Thursday, October 31, 2019

Where would Globalization be without Outsourcing Essay

Where would Globalization be without Outsourcing - Essay Example Globalization driven by trade has reached at an unprecedented pace (Wild and Han, 2009). It has laid down the path of creating new opportunities that contribute in accelerating economic growth and reduce the level of poverty. The liberalization of some of the developing countries has not translated into qualitative gains. The gains from trade in less developed countries are still not sufficient. The costs of globalization driven by trade may be unsustainable and therefore the inequalities will tend to rise further which is indeed a matter of concern. As a result the countries are becoming prone to external shocks. In order to benefit from globalization a sustainable environment is needed to be created in the context of differentiated trade policy and development landscape. The international trading system has witnessed several changes under the globally recognized challenges. The trading system has recognized the structural as well as the economic challenges that are faced by the dev eloping countries.... The process of globalization called for many multinational corporations and the control of the nation states over the economy kept on diminishing. These corporations integrate the national economies with global linkages. They have expanded drastically and the top 500 companies control a major percentage of global GNP (Lim, 2005). With the advent of new technologies at rapid rates, the whole global economy under the process of globalization is now linked. The neoliberal agenda of globalization offers minimalist for the nation states. It seems that the nation states are left with no other choice but to surrender to the demands of globalization. Some experts disagree on the diminishing role of the states. They opined that the states still play a dominant role in shaping the economy. They put forwarded the view that states implement the policies of opening up the economies to the international markets which indicates the states have the potential to manage the responses to globalization. So it can be concluded the role of the states are limited in shaping economies. Some look at the nation states as pivotal institutions and argue that globalization has only altered the situation under which the states can exercise their power (Held and McGrew, 2007). Recent developments in supra-national institutions The rules of the supranational institutions are considered superior than the national law. The demand for supranational governance tends to rise with the rise in density of international governance. In order to increase the credibility of commitment one of the logical ways is to develop supranational bodies that involves itself in resolving conflicts as well as monitor the regulations. There have been some recent notable

Tuesday, October 29, 2019

Monopoly Coursework Example | Topics and Well Written Essays - 250 words

Monopoly - Coursework Example Jesus explains the rule of monopoly power and encourages people to put all their treasure in heaven should they want to enter the Kingdom of God. Further, in 1st Timothy, â€Å"For the love of money is a root of all kinds of evil, for which some have strayed from the faith in their greediness, and pierced themselves through with many sorrows† (The Holy Bible, I timothy 6:10). Indeed money can buy power though it is always the cause of many problems. The Pharisees were considered the great spiritual leaders among the Jews because they gave interpretation on the Laws of Moses and were a link between people and God. The Sadducees were people who constantly rejected the laws yet they claimed to lead priestly lives (Jewish Virtual Library). Jesus condemns them for misleading the common people, â€Å"You Pharisees and teachers of the law of Moses are in for trouble! You’re nothing but show-offs. You lock people out of the kingdom of heaven. You won’t go in yourselves, and you keep others from going in† ( Mathew 23: 13-14). Through this, it is true how Pharisees denied people from going to heaven since they enjoyed monopoly power. They knew people were so dependent on them in guidance of their spiritual lives. Monopoly power, according to the Bible is a worldly treasure that will deny many people a chance to enter heaven. According to Jesus, most people used such opportunities in accumulating material wealth instead of putting all their treasures in heaven. As a lesson, it is very important to consider what Jesus said and be on the move to change, repent and give the less fortunate people right and meaningful

Sunday, October 27, 2019

Banking Sector Fragility Causes

Banking Sector Fragility Causes Discuss factors which have decisively contributed to the fragility of the contemporary banking sectors, as revealed in the form of the recent global financial crisis. Prepared by: Ivan Gnatiuk 37193 Artem Zaiets 36981 Mark Pohodin 37141 Introduction Firstly, crisis was originally started in US where it was a result of provided social policy. In particular, government allowed, even insisted, on distribution of house mortgages not only among wealthy part of society but also among poor one(so called NINJAs No Income, No Job, no Assets). Second part of this policy was an allowance on sell of sets or securitized bundles of mortgages among banks. Market at that time was at the expansion at that time i.e. expectations were positive and market accepted securitized sets of mortgage loans they spread not only among US but also around the whole world. In detail, banks became holders of risky assets in a large quantity that give good return during the expansion but become sources of risk during recession. Second important factor was an asymmetry in information i.e. banks who sold this bundles known all about their debtors and buyer of securitized bundle has no idea about quality or ability to pay of debtors in this bundle. Thus, mortgage b undles were spread around the world with no information about ability of money return just before market fall i.e. with a change in liquidity to very low as a result of negative expectations and following mistrust of banks with respect to each other. As a result, bundles lost their value because of that fact that opportunity of repayment thus value was very low thus collected debt obligations become a worthless and cold be just deleted form asset list of bank they currently situated. Therefore, many not only American but also European banks, pension founds and even insurance companies suffered of recent financial crisis. Moreover, interdependence in euro area only strengthened an effect. Firstly, securitization is a methodology where mortgages and loans with a different maturity collected into large sets for further sell on the market. The problem of such a way operation provision is an asymmetry in information i.e. only seller know what percent of credits are trustful and have a large opportunity of repayment in the future. In contrast, now, Federal Reserve has a regulation that require keeping a fraction of loans i.e. not to sell all loans given on the financial market that intense banks to be more careful with their debtors. Main reason of fall was an unpredicted unification of two factors. These factors were fall of housing market not only in one particular city or area but it spreading among the whole country with further fall of financial markets. This effect was accelerated by interdependence of banking system. For example, complicated structure of interbank loans such as credit-default swaps where in case third party default seller agreed to compensate buyer. Fall of such a large bank as Lechman Brothers created not only panic among creditors but also mistrust among banks. It was one of the most hitting factors. Banks started to keep a large amount of cash. In such situation banking system become ineffective and only damage economy; collecting cash and decreasing overall liquidity i.e. banks become a cash collectors and only reduce money multiplier. When money demand is inelastic, increase in money supply does not have an effect on liquidity i.e. monetary policy become ineffective i.e. at some point holding of cash become more profitable than any other investment. Thus, central bank loose quantitative instrument of market control. Banks start to buy safe government bounds with aim of protection of their capital and limit their credit distribution to reduce risk of not repayment of credits given. The volatility of banks In particular, banks play a very important role in determining the crisis. Problems encountered banks were due to great mistrust by customers. That is, the customer confidence in banks declined and that had a great influence on bank returns and stock prices. Stocks are more risky, which in term increase banks stock volatility. In finance, volatility refers to the standard deviation of continuously compounded by the return of a financial instrument for a certain period of time horizon. Thus, the return fluctuates over time and, therefore, an important determinant for the price of the shares. This is because the volatility shows the standard deviation of stock returns and depends on the risk of these stocks to hold. As a result, an increase in volatility leads to lower stock prices and vice versa. According to Choi et al. (1992)xi the interest rate variable is important for the valuation of common stocks of financial institutions because the returns and costs of financial institutions are directly dependent on interest rates. Moreover they mention a model which states that three different shocks affect bank’s profit during a given period namely; interest rate, exchange rate and default shocks. Since these three factors have a great influence on the profits of banks, it has also a great influence on its volatility of stocks. The interest rate directly has a great influence on the volatility. Profits of banks are determined by the interest rate. As mentioned, the revenues banks obtain are the interest payments of customers. The costs are the payments made to the customers. So an increase in the interest rate the banks gain will increase the banks’ profits and thus make those banks’ stocks more attractive. Investors can get more dividends on investment but al so can earn money by buying low and selling high. So when a bank is doing well, stocks prices will increase and that results in a saver investment. This causes a decrease in the volatility of those stocks. So an increase in the interest rate, at which banks lend, leads to a decline in the stock volatility and on the contrary. The interest rate at which banks ‘borrow’ has another influence on its stocks. A growth in that interest rate will rise banks costs, and thus decrease the banks’ profits. That 13 make the stocks less attractive and causes a decline in its prices. So the growth of that interest rate causes an increase in banks stock volatility and vice versa. Grammatikos et al. (1986)xii investigated the portfolio returns and risk associated with the aggregate foreign currency position of U.S. banks. They found that banks have imperfectly hedged their overall assert position in individual foreign currencies and exposed themselves to exchange rate risk. This f act suggests that exchange rate risk may importantly affect bank stock returns. Thus, it also affects the volatility. To make business internationally you always need to convert your money. That is why it is especially for banks an important factor. Companies dà Ã‚ ¾ business with other corporations internationally via banks. Banks hold the foreign currency which investors and companies have to buy in order to invest or do business internationally. Moreover the exchange rate defines also in which country it is attractive to do investments. For example, when the exchange rate is low for Europeans so that the euro/dollar is low, it is attractive for Europeans to make investments in America. It is advantage for European banks because European investors are now buying dollars from the bank. Since investors have to pay fees for that and banks have more money to lend out, the profits are growing which means that the volatility is decline. So an increase in the exchange rate decreases th e volatility. Default shocks are according to Choi et al. the last determinant of the banks profit and thus banks stock volatility. Default occurs when a debtor has not met his or her legal obligations according to the debt contract. This can be that he has not made a scheduled payment, or has violated a loan condition of the debt contract. A default is the failure to pay back a loan. Default may appear if the debtor is either unwilling or unable to pay their debt. This can appear with all debt obligations including bonds, mortgages, loans, and promissory notes. So it is an important factor in the banking industry. When huge amount of customers default, the banks have a high bad debt expense. This leads to an increase in the volatility. Furthermore if the risk of default rises, the interest rate rises as well because banks want to be compensated for this risk. As we have seen, an increase in the interest rate means a decline in volatility. So shocks in default mean shocks in volatil ity. This can be either up or down. When we take a closer look at the determinants of the volatility of banks stocks, we can see that it all depends on the state of the economy. When the economy is healthy, there are a lot of 14 actions in the markets as well as in the banking market. Corporations are investing a lot and thus are borrowing from banks; the housing market is doing well which means a lot of mortgage loan for banks. Overall there is a huge amount of business for banks which means that banks are doing well and thus stock prices are increasing, which indicates low volatility. On the contrary, during economic crises it is the other way around which we will see in the next part. Banks volatility in crisis During economic crises, we have seen that the economy in general is depreciating, during these years banks carry a lot of risk that customers are going to default. That is, the risk of having a lot of bad debt expanses rises. That risk causes fluctuation in the volatility of banks. During the last financial crisis, the housing market collapsed which caused a lot of default on mortgage loan. Because of the rise of default the interest rate is increasing and the currency is becoming cheaper. The three factors that affecting the volatility of banks according to Choi et al. were all affected during the last financial crisis, which caused increase in the volatility of banks. Moreover during banking panics, the volatility also increases. A banking panic means a bank run that appears when a huge number of customers withdraw their deposits because they think that the bank is, or might become, bankrupt. As amount of people who withdraw their deposits increases, the likelihood of default incre ases, and this leads to further withdrawals. This can destabilize the bank and finally lead to bankruptcy. So the bank carriesuncountable amounts of risk at that time. Because of that risk, investors are not willing to buy stocks of that bank and investors holding the stock already, want to sell their stocks. As a result the price of its stocks will decline and eventually be very low. Therefore the volatility will be very high. To sum it up, we have seen that the major determinants of the banks stock volatility are the interest rate, the exchange rate and the default shocks. More importantly, these three factors are all indicators of the state of the economy. When the economy is doing well, the factors influence the volatility negatively. However during financial crises and banking panics, the volatility will rise. So the volatility of banks’ stocks is affected by the health of the economy, which is indicated by the three factors mentioned. Globalization, as important crisis factor In this part we would like to reference such sector of banking as regional instability. Since the beginning of 21st century, the fragility of singular unit of the banking system was determined as a factor that affects only this particular institute. With increased globalization and technological progress, we have faced the new problem, which is a result of our own actions. Everyone loves traveling, but no-one likes to have big amounts of cash, casually lying in their pockets. This is the reason why we use plastic cards. Little do we think that they are a result of hard work and complicated connections between thousands of institutions. Such companies as Visa and MasterCard are offering us freedom of movement, in some way, and since the 90-th they grant us wide range of possibilities which we would never have in other way. We should state that both Visa and MasterCard, went public just recently before financial crisis, in October and may of 2006. This simply means that they became big enough, that there were a need of external financing, so the companies can expand even faster and bring their services to broader audience. The process of globalization brings us to the point of time, when there will be no more ways of globalizing without bringing any harm to economy of the world or even humans. Willing to expand, â€Å"systems† will fight over for the customer. Thus is when we meet the term that was implemented just recently – â€Å"reverse globalization† In the face of great economic risks, a lot of countries have started to implement the policy of protectionism. For example, in 2013, more than 2000 trade restrictions had been implemented by different governments, including United States and China. Another problem is that most companies which have their manufacturing powers abroad, mainly in china, report that their departments there are getting even more profitable. So we see the creation of the link between such countries. If one of them will be affected by the stroke, other one is going to feel the result as well. Banks are also taking part in such policy, or at least they used to. Since 1995 we can observe the steady trend to an increase in number of the foreign banks, from 780 to more then 1300, in 2007. The amount of new foreign banks, entering the market in OECD countries, peaked in 2007 at 132 in a year. The financial crisis dramatically reduced the number banks, up to the point when for the first time, since 1995, net exit of banks appeared to be bigger than net entrance. With the peak number being 1350, in 2009, it has been reduced to 1272 in 2013. Though this impact was intense, we can see even more radical change in the number of domestic banks. Here the number of facilities fell from 2704 to 2384, in 2007 and 2013 respectively, increasing market share of foreign banks up to 35%, from around 33% previously. The most interesting effect crisis had on banks of emerging and developing countries. Firstly, the amount of banks there didn`t decrease, but rose by 30. Also significant amount of banks that have been opened in European countries, had an actual headquarters in developing country. So, in regards to regional economy, European banks had the greatest reduction, as 29 foreign banks left the market. Nevertheless, we had an increase of such in Sub-Saharah Africa, where it peaked on the mark of additional 31 bank. The trend of developed countries being in lead, by an annual net entry, had been changed, when emerging and developing countries took this spot, even though developed countries are still shoving positive rates in all years after, except 2013. Concluding this point, we can assume that increasing amount of banks is not useful for overall health of world economy. Also such actions on the behalf of new banks can create issues for regional economies, as they tend to accumulate resources from citizens and not being effective as allocating institute. Such point leads us to the point that banks, as institutes which are supposed to be an effective tool for cash flows allocation, can be harmful for small regional economics. They create risks of collapsing and creating systematical problems, through connections between small banks and systems of such institutions. Finalizing all the information above, we would like to mention that banks, as fiscal institutions, are a source of great possibilities, but they may create bigger problems. Analyzing such data we see that market economy is self-efficient in some respect. It naturally clears itself during each crisis peaks. The problem is that banks link different economies, some of which are better and some are not that healthy. That just means that some links must be destroyed and thus operations of such banks are not necessary. In future risks of crisis fluctuations will be higher, as there will be even more banks to create harder connections, and thus world economy will suffer from those â€Å"small depressions† even harder with each next starting its action. Conclusion To sum it all up, from our research we have seen that crisis of 2007-2008 show us the fragility’s of banking system and the factors, which have decisively contributed to the fragility of banking sectors. We saw that some strengths of banking system in light of global financial crisis become fragilities. Banks volatility increased over the time period of a crisis especially during the last financial crisis. We can say that the volatility of banks increased during the financial crisis of 2008 and that the main driver is the GDP growth rate and that the less important drivers are the interest rate the exchange rate. In addition, we can say that increasing amount of banks is not useful for overall health of world economy. Also such actions on the behalf of new banks can create issues for regional economies. Bibliography Launch of 2013 Depth Index of Globalization: http://www.iese.edu/en/about-iese/news-media/news/2013/november/launch-of-2013-depth-index-of-globalization/ Why globalization is going into reverse, by Carol Matlack: http://www.bloomberg.com/bw/articles/2013-11-25/why-globalization-is-going-into-reverse Rising Costs, Protectionism Hit U.S. Companies in China, Says Survey: http://www.bloomberg.com/bw/articles/2013-10-10/rising-costs-protectionism-hit-u-dot-s-dot-companies-in-china-says-survey The Impact of the Global Financial Crisis on Banking Globalization; by Stijn Claessens and Neeltje van Horen, October 2014: http://www.imf.org/external/pubs/ft/wp/2014/wp14197.pdf http://www.nber.org/papers/w4532 http://www.ft.com/cms/s/0/842a1f88-d41c-11e4-99bd-00144feab7de.html#axzz3XyHF1cLC http://www.bloomberg.com/news/articles/2015-01-15/good-volatility-eludes-banks-trading-revenue-hits-3year-low http://www.voxeu.org/article/high-volatility-breeds-high-correlation-new-analysis-european-bank-stock-prices Business Cycles, Financial Crises, and Stock Volatility, by G. William Schwert, 1989:http://www.nber.org/papers/w2957.pdf http://geomar-search.kobv.de/authorSearch.do;jsessionid=54AC3C46B1787F442C4032CE1265C4A1?query=Kopecky%2C+K.+J.plv=2 Stock volatility and the crash of ’87, byG.W. Schwert, 1990: https://ideas.repec.org/p/nbr/nberwo/2954.html The Financial and economic crisis of2008-2009 and developing countries Edited by Sebastian Dullien Detlef J. Kotte Alejandro Mà ¡rquez Jan Priewe:  http://unctad.org/en/Docs/gdsmdp20101_en.pdf

Friday, October 25, 2019

David Suzukis A Planet For The Taking :: essays research papers

David Suzuki's A Planet for the Taking In the essay "A Planet for the Taking," David Suzuki describes Canadians' odd appreciation for this great natural bounty we call our own. He is an internationally acclaimed scientist who is concerned about the welfare of Canada. Suzuki's intended audience is the Canadian population that does not realize the grave danger they are instilling upon themselves by haphazardly taking our resources without looking at the subsequent repercussions of their actions. The essay is persuasive and informative. He compares various facets of science and gives reasons why none of these fields can explain why we are destroying nature. The organization of the essay supports the author's views well. It begins with general opinions about the Canadian population and is followed by more detailed explanations. The general opinions in the beginning are well- chosen considering the audience. Suzuki's tone is evident when he states "We have both a sense of the importance of the wilderness and space in our culture and an attitude that it is limitless and therefore we needn't worry." These words suggest that we are willing to reap the rewards of our vast resources but we fail to see the harm that we are doing, and will continue to do if we do not stop these actions. Although his approach for explaining his beliefs changes, Suzuki's tone of great concern remains consistent throughout the essay. After his views are presented, Suzuki begins to tell us what we have done to our country and how we are destroying it. Present day Canadians are compared to native Canadians which successfully serves its purpose in illustrating how, for centuries, people lived off the natural resources in Canada. With the development of science and technology, we have developed better ways of mass harvesting resources but these methods are taking at a faster rate than nature can sustain. Science suggests means of replacing these resources we are taking but there is no quick replacement for ecosystems that have taken thousands of years to evolve. Following his explanations of how we have destroyed nature, Suzuki discusses science and how society deals with it, "I believe that in large part our problems rest on our faith in the power of science and technology." This statement and the following sentences are used to describe how people deal with great developments in science and technology. Because there have been so many great advances in these fields in the past century, people are comfortable placing their faith in science though scientists are still far from discovering all of the secrets to the universe. Scientists interfere with nature without

Thursday, October 24, 2019

The American Dream in Of Mice and Men

The Epic of America (ironically written in the asses), the American Dream Is â€Å"that dream of a land in which life should be better and richer and fuller for everyone, with opportunity for each according to ability or achievement. † (Tortuous). In the 20th century, we have significantly warped that dream to slut a more selfish type of person. Colleens base the American Dream on something much more different then what it originally meant. Today, many Americans believe to achieve the American Dream means to be ICC and famous or have a successful business.People get caught up in this â€Å"American Dream†, that they forget the true meaning set by our Founding Fathers. Abraham Lincoln stated, â€Å"You can have anything you want – if you want it badly enough. You can be anything you want to be, do anything you set out to accomplish if you hold to that desire with singleness of purpose. â€Å", agreeing with Mr†¦ Tortuous. Despite this, society became so dis torted when discrimination played a role. Obviously, the Founding Father's didn't take the future's problems into consideration when making the Ideal dream for Americans.They were unaware of the hardships the discriminated would face, which made It hard to make the American dream more than Just a dream. In Of Mice and Men, John Steinbeck shows the death of the American Dream and why It was unattainable by many. The sass's was considered one of the toughest times in the history of the United States. Americans felt hopeless, saddened, and depressed. After the Wall Street crashed, the economy became complete chaos and a great downfall after a already being in a steep hole, in result of the World War II.Close to 10 percent of the population were unemployed. The country soon became filled with Jobless citizens, wanderers, and migrant workers. Owning a house was becoming something that was very rarely heard of. During this time, we see how humans struggled to survive. Not having a roof ov er your head seems bad enough, but imagine sleeping hungry, night after night. All the success, hopes, and dreams were lost and went down the drain. As people continued to suffer daily, they're pursuit of happiness seemed farther and farther away from the grasp of their palm.However, this all has to do with the equal opportunity that everyone should have to fulfill this dream. Some could not achieve the American dream because of a disadvantage pertaining to that person. Because of this, the dream isn't fully obtainable to all of those who wish to fulfill it. The Land of Opportunity was well on its way to being the Land of Misfortune. In Of Mice and Men, to show ageism during this time, the author Includes Candy In his novella. Candy dreams to own his own piece of land.It Initially starts when Candy hears about George and Lien's dream to â€Å"live off the fate the contribute to the investment of the property. Describing the dream land to Candy, George says, â€Å"Expose they was a carnival or a circus come to town, or a ball game, or any damn thing. We'd Just go to her. We wouldn't ask nobody if we could. Jus' say, We'll go to her,' an' we would. Jus' milk the cow and sling some grain to the chickens an' go to her. † (Steinbeck, pig. 57). The idea of this land is their motivation to keep working hard, hoping to one day be able to own land. â€Å"You God damn tramp.You done it, didn't you? I spouse you're glad. Everybody endowed you'd mess things up. You wasn't no good. You anti no good now, you lousy tart. â€Å", Candy says viciously to the corpse (Steinbeck, pig. 95). Here, Candy's voice shakes from expressing his true feelings. He blames Curler's wife for ruining his dream since Lien's share of the money is gone. Candy told George and Leonie the possible dangers of Curler's wife, but Leonie Just didn't know any better. Steinbeck depicts how the aged could not attain this dream of having land and being pertinent to a society where everyone was equa l.Throughout the novella, Steinbeck depicts how the disabled could not fulfill their dream because they were discriminated against and treated differently. One would think that the mentally handicapped got special treatment, but that was not he case. During the Great Depression, everyone received equal treatment. Some were institutionalized. Other times, some couldn't stand in line for rations due to their liability, which left them hungry and helpless, since everyone else already had someone to care for, whether it was for themselves or for their family.In the story, Steinbeck uses Leonie to publicize that the mentally handicapped could also dream like the rest. Lien's dream is to own land, but for one thing only; to tend rabbits. â€Å"The hell with the rabbits. That's all you can ever remember is them rabbits. â€Å", George says as he explains the dream land to Leonie and all he hears out of it is the rabbits (Steinbeck, pig. 4-5). Even though Lien's dream is to tend rabbits, George also has a dream and Leonie slows the process down greatly. â€Å"God mighty, if I was alone I could live so easy.I could go get a Job an' work, an' no trouble. No mess at all. An' what I got. I got you! You can't keep a Job and you lose me ever' Job I get. Jus' keep me shoving' all over the country all the time. â€Å", George complains furiously (Steinbeck, pig. 11). After fleeing Weed (because of Leonie touching a girl's dress), he says if it isn't for him, his life would be so much better. Later in the story, Leonie kills Curler's wife by accident. â€Å"l done another bad thing†, Leonie tells George, Just as he is getting ready to kill Leonie.After George kills Leonie, Slim states, â€Å"You Haddam, George. I swear, yah Haddam. † (Steinbeck, pig. 107). This quote illustrates the hard choice that George had to make. Even if George had not killed Leonie, Curler would have, along with George's American Dream. Their goals because they issued less rights than men. To show this in the book, the author exploits Curler's wife. She states, â€Å"Everybody! An' what am I doing'? Standing' here talking' to a bunch of bindle stiffs†a Niger an' a dumb-dumb and a lousy 01†² sheep †an' liking' it because they anti nobody else. (Steinbeck, pig. 79). This quote demonstrates how Curler's wife's right were constricted; even more than the ranches. She can't even have fun or do anything without Curler, which goes to show why her name isn't even said. She Curler's belonging. However, before Curler, there was some hope in her life. â€Å"l tell you I anti used to living' like this. I could made something' of myself. Come there when I was a kid. Well, a show come through, an' I et one of the actors. He says I could go with that show. But my 01†² lady would' let me. She says because I was noon fifteen.But the guy says I could. If I'd went, I wouldn't be living' like this, you bet. † , she explains (Steinbeck, pig. 88). Curler's wife had a chance to become a star, but her mother ruined it. She killed her dream by keeping her from being in the pictures since she was too young. If it wasn't for her â€Å"01†² lady† she would've been living her dream. From beginning to end of the novella, John Steinbeck exudes how African Americans during this time also had an American Dream, but could not make it a laity because of segregation. Crooks was the only African American on the ranch.Therefore, he was separated and put in a bunk next to the horses. Crooks dream was to be accepted and for everyone to be equal. â€Å"l tell yah a guy gets too lonely an' he gets sick. â€Å", exclaims Crooks to Leonie to try and explain to him his loneliness. Steinbeck shows how Crooks has his dream snatched away from him through racism. Even though the reader may see that the American Dream for these characters is way beyond reach and Just an illusion, I don't think it's clear if they see that. However, when Crooks stat es, â€Å"Nobody ever gets to heaven, and nobody gets no land. It's Just in their head. , he is facing the harsh, bitter reality (Steinbeck, pig. 74). Crooks knows that such comfort and happiness are not to be formed in that ambiance. In Of Mice and Men, an American Dream was evident for all characters, but they were beyond the bounds of possibility because of their skin color, gender, disability, age, or even a friend. Everyone was getting treated the same and prejudices during this time. Very little Justice lingered in the air. In Of Mice and Men, John Steinbeck splays the impossibility of the American Dream to the discovered, discriminated people of the asses.

Wednesday, October 23, 2019

District Sales Manager Essay

The principle error Maureen made was underestimating how significant company culture could impact decision-making at every responsibility level. Even though Quaker had strict functional reporting lines, the organization supported an informal culture based on friendliness and openness. Most importantly, Quaker’s ethos required a high degree of influence by persuasion and charisma—not formal authority. Secondly, the communication vehicle that Maureen chose to carry and deliver her proposed plan was ill suited for interconnecting the plan and expectations. Instead of going with the organization’s pattern of utilizing personal relationships, teamwork, and the openness to express opinions and feedback, Maureen sent a memo directly to the titanium extrusion sales representatives. In the memo, she simply gave a rationale for making the change. In response, a District Sales Manager (DSM) called Maureen to ask for a more detailed explanation for the change due to its arbitrary nature. Therefore, Maureen presented her findings to the DSMs in a yearly sales meeting in the presence of the VP of Marketing. †¢Lack of empowerment from authority: Although Maureen’s plan obtained approval from her boss, Hugh Salk, there was never a statement from the VP of Sales to his subordinates (district sales managers and sales representatives) supporting the proposal. As seen in Exhibit 2, Lawrence Israel, the VP of Sales has direct power over DSMs. †¢Company’s hiring practices: Maureen was hired at a managerial position because she had a very attractive professional background that made her a highly desirable candidate for her role. However, this was not in line with the company culture that encouraged internal promotions rather than external hiring at a managerial level (‘Typically, managers who joined Quaker from other steel or metal producers found the company a confusing and frustrating place in which to work. For this and this other reasons, most of Quaker’s managerial positions were filled from within’, p2). †¢Ã¢â‚¬Å"Responsibility lines† structure: Due to the company’s growth, many managers and at times whole divisions were responsible to other departments even though there was not a preset hierarchy that linked them. This situation complicated to a certain extent the relationship between the product management groups and the sales force as can be inferred from the fact that the titanium DSM in Chicago had to report to two bosses (p5). †¢Sales force’s lack of adaptation: Sales representatives were assigned to accounts based on experience and usually had tough time cracking big accounts. This was in part due to lack of backing from the technical support services and sometimes from the R&D labs as the larger accounts were more technically complex. It was also because there were no additional economical benefits to work on bigger accounts, thus harder work was not compensated in any manner (‘The Chicago DSM explained that a modest cash bonus existed, but that he did not use it, believing it had little effect’, p6). Hence, the only motivation for the sales people was closing a successful deal and working directly with customers which was frequent with small accounts. †¢Lack of relationship and communication: Maureen spent so much time analyzing the sales time simulations; therefore, she did not spend enough time getting to know other team members on the field. These circumstances did not favor building â€Å"trust† with the sales personnel and this lack of participation within the decision-making process hindered effective results (‘In response to the memo, one of the titanium DSMs called her to say that he had received several complaints from his salespeople about its arbitrary nature’, p8).

Tuesday, October 22, 2019

IEP Math Goals for Pre-school

IEP Math Goals for Pre-school The preschool standards aligned to the Common Core State Standards don’t take up geometry or operations- those are held over for Kindergarten.  At this point, the object is to build number sense.  The counting and cardinality skills focus on â€Å"how many.†Ã‚  These focus on â€Å"how much† as in volume and as well as â€Å"how big, or small, or tall, or short, or other attributes of plane figures, as well as volume.  Still, by pairing geometric shapes with colors and size, you will begin to build skills.   When writing IEP Goals for functions and algebra, you will focus on the attributes of shapes for sorting.  This early skill will help students build other skills in sorting, categorizing and finally in geometry.   Of course, to successfully sort for color, shape, and size, it is important to have the shapes in different sizes.  Many math programs come with the same size shapes- look for an older set (wooden) which are generally smaller than the plastic geometric shapes.   2.PK.1 Sort objects by similar attributes (e.g., size, shape, and color).2.PK.3 Compare sets of objects. Determine which set has more or less. The first and third standards could be combined in a single goal because they call on students to sort and compare, skills that require students to assign certain attributes and order items.  The sorting activities are great for young children who have not yet developed language, as they begin to notice the color, shape or size of the things that they sort. Goal:   By annual review date SAMMY STUDENT will sort and compare colored geometric shapes by color, size, and shape, correctly sorting 18 of 20 (90%) in three consecutive trials as instituted by the special education teacher and teaching staff. This would have four benchmarks: Objective 1:  By the end of the first semester of the ______ year, SAMMY STUDENT will sort geometric shapes by color with 80% accuracy as measured by the special education teacher and teaching staff.Objective 2:  By the end of the third quarter of the ____ year, SAMMY STUDENT will sort geometric shapes by shape with 80% accuracy as measured by the special education teacher and teaching staff.Objective 3:  By the end of the second semester of the ______ year, SAMMY STUDENT will sort geometric shapes by size with 80% accuracy as measured by the special education teacher and teaching staff.Objective 4:  By annual review date, SAMMY STUDENTS will sort geometric shapes and compare groups for more or less, with 90% accuracy as measured by the special education teacher and teaching staff.   Instructional Strategy: To begin students sorting, start with two:  two colors, two sizes, two shapes.  Once the students have mastered two, you can move them on to three.   When you begin with colors, use plates of the same color.  Over time they will know that orange is orange.   When you move on to shape names, be sure you talk about the characteristics of the shape:  a square has four sides and four square angles (or corners.  Some Math curricula talk about â€Å"corners† before they introduce â€Å"angles.†)  Triangles have three sides, etc.  When students are sorting, they are at the very first level.  In early intervention, pre-kindergarten you focus is going to be on building vocabulary, not the ability to name all the attributes of plane figures. Once you are started to expand the student’s repertoire, you need to introduce two attributes, as well as comparing small sets for â€Å"more† or â€Å"less.† Patterns The rule for patterns is they have to reappear three times to be a pattern.  The geometric shapes above, beads or counters of any kind can be used to demonstrate and then replicate patterns.  This is an activity that you can create with pattern cards that the students can replicate, first on the card with a template for placing the shapes, and then just a card with the shapes.  These can also be purchased   2.PK.2 Recognize and replicate simple patterns (e.g., ABAB.) Goal:  Ã‚  By annual review date, when presented with a pattern with three repeats, PENNY PUPIL will accurately replicate the pattern in 9 out of 10 trials. Objective 1:  By the first semester of the _______ school year, PENNY PUPIL will replicate bead patterns (A,B,A,B,A,B)  as represented in a picture presentation on a template, 8 of 10 probes as implemented by the special education teacher and teaching staff.Objective 2:  By annual review date, PENNY PUPIL will replicate a bead pattern from a picture, extending A,B to A,B,A,B,A,B, 8 of 10 proves as implemented by the special education teacher and the teaching staff.    Instructional Strategy:   Begin modeling patterns with blocks on a table.  Place the pattern, ask the student to name the pattern (color) and then have them replicate the pattern in a row closer to them.Introduce the pattern cards with the colored blocks (beads) pictured, and places to place each block below (a model template.)Once the student is able to replicate the card, have them replicate cards without a template.

Monday, October 21, 2019

war of 1812 worst fought war1 essays

war of 1812 worst fought war1 essays The War of 1812 also know as "The Second American War for Independance" (Bailey pg. 233) was fought between the meeger forces of the American government and the supreme power of Great Britain. The war ended in 1815 with the treaty of Gehnt, this treaty wasnt really a treaty but an armastice or surrender of arms. The American military suffered from defeat after defeat during the begining of the war, these loses could be contributed to by the lack of citizen support in the time of war, also the lack in size and power of the American military. These factor validate the statement that the War of 1812 was the "Worst fought American war." At the begining of the war America was fighting with Great Britain for regress of greivances such as forcefull impressment of sailors, and seizure of American cargos. Plus the extraction of British troups from the Ohio valley which was previously promised in two former treaties, Jays treaty and the Treaty of Paris. The regress of grievances was just a stepping stone for American ambition, after the start of the war Americans thought wouldnt it be great if we could add Canada and Spanish Florida to our ever expanding bounderies. But the backing of the war wasnt there politicaly the northern merchants were affraid of the deletion of trade options with Britain because of the war. The southern farmers were also against the war because Britain was there main purchaser of cotton and indigo. On the other hand you have to Backcountry farmers who need more room to expand there farms or find better soil for crops who wanted to the war to expand there expansion areas. Support also came from t he deep southern farmers who wanted Florida for there own. The ideas between both of these groups created political disunity between the states, making them quarel among themselves weakening the national government. As we travel back a little in time we come to Jefferson's ...

Sunday, October 20, 2019

Acknowledgement

The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information. On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the system’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy – is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management – is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database – is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System – is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification – is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie Theater Charging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024Ãâ€"768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk – wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: †¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. †¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. †¢ The system was able to track whom librarian is accountable for the loss of a returned material. †¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: †¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed †¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button †¢ Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA.. Acknowledgement The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information. On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the system’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy – is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management – is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database – is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System – is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification – is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie Theater Charging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024Ãâ€"768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk – wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: †¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. †¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. †¢ The system was able to track whom librarian is accountable for the loss of a returned material. †¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: †¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed †¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button †¢ Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..

Friday, October 18, 2019

Business Cycles and Concepts Research Paper Example | Topics and Well Written Essays - 750 words

Business Cycles and Concepts - Research Paper Example Hence, the rate of unemployment can be referred to as the number of people who are actively looking for work divided by the workforce. Changes in the rate of unemployment mostly depend on the inflows made up of unemployed persons who are beginning to look for jobs, of employed persons who lose their work and look for new ones and of people who stop looking for employment. Related terms are the labor force, the rate of participation as well as the rate of employment. The labor force is referred to as the number of persons employed plus the number of people unemployed, although looking for jobs. The non-labor force entails those who are not currently searching for jobs, people who are institutionalized like in psychiatric wards or prisons, children, stay-at home spouses, and those serving in the military. The rate of participation on the other hand is the number of people currently in the labor force divided by the population of working age group that are not institutionalized. Hence t he rate of employment referred to as the number of persons currently employed divided by the working age population (Timmons, 2008). The rate of unemployment is South Africa has increased in the third quarter of 2012 to 25.50 percent from 24.90 percent in the 2012 second quarter. The rate of unemployment in South Africa is reported by the Statistics South Africa. ... The graph of the trend of rate of unemployment in South Africa According to studies, the reason for high rates of unemployment is more of internal than external. This is what Hart, chief economist at Investment Solutions, said in Johannesburg while speaking at a Johannesburg Chamber of Commerce and Industry breakfast. Hart compared the rate of unemployment in South Africa to that of Brazil. Both the countries began decreasing in 2002, then the global financial crisis in 2008. Many jobs were created between 2008 and 2002. Although the rate of unemployment in Brazil decreased, the same could not be said for South Africa. Hart asserted that the rates of unemployment means that the country needs to look at it as a priority of the nation. This is because job creation appeared to be one of the lowest policy priorities. He continued to say that the countries who have the same unemployment levels with South Africa are Spain and Greece who at that time were in deep crisis. Small businesses ma de difference in these countries including Brazil. Therefore South African policies need to be changed and more than three million small businesses need to be created to cater for the ever increasing rates of unemployment (Timmons, 2008). References Timmons, J. (2008). Causes and Effects of Unemployment Rates. London:

Political science; Multicultural Nature;The book Privilage, Power, and Essay

Political science; Multicultural Nature;The book Privilage, Power, and Difference and the movieCrash - Essay Example However they can also be part of the solution as man has the potential to solve these problems. The central theme of the book can be summed up by this sentence in his book: "The trouble that surrounds difference is really about privilege and power - the existence of privilege and the lopsided distribution of power that keeps it going."(Allan Johnson 2001) According to Johnson all individuals confront issues of difference and privilege often causing fear and discomfort in people. Johnson also believes that differences in class have tremendous effect on peoples lives. But class is different from gender or race or ethnicity or sexual orientation. He believes that people have the potential to change the class to which they belong but the other differences are difficult to change because they are associated with birth. People are generally classified on the basis of their physical attributes and appearances. Class differences are a result of capitalism. The cause of modern racism is prima rily economic. Racism is a problem that affects all white people. Only the degree varies depending on their social class. The advantage of being white is likely to be more significant for the lower working-class than for whites belonging to the middle and upper classes. Social issues are prevalent because of the existence of privilege and misuse of power by people. Privilege creates inequality. People of all groups must work together to change this inequality. People dont want to discuss words such as "privilege," "racism," and "oppression." According to Johnson these words must be discussed openly and a collective effort must be made to resolve these issues. All feelings of blame, guilt, shame should be set aside and our focus must be on the dire need to change. In the movie Crash the director Haggis weaves several stories around incidents that happen during two days in Los Angeles. The stories revolve around a group of strangers who clash