed in bottles or jugs too tall to be filled with water from a sink tap so they were commonly filled under a bathtub tap. The speakeasy got its name because one had to whisper a code word or name through a slot in a locked door to gain admittance.Prohibition led to widespread disrespect for law. New York City alone had about thirty thousand (yes, 30,000) speakeasies. And even public leaders flaunted their disregard for the law. They included the Speaker of the united States House of Representatives, who owned and operated an illegal still. Some desperate and unfortunate people during Prohibition falsely believed t hat the undrinkable alcohol in antifreeze could be made safe and drinkable by filtering it through a loaf of bread. It couldn't and many were seriously injured or xi killed as a result.In Los Angels, a jury that had heard a bootlegging case was itself put on trial after it drank the evidence. The jurors argued in their defense that they had simply been sampling the evidence to determine whether or not it contained alcohol, whic h they determined it did. However, because they consumed the evidence, the defendant charged with bootlegging had to be acquitted. When the ship, Washington, was launched, a bottle of water rather than xiii Champagne, was ceremoniously broken across its bow. Prohibition led to a boom in the cruise industry.By taking what were advertise deed as â€Å"cruises to nowhere,† people could legally consume alcohol as soon as the ship entered international waters where they would typically cruise in circles. National Prohibition not only failed to prevent the consumption of alcohol, buy led to the extensive production of dangerous unregulated and untaxed alcohol 01, the development Of organized crime, increased violence, and massive political irruption. The human body produces its own supply of alcohol naturally on a continuous basis, 24 hours a day, seven days a week. Therefore, we always have alcohol in our bodies.Prohibition clearly benefited some people. Notorious bootlegger AY Ca pons made sixty million dollars†¦ Per year (untaxed! ) while the average industrial worker earned less than $1 ,OHO per year. But not everyone benefited. By the time Prohibition was repealed, nearly 800 gangsters in the City of Chicago alone had been killed in battleground shootings. And, of course, thousands of citizens were killed, blinded, or xviii realized as a result of drinking contaminated bootleg alcohol. The â€Å"Father of Prohibition,† Congressman Andrew J. Evolutes, was defeated shortly after Prohibition was imposed.