Saturday, August 31, 2019

The Canterbury Tales

There are many characters in the poem The Canterbury Tales, and some of them are more important than others. The Prioress, The Wife of Bath, and the Pardoner are some of the most important characters. They have some similarities and some differences, though they all have a purpose in the story. The Prioress is a bashful, sensitive, emotional woman. She overreacts over any small tragedy such as the death of a small animal. She is compassionate and proper. The Prioress wears a broach with the inscription All things are subject unto love. She is foolishly sentimental and pays harsh attention to manners. She struggles to be well mannered and sophisticated but it is all phony. Chaucer describes her as the image of absolute beauty and righteousness of the day. She is a gentlewoman with a simple and coy smile (91). Her nose was elegant, her eyes glass-gray, her mouth small, soft and red, and her forehead fair of spread (93). She likes to eat, and she will not let any morsel go untouched. She speaks French very well, has perfect table manners, and likes being proper. The Prioress s behavior is scarcely nun-like, although it is not evil or exactly disobedient. She maintains some of the vainness of her pre-convent days, but this is because she is such a well-bred young women. The Wife of Bath is the most flamboyant of the travelers and she thinks very highly of herself. She was a plump, elaborate, jolly, bold, lusty, and voluptuous woman. She symbolizes Chaucer s grandmother. The Wife of Bath ahs been married five times and is looking for her next husband. She is a weaver and makes fine cloth. She wears bright red clothing of different variations, meant to catch the attention of others. The Wife of Bath is opinionated and energetic. She is the most noteworthy of the travelers low on the social scale. Chaucer indicates that she is quite promiscuous. The Wife of Bath shows off her body, mainly her legs. She displays her Sunday clothes with immense pride and makes sure to announce herself conceitedly. She speaks of ten of the upper hand a woman must maintain in marriage, and claims to know the remedies of love, or the rules of the game (100). The Wife of Bath appears to be a controlling wife, who wants nothing but authority over all men. She is a very envious woman, who desires only a few simple things in life. The Wife of Bath desires the obvious in life, but what she most desires above all is being more powerful than her man, her spouse, and her lover. The Pardoner is an audaciously dishonest man. He is extremely self-loathing yet loyal to his task of swindling people of their money by making them believe that they have sinned and need to buy pardons. Chaucer compares him to a gelding or a mare (104). Chaucer makes it clear that it is difficult to tell if the Pardoner is a man or a woman. He could not grow a beard, he did not wear a hat, and his hair was fairly long. He is a hypocrite. He tells people they have sinned and need to purchase a pardon from him, while the whole time he is sinning. He is one of the worst and disrespectable of all the travelers. He was very graceful and in church he was a noble ecclesiast (104). He liked to sing and he would sometimes get tips for it so he sang a lot more. These three characters do not act like they are suppose to. The Prioress does not keep her vowels of the convent well, the Wife of Bath does not keep her commitment to her husbands, and the Pardoner does not keep his vowel to do justice. They are all self-centered and don t care about anyone else. The Wife of Bath and the Pardoner are worried about having money and being in control (power). The Wife of Bath and the Pardoner are evil and do wrong things. The Prioress and the Wife of Bath both want a man, though the Prioress isn t allowed to have one. The Prioress is quieter than the Wife of Bath and the Pardoner. She also is has not done bad things like the other two have. The Wife of Bath is more controlling than the other two because she wants to be in control of everything. The Pardoner tries to get money out of people by lying to them about their sins. Although these three characters have a lot in common, they have differences too. Though they are some of the lowest in society, they are some of the most important characters in this poem. The Canterbury Tales This affect of creating characters who are unaware of how they are perceived by others is expertly shown in Chaucer's Canterbury Tales. The narrator of the story establishes that he too is also a character. In his book, even though he calls himself Chaucer, the reader should be cautious to take his words as his own opinion. In the Prologue the narrator depicts himself as an amicable character, but then he is blamed to be sullen. Relying on his memory, the narrator describes his impressions of the other pilgrims based on whether or not he likes them, and what specifically he chooses to remember, or not to remember. This method is referred to as a unreliable narrator. In the case of the â€Å"Pardoner† Chaucer's narrator is a very unreliable character. Proving this, the Pardoner sings â€Å"Com hider, love, to me! a ballad with which is accompanied by the Summoner, degrading his already questionable virtue of a man that works with the Church. Presenting himself as a man of ambiguous sexual nature, the Pardoner further challenges the social normalcy of the the Church. The Pardoner also takes with him on his journey to Canterbury the tools of his trade, which are objects that are used to deceive others in to thinking they are worth more than they appear, like the other pilgrims on the trip. The Pardoner finds out that special relics are valued on this pilgrimage, and he wishes to make a profit any way he can by selling materials to the other pilgrims whether it be pieces of paper with promises to forgive their sins or animal bones to ward off evil. Furthermore, the Pardoner preaches a sermon on greed that illustrates his own hypocrisy. The narrator is unable to see how the Pardoner deceives those around him, and fails to see who he really is thus showing the reader how the narrator of the story cannot always be trusted, but provides the reader with an interesting angle.

Friday, August 30, 2019

Adolescents and Cyberspace Essay

Abstract The Internet has a great deal of benefit in our lives. It is the window that opens onto the world and shows us everything that is happening around us. Although it is meant to help and support our needs, enrich our social lives and expand our civic connections, it has not been going so far in this way. A lot of research is showing that the heavy use of cyberspace is isolating people form the world around them. Knowing that adolescents are spending a great deal of their time in cyberspace, this article will examine the things they miss when they are left to grow up in it. Leaving Adolescents Grow Up in Cyberspace The question on whether leaving adolescents grow up in cyberspace is beneficial or not has long been controversial. When a lot agree that cyberspace has made their life easier, many others believe the opposite. Everything has side effects, which might have great impact on its user if not handled properly. It seems that adolescents, out of all other people, all missing a lot when their parents are letting them grow up in cyberspace. Everything in this advanced world is possible these days, that’s why we find students who study on the Internet in hybrid or online courses. Traditionally, learning has been assumed to take place in a classroom or face-to-face environment where the instructor and students are physically together, but not all students learn the same way and therefore the traditional approach is not ideal for all students (Young, 2007). This is true, but a lot of students are finding it difficult to cope with the new and modern way of learning, where the instructor lectures them online. Some students say: -â€Å"Instructor feedback tend to be slow† -â€Å"I didn’t feel as part of the class† -â€Å"You can’t verbalize your thoughts and let others hear your ideas† -â€Å"Too many technical problems† -â€Å"Unreliable Internet connections from my Internet service provider† -â€Å"You also lose the personal teacher student relationship† -â€Å"No way to read body language† -â€Å"With on-line classes, it is hard to be able to get the whole â€Å"personal† thing† -â€Å"You don’t get to see the professor or class members face-to-face† -â€Å"It takes more time to e-mail or post a question on the discussion board and wait for a response† (â€Å"Students’ Positive and Negative Experience in Hybrid and Online Classes†, 2007, page). Moreover, Irvine(2004) states: â€Å"Assignments are dispersed online. Students are much more likely to do research online than use a library. And even class handouts have gone the way of the Web, posted on electronic bulletin boards for downloading after class†(p.31A). So, if the Internet connection went off, students wouldn’t be able to continue their work. When the computer server in Emory University went down for a few hours one evening, a lot of people were at loose ends, they couldn’t to their homework (Sridharan, 2004). This is how adolescents are missing the more active and efficient way of learning because of cyberspace, thus suffering from a lot of educational and studying problems they are better off without. Looking at the world today would make us realize how much we miss security. And since adolescents are widely using cyberspace, they are the most likely to get affected by what it generates. A lot of teenagers have no problem in making friends, of whom they’ve never seen. In fact, they see that it is one of the purposes of using the Internet. But they never realize how dangerous it could be to meet someone you haven’t actually seen. The Internet allows people to communicate with people who are different from them, people in another country or kids at school they don’t talk to. This access of information is so easy, but of course there is a dark side to having such broad access: it gives identity thieves and sexual predators a new place to look for victims (Stern, 2004). Also, the Internet has shaped the way adolescents work, live, and relax. It has even created new ways for them to express themselves which might be liberating and fun but can also become a forum for of pettiness and criminal exploitation (Irvine, 2004). Furthermore, Ian and Walder (2005) say: As we have become dependent on the Internet, as the network of networks, so we have become vulnerable to criminal and terrorist networks that use cyberspace as a means to undermine and circumvent state control. Protecting against those that wish to attack  the integrity, confidentiality and availability of systems and data they process, is primarily an issue of implementing appropriate security measures. (page) The main purpose for this worry is because adolescents are unaware of what criminals might do to take advantage of people who want to be friendly, allowing them to threaten the country’s and society’s safety. In this way letting them spend too much time in cyberspace is making them loose a lot of security which puts them in dangerous problems later on. We must not forget the most important consequence of growing up in cyberspace: lack of social life and relationships. Sitting in front of the monitor for several continuous hours, without even noticing how time flies by quickly, makes us never want to get off the chair. As many adolescents are living in virtual communities, their only concern is making friends online. Ten years ago, social theorists were suggesting that the Internet would revolutionize social relationships (Carter & Denise M., 2004). Now, the Internet has come a far distance that kids and teens can’t live without it; people can find a job without leaving their desks, shop online without going to the mall and communicate with others without meeting face-to-face by e-mails, online chat rooms and instant messages. So, all the activities that were done with family and friends, are being done alone on the Internet. As a result, such activities have proved to be more isolating than watching television, which friends and family often do in groups, and the time spent with them is decreasing a lot in the presence of the Web. In addition, teens are preferring not to go out for walks or hang out with friends because they are busy in their own larger world. Know it or not, youngsters who are allowing time online to replace face-to-face interaction are being isolated from the real world and are being trapped in the virtual world (Staples, 2004). Seemingly, â€Å"Teenagers who spend much of their lives hunched over computer screens miss the socializing, the real world experience that would allow them to leave adolescence behind and grow into adulthood. These vital experiences, like much else, are simply not available in a virtual form† (Staples, 2004, p.A29). All of this is breaking the social relationships and is bringing up adults that don’t know how to deal with others because they never had the chance to sit and talk face-to-face. A lot of people fear of not being able to go with the flow; who ever doesn’t have access to cyberspace doesn’t have a life. But this isn’t proved to be completely true since it’s not being used in the best and efficient way. Of course it’s the parents job to lead them to the right track; they should always keep them under high supervision. To be more specific, parents should encourage them to have a real life, make real friends, go to real places and spend quality time with family. This doesn’t mean getting rid of this great technology but not letting it control them. Indeed, adolescents are missing a lot of the real world and its content, and aren’t aware of the circumstances and the costs of growing up in cyberspace. References Carter & Denise, M.(2004, December).Living in Virtual Communities: Making Friends Online.Journal of Urban Technology 11(3), 109-125.Retrieved March 19, 2008, from EBSCO Host database. El Mansour, B. & Mupinga, D.M.(2007, March).Students’ Positive and Negative Experiences in Hybrid and Online Classes.College Student Journal 41(1), 242-248.Retrieved March 19, 2008, from EBSCO Host database. Ian & Walder.(2005, April).Crime and Security in Cyberspace.Cambridge Review of International Affairs 11(3), 109-125.Retrieved March 19, 2008, from EBSCO Host database. Irvine, M.(2004, December 5).Youths Adopt, Drive Technology Advances.Fort Worth Star-Telegram, p.31A. Staples, B.(2004, May 29).What Adolescents Miss When We Let Them Grow Up in Cyberspace.New York Times, p.A24.

Thursday, August 29, 2019

Paper 4 Essay Example | Topics and Well Written Essays - 1000 words

Paper 4 - Essay Example Regarded as one of the best rock climbers in the world, as of 2007 Chris Sharma had devoted the last nine years of his life to seeking the most challenging rock climb ever. Chris Sharma hails from Santacruz, California but spends less than a month there every year. You would most likely see this unassuming character poring over maps finding out about exotic locations in the most beautiful or remote parts of the world, where an almost impossible and near vertical rock surface awaits his assault. He is especially enthralled by rock formations overlooking the sea or even emerging out of them. Life is an unending journey of spontaneity where Chris feels at home in any part of the world, and the only thing that he lives for is the next best climb. Chris looks like he practices yoga and other eastern beliefs like transcendental meditation-because climbing begins from the inside, from the belief that you can do it. It takes a lot of training, practice and dedication. It is winning the battle from within and refusing to give up. As Chris Sharma says, sometimes a really challenging surface can take years to conquer. It took Chris the better part of four years t o develop and hone his skills and techniques before he realized that he could climb most surfaces with skill. Chris loves both bouldering- which is defined as climbing a short but difficult rock surface without ropes, and deep water soloing-which is defined as climbing a longer surface between 60 and 100 feet that has no safety net but water to cushion the fall. Chris maintains that climbing is an artistic pursuit that demands a lot of training and perfection. It helps you to be one with nature. Sport climbing on the other hand can be done in the safety of an indoor studio, with all the protection you need. Chris labels his challenges as projects. He looks carefully at the kind of surface he plans to climb, from the nature of the rock to the formation,

Wednesday, August 28, 2019

Article brief Example | Topics and Well Written Essays - 750 words

Brief - Article Example The methodology used by the study to come up with a fraud model involved three steps. The first step was to data of a public company from 1995 to 2002. A sample of 100 companies was split into fraud and non-fraud companies (McKee, 2014). The third step was to test 15 predictive variables to determine those that were good predictors of fraud status. The fraud companies were selected from SEC Enforcement Release that provided publicly reported fraud. Non-fraud companies were matched with the fraud companies in terms of three criteria including market value, positive change of 25% in net income, and standard industrial classification (McKee, 2014). The predictive variables were derived from prior research literature. Analysis of the data involved binary logistic regression using fraud status as the variable to be predicted. The variables used when analysing the 15 predictive variables include company size, auditor tenure, and McKee-Lensberg bankruptcy probability. The fraud model was tested with 91 companies which were in the original sample. The other 9 companies not included in testing did not have data for at least one of the three variables used to analyse the predictive variables (McKee, 2014). A company with fraud probability greater than 50 was regarded as a fraud company while a company with less than 50% probability of fraud was regarded as a non-fraud company. The results of the study are that the model predicted 63 of the tested companies’ fraud status correctly. This reflected 69.2% level of accuracy. The model also predicted fraud status of 28 companies incorrectly, reflecting 30.8% rate of error. This model can be compared favourably to the fraud model developed by Alden et al (2012) which showed 75% accuracy of training rates and 64% accuracy of validation. This article is important because it provides a fraud model that can be used by auditors to develop standards

Tuesday, August 27, 2019

Religious persecution in Indonesia ( government of Indonesia is Research Paper

Religious persecution in Indonesia ( government of Indonesia is turning to a blind eye towards it) - Research Paper Example Sukarno, the first president of Indonesia, chaired a meeting with his cabinet and established a constitution law that requires the future president candidates to be a Muslim in order to curb persecution of Christians and other minorities in Indonesia. Having Muslim as a religion will make government officials have a more stable position to this problem. This attracts several people to convert to Muslim and to some extent; they are willing to change their name to Islamic (Aragon 39-41). Religious discrimination is a serious issue in Indonesia and yet the government is not taking any action to solve this issue. They should be more understanding and respect other religions. Although it has subsided recently, discrimination against religion in Indonesia is still visible and vibrant. The religious conflicts have been solely targeting Christians. Indonesia is the world’s largest and fastest growing Muslim country in the world. Being a third world country, Indonesia has unstable political structure and racial and religious discrimination common. Today, discrimination is regarded as an ordinary daily occurrence and sometimes it may have gone too far. In this particular country, discrimination against religion had hurt hundreds and even taken several lives. For instance, to demonstrate the pain the Christians are going through in Indonesia, extreme persecution and violence is the order of the day in that at some point, three Christian school girls were mercilessly b eheaded by masked attackers (AtlasShrug. Com n.d). The girls were attending a Christian school when they were attacked. The Police responded saying that one of the girls head hanged in front of the newly constructed Christian church while others placed outside the police station. The Islamic extremist claims that they are killing Christians in order to instill fears in the hearts of Christians to stop them from spreading Christian messages. Shockingly, the government of Indonesia is turning blind eye to

Monday, August 26, 2019

Management Accounting Essay Example | Topics and Well Written Essays - 2000 words - 6

Management Accounting - Essay Example This platform helps the organizations to take their long term business decisions. It has been observed that there is a long term debate between the global fraternities related with the functionality of accounting. Many experts have described accounting as the communicating tool for the organizations to showcase their business reality. On the other hand many people have stated that accounting itself constructs reality. This debate is a burning issue for the organizations across the world. Accounting is nothing but an information science used for the purpose of classifying financial data. Here in this essay the title statement will be critically analyzed on the basis of various favorable and unfavorable arguments. The essay will also include the framework of Burchell et al into this essay. The essay will follow a step by step approach which will analyze the topic in detailed fashion. The essay will follow a suitable structure. With the help of this essay an attempt will be made to end the debate related with the title topic. Accounting is a process through which organizational reality can be communicated. Organization does accounting for the purpose of communicating realities towards the all stakeholders related with the organizations. Every organization has internal and external stakeholders. It is important for internal and external stakeholders to know the organization reality in detailed fashion. To get the detailed information there is no substitute of accounting. It indicates that accounting does communicate reality to the stakeholders. Financial communication is the most important factor on the basis of which investment related decisions are being made. Investors invest their moneys on the basis of proper information. That information is being communicated with the help of accounting. According to the framework of Burchell, if uncertainties of

Sunday, August 25, 2019

Applied Economics Essay Example | Topics and Well Written Essays - 250 words

Applied Economics - Essay Example Concerning the four countries in question it is evident that the rate of growth of the Gross domestic product varies from one country to another (The world bank, 2014). Based on the comparison among the four countries it is apparent that a high volume of Money at LCU corresponds with a low gross domestic product and a low volume of money at LCU corresponds with a high gross domestic product. Money at LCU is one of the significant economic indicators since it refers to the money that is in circulation (Econstats, 2014). In this case, financial transaction tax will have a direct impact on the money at LCU. In this case, financial transaction tax will lead to a decrease for money at LCU. Based on the relationship between money at LCU and GDP a reduction in the money at LCU will raise the rate of GDP for a given country. Consequently, this will have a reduction in money at LCU will lead to reduction in inflation since it will reduce the spending habits of residents in a country. On the o ther hand, an increased local currency unit volume will increase money supply, which may lead to inflation (Eisenstein, C. 2011, 295). In conclusion, an analysis of the four data variables Inflation, money at its local currency unit (LCU), and revenue collected form tax and the gross domestic product outlines that financial transaction tax can have an impact on the economy of a country. Because financial transaction tax can regulate the money supply of a country, it can have an effect on the economic activities of a country. As a result, financial transaction tax can be used to stabilize economic conditions of a

Art Analysis Essay Example | Topics and Well Written Essays - 500 words

Art Analysis - Essay Example His interest was focused on capturing the body movements so that he considered himself and preferred to be known more of a realist than an impressionist. Seurat on the other hand experimented on a new form of painting which was called pointillism because he used dots of colors to create a visual effect where primary colors placed near each other form the desired secondary colors. This experiment was inspired by his interest on color theories and the study of primary and secondary colors so that his style hugely contrasted the common manner of mixing colors on a palette. With the different styles of the two artists, obviously, their works have all been different although their thoughts placed into canvass both reflect features of impressionism. In Seurat’s A Sunday Afternoon, he tried to capture a photographic image of his subjects where the movements of the people are meticulously considered, interpreting even their facial expressions. As mentioned earlier, he used the concept of optical illusion where the viewers’ eyes seem to ‘mix’ the colors to form his desired color combinations with the use of dots of primary colors. Therefore, there are no traces of brush strokes in his work. Lines and curves have all been dependent on his skill and patience in making the painting. Looking more intently at the painting, one could just imagine the time spent in creating it, the care and painstaking effort exerted on the work. Seurat used the bright colors yellow and red as well as the cool colors green and blue, creating a lively sce ne at the island. He also used other colors for other objects and subjects in the painting, making use of a wide variety of colors. In contrast to Seurat, Degas formed his Ballet Rehearsal at the Set through brush strokes specially using thin lines to express the forms of his subjects. He used a mixture of long and short thin lines to define his thoughts placed into canvass, making every part of the painting detailed. One that could be

Saturday, August 24, 2019

Journal 1 Essay Example | Topics and Well Written Essays - 250 words - 5

Journal 1 - Essay Example During the reconstruction, factors such as social, cultural, political and economic emerged as the root problems that made Haiti experience hard times in handling this process on its own (Ulysses 38). Cultural illiteracy, witchcraft, Haitian Vodou, political instability like the 1991 military coup that ousted Jean- Bertrand Aristide and the effect of imperialism are some of the issues Ulysses highlights in his article (Ulysses, 40). Former American President Bill Clinton stated that the issue of money to reconstruct Haiti was not the fundamental problem, but the Haitians themselves. The earthquake unearthed Haiti’s history that is darkened by colonialism, racism, segregation, witchcraft, cultural illiteracy and political instability. It made Haiti look like, â€Å"a backward and uncivilized black country hidden in the west† (Ulysses 41). In conclusion, Haiti’s problems and internal threats can be summarized into social, cultural, political, and economic factors, which have long been embedded in their history since their independence. The 2010 earthquake justified that these factors need to be adequately addressed in order to solve Haiti’s

Friday, August 23, 2019

Leadership and Management in Nursing Essay Example | Topics and Well Written Essays - 1750 words

Leadership and Management in Nursing - Essay Example Our nursing values are based on passion, respect, integrity, and on delivering the best healthcare services. Based on the above mission, vision, and values of our organization and of the nursing department, this paper shall now analyse such elements and discuss the extent to which these values are reflected in the nursing management and leadership of the hospital. The vision of the organization is to add years of healthy life to the people of Singapore. This vision is common to other health care organizations. This vision statement was able to capture the overall purpose of the organization. Vision statements of healthcare organizations present hopes for the future (Williamson, 1997). They are goals for the long-term and are based on general goals which the organization seeks to gradually obtain through the implementation of more specific objectives. This vision presents what the organization seeks to become as it now seeks to fulfil its mission. In the case of the hospital, it presents its larger goal and realization through its vision of seeking a longer life for the people of Singapore. It is also an inspirational and challenging statement. It presents a lofty and seemingly unobtainable goal, and it cannot stand alone without a more specific set of goals. The mission statements for the organization are closely linked to the organizationâ⠂¬â„¢s vision. The mission statement for the organization is more specific in attaining and reaching the organization’s end goal. It specifies its nature as an organization – that of building tradition; reaching out to the community; doing best to serve, care and heal; and of aiming for excellence in cost effective healthcare education and research. Mission statements for the organization are laid out in order to specify the products and services offered by the organization (Swayne, Ginter, & Duncan, 2006). Some hospitals and

Thursday, August 22, 2019

Pre-Industrial European Labour Market Essay Example for Free

Pre-Industrial European Labour Market Essay In this critical review I will compare the two texts by Peter Earle and Elise van Nederveen Meerkerk. The articles are about woman’s work in the 17th and early 18th century respectively about women’s work in the Dutch textile industry and female labour marked in London. The article by Earle (in 1989) is released before Meerkerk’s article (2006) and there are in Meerkerk analysis some pointing to Earle’s article. I will start with a short presentation of each of the two articles, how and from what time data is collected, some of the findings and conclusion. And then what contribution their papers have made to the historical debate about women’s role in the pre-industrial labour market. Both Earle and Meerkerk refer to Alice Clarks pioneer study from 1919 about women’s work in production in pre-industrial time[1] [2]. Earle is more critical to her work than Meerkerk. Peter Earle is the first person after Alice Clark to look deep and critically into how women had it in the labour market in the 17th and 18th century. In his article Earle is saying â€Å"Indeed, it would be fair to say that we know virtually nothing about the female labour force in early modern London except in the most unstructured and superficial way[3]. An important note Earle makes in his introduction is that the arguments that Alice Clark put forward has more or less just became accepted and Peter Earle is the first one to test Alice Clark’s analyze[4]. A main thing Meerkerk and Earle are concentrating on is Clark statement that there where a ‘golden age’ for women in the 17th and 18th century. What becomes clear in Meerkeerk article is that she is influenced by development in economic theory and social theory as well. The way Meerkeerk and Earle do their analyze is different. A major reason for that is that Meerkeerk is a social scientist while Earle is a ‘traditional empiricist historian’. What is easy to see is that Earle look at numbers much more than Meerkerk do, and while Meerkerk also look at numbers, she uses market theories as well such as the split market theory to analyze the findings. Katrina Honeyman and Jordan Goodman used this when they where looking at European women’s work between1500 – 1900[5]. Peter Earle is more or less guided by his sources. He goes thru his sources and construct figures [6] from his sources. He also takes other sources from other historians such as Wrigley and Schofield [7]. And this is what he is basing his conclusion on. Meerkerk on the other hand developed a frame work, she had an idea before she starting on the research. The idea is that of how to analyze her data. Based upon works from many social scientists and historians and their findings, she found that †we must therefore derive a new theoretical framework to explain the working of gender in the pre-industrial labour marked† [8]. On this background she analysed the data. Her work became a supplement to understand the segmentation of the labour market. Meerkerk wanted to know who got the core jobs, who got the peripheral jobs and why men tends to earn more than women even if they are doing the same work. Core jobs are higher paid and productivity while peripheral jobs is lower paid and lower productivity. Peter Earle has data from witnesses and defendants in the time period of approximately 1660 – 1725. Earle have an impressive material from whole London divided by districts, occupations, full-time and part-time, women and men and their age. He also has data from which class the citizens are from, if they are upper class or lower class (low wealth to high wealthy), and also reading skills and illiterate[9]. Earle is self-stating that poor people are under represented because they weren’t literate enough to be called as witnesses[10] Meerkerk’s material not less impressive than Earle’s, is from last quarter of the sixteenth century, first half of seventeenth century and 1810. Other than showing women in the textile industry in Holland, she are showing the percentage of married women who are in work, men and women in different industries, different jobs, heads of family per industrial sector and heads of family in textile industry. She also looks at women and men’s income. Meerkerk also has an analyse of guilds in the textile industry[11]. What is worth mentioning is that Tilburg and Leiden who are the main places in Holland she is looking at was wealthy places economically mainly because of the textile industry. Conclusion: Even though they goes with their work in a different way, they both come up with similar conclusions. None of them believes it was a ‘golden-age’ for women. Meerkerk said women where restricted to peripheral and low paid jobs but it was changeable, depending upon industry and it as is peak when women occasionally gets better paid jobs, but as soon the industry starts to decline women where the first to loose their job. The fine jobs women’s ones had, where then given to men. It’s easy to see there where gender discrimination. As mentioned, Earle has a kind of similar conclusion; He means that women where expected to work at that time to support their family. Women got low-paid and low skilled jobs while men got the higher paid jobs (core jobs). Meerkerk and Earle’s works compliments each other as to real knowledge about women’s situation on the labour marked in pre-industrial times. What Meerkerk’s work gives us more than Clark is supplement to the theories about segmented labour marked and the labour marked segregated by gender, and she are valuable to understand the labour marked in preindustrial time and today’s labour marked as well. Bibliography: Earle, Peter: The female labour market in London in the late seventeenth and early eighteenth century, 1989 Economic History Review, 2nd ser., XLII, 3(1989), pp. 328-353 Meerkerk, Elise Van Nederveen; Segmentation in the Pre-Industrial Labour Market: Women’s Work in the Dutch Textile Industry, 1581 – 1810 page 189 216, 2006 Internationaal Instituut voor Sociale Geschiedenis

Wednesday, August 21, 2019

Artificial intelligence

Artificial intelligence Artificial Intelligence: Artificial Intelligence began in the 1960s, the first attempts were game playing (checkers), theory proving a few simple theories and general problem solving. General problem solving was much more difficult than originally anticipated. Researchers were unable to tackle problems routinely handled by human experts. Artificial Intelligence can be defined in many ways as it depends from which point of view you look at it from. From the intelligence point of view artificial intelligence is to make machines intelligent thus making them act as we people would act. However artificial intelligence from a research perspective is how to make machines do things people are currently doing better in other words making machines do what we humans can do. Now from a business point of view artificial intelligence is a combination of powerful tools, and methods for using those tools to solve business problems. As for the programming point of view artificial intelligence is the study of symbolic programming, search and problem solving. Expert Systems: Expert systems are defined on bases functional and structural. Expert systems from a functional perspective are defined based on what the system does rather than how it does it. A computer program that behaves like a human expert in some useful ways. (Winston Prendergast, 1984) Nevertheless we can define expert systems on the bases of their structure in many ways depending on which angle we look at it from Problem area â€Å"Solve problems efficiently and effectively in a narrow problem area. (Waterman, 1986) typically, pertains to problems that can be symbolically represented (Liebowitz, 1988) Problem difficulty apply expert knowledge to difficult real world problems (Waterman, 1986) solve problems that are difficult enough to require significant human expertise for their solution (Edward Feigenbaum in Harmon King, 1985) â€Å"Address problems normally thought to require human specialists for their solution (Michaelsen et al, 1985). Performance requirement the ability to perform at the level of an expert (Liebowitz, 1988) â€Å"Programs that mimic the advice-giving capabilities of human experts. (Brule, 1986, p.6) â€Å"Matches a competent level of human expertise in a particular field. (Bishop, 1986, p.38) â€Å"Can offer intelligent advice or make an intelligent decision about a processing function. (British Computer Societys Specialist Group in Forsyth, 1984, pp.9-10) â€Å"Allows a user to access this expertise in a way similar to that in which he might consult a human expert, with a similar result. (Edwards and Connell, 1989, p.3) Explain reasoning â€Å"The capability of the system, on demand, to justify its own line of reasoning in a manner directly intelligible to the enquirer. (British Computer Societys Specialist Group in Forsyth, 1984, p.9-10) incorporation of explanation processes (Liebowitz, 1988) Expert Systems from a structural perspective are defined on the bases of how the system functions. â€Å"Using the programming techniques of artificial intelligence, especially those techniques developed for problem solving (Dictionary of Computing, 1986) However we can define expert systems on the bases of their structure in many ways depending on which angle we look at it from Use AI techniques using the programming techniques of artificial intelligence, especially those techniques developed for problem solving (Dictionary of Computing, 1986) Knowledge component the embodiment within a computer of a knowledge-based component, from an expert skill (British Computer Societys Specialist Group in Forsyth, 1984) a computer based system in which representations of expertise are stored (Edwards and Connell, 1989) The knowledge of an expert system consists of facts and heuristics. The facts constitute a body of information that is widely shared, publicly available, and generally agreed upon by experts in the field. (Edward Feigenbaum in Harmon King, 1985) Expert systems are sophisticated computer programs that manipulate knowledge to solve problems (Waterman, 1986) Separate knowledge and control â€Å"Make domain knowledge explicit and separate from the rest of the system (Waterman, 1986). Use inference procedures an intelligent computer program that uses knowledge and inference procedures (Edward Feigenbaum in Harmon King, 1985) The style adopted to attain these characteristics is a rule-based programming style. (British Computer Societys Specialist Group in Forsyth, 1984) Exhibit intelligent behavior by skillful application of heuristics. (Waterman, 1986). The heuristics are mostly private, little rules of good judgment (rules of plausible reasoning, rules of good guessing) that characterize expert-level decision making in the field. (Edward Feigenbaum in Harmon King, 1985) incorporation of ways of handling uncertainty(Liebowitz, 1988) Model human expert â€Å"Can be thought of as a model of the expertise of the best practitioners of the field. (Edward Feigenbaum in Harmon King, 1985) representation of domain-specific knowledge in the manner in which the expert thinks (Liebowitz, 1988) â€Å"Involving the use of appropriate information acquired previously from human experts. (Dictionary of Computing, 1986) Components of an Expert System An expert system consists of 4 main components which are listed below: Knowledge base a representation of the expertise and is usually inputted in IF THEN rules, and are usually put into a database for easy access by the system. Working storage Data which is specific to a problem being solved by the expert system. Inference engine the code at the core of the system which derives recommendations from the knowledge base and problem-specific data in working storage. User interface the code that controls the dialog between the user and the system. People and they consist of: Domain experts the individual or individuals who currently are experts in solving the problems the system is intended to solve. Knowledge engineers the individuals who encode the experts knowledge in a declarative form that can be used by the expert system. Users the individuals who will be consulting with the system to get advice which would have been provided by the expert. Furthermore there are some other optional components that might be added to the system as sub systems and which try to make the expert system more efficient thus making it more powerful and they are. Explanation sub system is used to explain the logic or reason of recommending a solution. Justifier is another name of explanation sub system. Justifier also explains why a solution is recommended or not recommended. Knowledge refining sub system is used to refine the knowledge in the knowledgebase after working every time over a problem. It works exactly like human beings who analyze their actions and learn from their mistakes to perform better in the future. Programming Languages Used to Develop Expert Systems Here are some of the programming languages used to develop expert systems. 1. LISP, developed in the 1950s, is the early programming language strongly associated with AI. LISP is a functional programming language with procedural extensions. LISP (LISt Processor) was specifically designed for processing heterogeneous lists which is a list of symbols. Features of LISP that made it attractive to AI researchers included Run- time type checking. Higher order functions (functions that have other functions as parameters). Automatic memory management (garbage collection) and an interactive environment. 2. The second language strongly associated with AI is PROLOG. PROLOG was developed in the 1970s. PROLOG is based on first order logic. PROLOG is declarative in nature and has facilities for explicitly limiting the search space. 3. Object-oriented languages are a class of languages more recently used for AI programming. Important features of object-oriented languages include: concepts of objects and messages objects bundle data and methods for manipulating the data sender specifies what is to be done receiver decides how to do it inheritance (object hierarchy where objects inherit the attributes of the more general class of objects) Examples of object-oriented languages are Smalltalk, Objective C, C++. Object oriented extensions to LISP (CLOS Common LISP Object System) and PROLOG (LO Logic Objects) are also used. The Difference between these programming languages and procedural programming languages. According to an article in the Information and Software Technology journal by Alexander Chatzigeorgiou of the Department of Applied Informatics, at the University of Macedonia, the object-oriented approach is known to introduce a significant performance penalty compared to classical procedural programming. For instance, profiling results for embedded applications indicate that C++ programs, apart from being slower than their corresponding C versions, consume significantly more energy (mainly due to the increased instruction count, larger code size and increased number of accesses to the data memory for the object-oriented versions). Example of an Expert System One of the most recognized expert systems used today by the general public is the online doctor due to the fact that many people use it daily. In brief this expert system is used to diagnose people by asking them what the problem is and then suggesting the actions that they should take which sounds very similar to an expert system where the illness is the problem the recommended actions are the solutions. In this example the website that was studied is www.yourdiagnosis.com In this expert system there are main components of the expert system and they are: The people The people are separated into three categories and they are: The domain experts who are actually the doctors who provide the data for the system. The knowledge engineers are the engineers who enter this system in a rule based input for example giving multiple choice questions to diagnose a cold. Do you feel cold.[ ] Do you feel hot? [ ]. Do you feel normal? [ ] System engineer who is the person in charge assembling and managing the system. The user who is the person asking for the diagnoses. The user interface The user interface is the website used by the user to find the diagnoses. Example: The inherence engine The inherence engine which in this case is made by the engineer using a web based programming language like ASP or PHP in the website from the last example we see that the programming language used is ASP and we can see that from the address bar. http://www.yourdiagnosis.com/yourdiagnosis/Yourdiagnosis.ASP?WCI=WorldMapHTMWCE=ClickWCU The knowledge base The knowledge base in this case is where all the rules that the knowledge engineer inputted them in this case the engineer used Microsoft SQL SERVER 2008. The knowledge in this case is the medical knowledge given by the doctors. The working storage The working storage in this case is a storage area on the server where each users data is stored in a relational database The benefits of using artificial intelligence The main benefits of using artificial intelligence are: Provide answers for decisions, processes and tasks that are repetitive Hold huge amounts of information Minimize employee training costs Centralize the decision making process Make things more efficient by reducing the time needed to solve problems Combine various human expertises. Reduce the number of errors caused by humans. Provide strategic and comparative advantages that may create problems for competitors Look over transactions that human experts may not think of Even though the benefits of artificial intelligence is more than the above we find that the main advantage to using artificial intelligence is to maximize the efficiency of a business thus giving the business the edge it needs to over throw its competitors. Why Artificial intelligence is hard to include in information systems The difficulties in including artificial intelligence in information systems are due to many facts one of which is the expense. Furthermore there are multiple factors why its so difficult to include artificial intelligence in information systems from which is the human acceptance to Artificial intelligence especially in the older groups another factor is that domain experts will be threatened by the fact that they are giving their expertise to a company and the fear of being redundant. From the technical point of view the implementation of artificial intelligence is quite hard due to the if rule conversion of the expertise. And the integration with old systems will require an effort especially for established companies with legacy hardware and software. Which brings us to the expense part of the problem? There is no doubt that artificial intelligence is an expensive approach as it is time consuming as it requires a lot of time and human resources. Furthermore developing artificial intelligence relies heavily on having the correct expert information and having something wrong in the knowledge base might cause damages which will lead to costly error and problems. Reference Anonymous. Dictionary of Computing, 1986, New York: Oxford University Press. Bishop, Peter. Fifth Generation Computers Concepts, Implementations Uses, 1986, Chichester, England: Ellis Horwood Ltd. Brule, James F. Artificial Intelligence: Theory, Logic and Application, 1986, Blue Ridge Summit, PA: TAB Books. Edwards, Alex and Connell, N.A.D. Expert Systems in Accounting, 1989, Herfordshire, UK: Prentice Hall International (UK) Ltd. Forsyth, Richard, Expert Systems: Principles and Case Studies, 1984, London: Chapman and Hall Computing. Harmon, Paul and King, David. Expert Systems: Artificial Intelligence in Business. 1985, New York: Wiley. Liebowitz, Jay, Introduction to Expert Systems, 1988, Santa Cruz, CA: Mitchell Publishing, Inc. Michaelsen, Robert H.; Michie, Donald and Boulanger, Albert. The Technology of Expert Systems Byte; April 1985 Rich, Elaine and Knight, Kevin. Artificial Intelligence Second Edition. 1991, New York: McGraw-Hill. Waterman, Donald A. A Guide to Expert Systems, 1986, Reading, MA: Addison-Wesley. Winston, Patrick H. and Prendergast, Karen A. (Editors). The AI Business: Commercial Use of Artificial Intelligence, 1984, Cambridge, MA: The MIT Press. Ruth A. Palmquist, Asst. Professor, AI and Expert Systems, 1996, http://www.ischool.utexas.edu/~palmquis/courses/ai96.htm Dan E. OLeary, University of Southern California, 1994, http://accounting.rutgers.edu/raw/aies/www.bus.orst.edu/faculty/brownc/es_tutor/bus_ai.htm Robert S. Engelmore, May 1993; WTEC Hyper-Librarian, http://www.wtec.org/loyola/kb/c1_s1.htm Carol E. Brown, Oregon State University, Dan E. OLeary, University of Southern California, 1995, http://accounting.rutgers.edu/raw/aies/www.bus.orst.edu/faculty/brownc/es_tutor/es_tutor.htm#1-AI

Tuesday, August 20, 2019

Social and Legal Issues associated with Multimedia Industry

Social and Legal Issues associated with Multimedia Industry Section A Identify and discuss legal and social issues of the multimedia industry Multimedia the name itself indicates its a combination of multiple media content, all the digital devices, electronic machines utilized this generation and future generations mainly aims to focus on delivering high quality multimedia content in their desired product. As the Quality of the products or service is good, such organizations have huge reputation in society. Apart from goodwill there are also some other side effects in multimedia industry (Adjeroh and Nwosu, 1997). The media content can be served in many forms text, audio, and videos by stealing others digital property or morphing media content and providing false reputation to organization. Majorly Copyright issues cause much loss to film industry, by duplicating media content, and selling illegally earns money. Most of the organizations in media industry are using advanced tools in designing graphics, logo creation, banner creation, 2d animation, 3d animation and wedding works etc. But along with pros there are some cons existed in this field. This paper presents all the pros and cons, legal and social issues in depth knowledge to improve its performance, effectiveness and remove its difficulties for future generations as well as it helps for technology vandals. Some of the major issues in media industry are copyright issues, Health and safety, Employer liability, Employer rights, Confidentiality, Accuracy, Privacy, Harm and offense, Misuse of technology in social media are critically evaluated in this paper. Other part of paper will discuss purely about design and implementation of application show case, the way animation is planned using appropriate tools and its sub options. In depth explanation of the way how individual objects are re-shaped and grouped as one object. Copyright Issues: A medium used for protecting rights of media creators from various illegal technologist by providing proprietary ownership (Browell, 1997). These basic rights are already formulated decades ago to protect individual copyright. But with the use of internet and technology these laws are subjected to modifications. Individual has a Right to freedom but no right to interfere or utilize others media content without their concern. Many authors in related field of research have mentioned similar qualities and illegitimate use of copyrighted documents or content. Recent times  ­Ã‚ ­Ã‚ ­Ã‚ ­Latest techniques have emerged in protecting and identifying illegal misusers of media content using water marking process. According to US legislation have some protocols released on Copyright act of 1976 a notice on such issues it says that offense of using or selling others work without purchasing its rights. Health and Safety policy: This policy clearly describes about some sectors of multimedia industry such as Film industry, news channels, discovery, cartoon which gives support and advice to public (Adjeroh and Nwosu, 1997). Before telecasting media content certain risk assessments are taken to avoid miscommunications and social issues. Accuracy: Misuse of technology by creating unrealistic media content and misguiding the public and provoking them to unwanted emotions causes severe social issues which have been identified in this research. So it is advised to not to modify the facts for their own self to acquire profits. This may cause huge damage and mistrust on media industry reputation. Privacy: The primary aspect of multimedia industry is nothing but privacy, it always advised to not interrupt with any individual life before telecasting multimedia content (Cuttler, 2011). The telecaster must be aware of laws and have permission of rightful person whom it concern before providing publicly. Harm and offense: Some Television broadcaster and every civilian have right to produce righteous content and information to public. By keeping kids and youth on mind unsuitable content must be avoided. In order to prevent from socio ethical issues on misguided multimedia content (Multimedia, 2016). Here, there are some other issues which are related to moral principles based on ethical way in media industry creating trust with appropriate information will create trust else subject to issues. Adjeroh, D. and Nwosu, K. (1997). Multimedia database management-requirements and issues. IEEE Multimedia, 4(3), pp.24-33. Browell, S. (1997). Open learning and multimedia the legal issues. Open Learning: The Journal of Open and Distance Learning, 12(1), pp.52-57. Cuttler, B. (2011). Media and telecommunication issues. 1st ed. New York: Nova Science Publishers. Multimedia. (2016). Social and Ethical Issues. [online] Available at: http://educationandtraining-multimedia.weebly.com/social-and-ethical-issues.html [Accessed 26 Nov. 2016]. Section B Evaluate your multimedia application, discuss using critical judgment and reflection its effectiveness The starting state of multimedia application development that is designing the logo and poster based on given Project for Revolution Films production with the movie name: Interstellar Battalion which is released in 2016. Then started using adobe Photoshop tool to design my first logo in which set up background colour and border with distinct colour with alien image middle of screen with given criteria 50 * 50 mm size. This software contains various options to design a professional logo and poster for film industry with less effort in short time. The poster of A4 size international format utilized gradient tool and applied some filter to blur the image and look good. When designing another format multimedia content form i.e. 2D animation which is of 1 min animated movie clip based on given scenario aliens invading into earth and attacks on china, Russia and Europe. These three attacks are classified into 3 days scenario every time a new layer is created then selected starting and ending key frames to have an action. Motion tween is used to provide an object or character move from one place to other. Other similar functionality of classic tween is used to move objects on a particular background screen. Text option is used display textual content on image. An alien and spaceship characters are designed to give full justification to given scenario of title Interstellar Battalion which is designed Adobe Animate. When comes to 3D animation design, there are several objects are included in the tool such as rectangle, square, circle and sphere etc. Each object has its associated properties to reshape the object into desired shape. But initially to reshape an object, it must be converted to editable poly to get advanced options to reshape such as vertex, edges, polygon etc. Different shape and coloured objects are taken reshaped according to image of spaceship and alien robot. Further group certain objects and then done cloning option is utilized to get similar create object then changed direction to flip and look grouped object in correct direction. Then created application show case with the above designed all animated designs using adobe premiere. By adding all the animated clips into given screen, using some shortcuts f5, f6,f7 and f8 and finally exported a video on the above delivered scenes and a sample video mixing clip is developed using sample application. Initially took some sample video clips on YouTube and edited according to film scenario and added other clips and created sample video. This application is best useful for video editing and mixing. Initially while designing the film there was some problems faced but the material and the guidance provided by the professor helped me to finish the film. Apart from the university material lot of you tube videos has been useful in completing the film successfully. Different kind of softwares has been used for the designing of film like logos have been designed using adobe Photoshop, posters have been designed using adobe illustrator, Adobe animate was used in doing 2D works which has an alien, spaceship, spaceship with legs and the film shows three days attacks that take place. 3D work is done using 3DS software and adobe premiere was used for making the movie trailer. Initially when the project was started different kind of logos have been designed which are scary and which contains too much texts. Later, it was observed that the logos should be clear with good colour and texts and should be clearly understood by everyone. Then the logos have been designed differently. Different logos have been designed and one among them is chosen finally for the film which is the best one. Once after finishing the design of the logo poster was designed. Poster was to advertise the film. Different posters were designed and one was chosen from them for the film. With the completion of the film become familiar with the softwares that have been used. If there was more time the film would be have designed more effectively by doing the repeated work and making changes to it to get the good work Section C Designs The below sketches are the different ideas of logos, posters, aliens, spaceships. References Jim Sterling (2016) Spacecats in Space. [Online Video].Aug 9th. Available from: https://www.youtube.com/watch?v=5IjEuBu_Xe8. [Accessed: 25/10/16] Lukes 3D (2011) Spaceship Battle in Atmosphere. [Online Video]. 26th Aug. Available from: https://www.youtube.com/watch?v=Rlh9bfPTBNs. [Accessed: 30/10/16]. Rob the Robot (2016) Cartoon. [Online Video] 28th Aug. Available from: https://www.youtube.com/watch?v=zakT0OeRCBU. [Accessed: 15/11/16]. Jack Teeya (2012) IL Risveglo Quantico. [Online Video] 7th Jul. Available from: https://www.youtube.com/watch?v=k35jiwEr6eE. [Accessed: 18/11/16]. 1. Introduction: Internet has changed the world in many possible ways, with the inception of internet and World Wide Web communications and interactions have started a new phase. With Social Media becoming a daily life essential, it has turned into a new place to expresses opinions and feelings. There has been now a huge increase in demand for tools which can analyse the individual behaviour and in social media and internet. Social media analysis has now divided into multiple branches and there are many applications. This project would analyse the tweets and makes a sentiment analysis of a on a specific topic. 2. Aim: The Aim of the research is to study the Opinion mining and Sentiment analysis and the various applications of it. Also, to analyse the challenges of sentiment analysis and build an artefact with collaborative Opinion mining and Sentiment analysis model from an external source (like Twitter). 3. Objects: To study various types of Opinion mining and Sentiment analysis and techniques To study the features of Sentiment analysis and analyse its applications. To build an Artefact produces a processing model for Sentiment analysis which gather information from external source like twitter. To Investigate the future scope of Sentiment analysis and its challenges. To get a detailed report analysing the various challenges and treats in applying Sentiment analysis for industry. 4. Research Ethics: The ethics to be dealt with to do research are called as research ethics, and it is carried all along the research. No personal or confidential information would be collected from the people, and the results are produced without any personal biases, research would not take place on a vulnerable group. All University rules and regulations are strictly adhered. All the requirements and deliverables would be discussed and their suggestions would be considered for. And it is also ensured that no personal information would be accessed through the data collected from tweets generated for the project, and that data would not be made public either. The survey conducted would not hold any personal information like name and contact information. And only copyrighted and open source software would be used for the project. And it is made sure that any pirated software isnt used with in the project. 5. Intellectual Challenges: 1) Creating an interface with twitter server using public and private keys and to extract data directly from the server requires good configuration management, as the data fetched has to be perfectly pipelined and fine-tuned for the project. 2) Analysing the tweets, which are in the form of semi-structured data requires good analytical skills and the Hive Distributed File System Format would be used to store and analyse the data as it is semi-structured data. 6. Deliverables: Producing a detailed project plan and complete documentation. Data collection includes primary and secondary research the both methods for the project. Producing a detailed literature review. Analysing various challenges that had to be addressed during the project development. Building an artefact which extracts the data from twitter by creating a twitter API. Producing the design models in the project documentation. Testing the artefact and the results obtained. Critical evaluation of the project is done. Analysing the future scope of the project and document it along with conclusion. 7. Resources: Hardware: Processer: Intel Pentium Dual Core. RAM: 4 GB RAM. Hard Disk: 10 GB HDD. Software: Front End: Hadoop, Scala, Spark, Sqoop. Back End: H-Base or MYSQL. Operating System: UNIX Operating System. IDE: Eclipse or Intel IJ 8. Research Approach: A mixed method approach is used for this research, in this method both the Quantitative and Qualitative data are used. And the result gained would be based on analysing the both methods. Qualitative approach, is to collect the data from already existing literature such as standard journals, IEEE paper, research publications etc., also a subject matter expert opinion or an individual feedback which is obtained by their research, experience or individual feedback and this cant be indicated in percentages or the data that cant be quantified. Quantitative data is the data which can be measured in numbers and percentages which makes the result in numerals and this is obtained in case studies or questionnaires and online surveys. A sample survey is carried for this research with a short questionnaire and this questionnaire consist of some sample questions like how often do you use twitter? What types of tweets do you generally tweet? Etc. are carried on the questionnaire. And this gives the quantitative data for the research. A lot of standard literature is referred to get the qualitative data for the project. And the combination of both the qualitative and quantitative data would be make the research more authentic. 9. Literature review: Throughout the history humans always want to interact with others socially. And, this has been keep on changing from time to time. It started with signals, symbols, radio communications, telegraphs and telephone till internet. Information technology has completely changed the face of communication and socialisation. As per the report by Nelson (2010), the internet consumers spend most of their time online for social networking followed by online gaming and e-mail in United States of America. 2.1 Social media and Data Collection: There are many social networking sites currently available and this has given an alternate to media and connect with known people like friends and transfer required information directly. The different social networking sites like Twitter, Facebook, Instagram and LinkedIn which are all web based applications which creates and exchanges large amount of user generated data. The social network can be considered as mapping of different individuals, where individuals can be taken as nodes and the way they are related can be taken as edges. Currently, millions of people across the world use social media for expressing their views, share ideas which generates data. Conventionally, mailing services are used in sending and storing data and social networking is used for connecting with people and for bloggings. Social networking has a remarkable increase in popularity and usage in a very short span. Statica (2016) claims that there are about 1,590 million active Facebook users, and they generate millions of data updates constantly such as communications, blogs, post, etc. However, Rashid (2011) discusses that social networking has played a key role in the Middle East revolution of 2011 where the activist used Facebook for scheduling the protest, Twitter for co-ordinating and spreading information and YouTube to share the progress to the world. Number of Active Social media users for different applications. Social media can be used for both personal and business needs and thus can be done by an account creation, contacting the other users, creating post either personal or business related and all this activity create data. And creating such data by millions of users regularly is large and big. Social media is a fastest growing internet application and this started with the inception of a social networking sites called classmates.com in 1995 and this has grown in an un-predicted manner. 2.2 Data Analysis: The artefact built is used in analysing the semi structured data, the data that is in the form of limited characters and this data is like the data in emails, log documents, word and text files etc., And analysis such a huge amount of data and in a semi structured format can be done with the traditional relational databases such as SQL, MYSQL or DB2, so we can do that with some Hadoop databases and the data must be stored using the Hadoop frame work databases such as H-Base, Couch DB or Mango DB. Sqoop is used to extract the data and then a database is formed in the Hive format called HDFS i.e., Hive Distributed File system. And the data is extracted using Map Reducing Technique. 2.3 Sentiment Analysis: The sentiment analysis is done by using some token words and all the tweets generated are assigned with some augmented words, and these are argument words are classified on three categories such as positive, neutral and negative. And when the arguments are categorised all the positive words are grouped as a positive group and certain words can be grouped as negative group and all the tweets with words which dont fall in both can be termed as neutral. And based on the cumulative of the collected tweets the trend can be easily classified and is accessed, and thus trend can be easily analysed using sentiment analysis. 2.4 Extracting Data from twitter: For the artefact, live data from Twitter is to be extracted, for this twitter account must be created and then by using APP. Twitter, a set of private and public keys are created and this keys are used in the creating a connection with twitter server.

Monday, August 19, 2019

The Unhappy Democracy Essay -- Essays Papers

The Unhappy Democracy Abstract Plato/Socrates defined democracy as "the government of the people." He modeled his democratic society after Athens at the time, a small city-state where every adult male had a vote. The transition to democracy occurred after a revolution in which the rich oligarchic rulers were overthrown and disposed of and the poor gained control. Then, they provided everyone with equal rights. Democracy was characterized as a â€Å"bazaar of constitutions" where every citizen chose his own path in life. There was no obligatory military service, no privileged classes, and those that claim to love society were able to acquire the most power. Individuals may have desired honor in the morning and wealth in the evening. There was no consistent goal that individuals pursued and their desires changed constantly. However, democracy, unlike other imperfect societies, did not forbid the practice of philosophy; it had been indifferent to it. Eventually, "Things everywhere are just bursting with the spirit of liberty." Soon children disobey parents, students disobey teachers, and a disregard towards authority develops. Citizens become divided into three classes: the ruling class of spendthrift politicians, the middle businessman/merchant class, and the large mass of poor people who own little property and mostly stay out of politics. The politicians begin to pass laws that tax the capitalists in order to meet their spending promises. Next, a reactionary political party was formed by the wealthy in order to resist the taxes. After a while, the poor became frustrated with all of the disorder and selected a â€Å"champion of the people† who eventually acquired absolute power and corrupted by it to become a tyrant who would disregar... ...vide The reason being that individuals constantly focus on fulfilling desires rather than applying reason to guide their will. Consequently, their soul is always in a state of flux rather than being in harmony. Therefore, only the ideal state, not democracy, is capable of creating the conditions necessary for its citizens to attain happiness because it is founded on justice instead of liberty, which produces the harmony of the soul. In conclusion, democratic citizens shall never find true happiness in their political system because liberty is practiced at the expense of the liberties of others, the inherent lack of stability will eventually lead to situation in which individual liberty is rigorously suppressed, and because the pursuit of liberty is futile because it does not lead to true happiness. Democracy truly is the worst kind of government, after despotism.

Sunday, August 18, 2019

Black Rhinoceros :: essays research papers

THE BLACK RHINOCEROS ~An endangered species~   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   By   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Prepared for:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   4th Hour Language Arts   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  January 2, 2001 The black rhinoceros or rhinos are a very unique animal of Africa. They are important for the balance of nature. They are a large stocky animal. Their size is 5 to 6 feet tall at the shoulder and 10 to 12 feet long. Their weight can range in from 1,000 to 3,000 pounds. Rhinos are naturally gray in color but will often take on the color of the local soil. The horn of a rhino is not a true horn. It is not attached to the skull. It grows from the skin and is made up of keratin fibers, the same materials found in hair and finger nails. Black rhinos have a prehensile lip that is used much like a finger to select and pick the leaves and twigs they prefer to eat. Their habitat is in the bushy plains, rugged hills, and scrublands in isolated areas of Central and South Africa. Rhinos are heavy browsers that hinder woody plants from dominating their habitat. This is important because it allows grasses to grow, which provide food for many other animals on the grassy plains. Black rhinos travel alone except while breeding or raising offspring. Juveniles remain with the mother until they are completely weaned, just before a new a baby is born.   Ã‚  Ã‚  Ã‚  Ã‚  Young rhinos are occasionally prey for many items for large carnivores such as lions and hyenas. People of some cultures believe that rhino horns contain medicinal properties. This is most likely not true but is one of the primary reasons rhinos are poached.

Turkeys Strategic Geographical Location In The World of Geo-Politics E

Turkey's Strategic Geographical Location In The World of Geo-Politics The country of Turkey, slightly larger than Texas in size (780,580 sq km), lies on the southeastern side of Europe and the southwestern side of Asia.? It borders the Black Sea, the Aegean Sea, and the Mediterranean Sea.? Land wise, Turkey is bordered to the northwest by Bulgaria and Greece, to the east by Azerbaijan, Armenia, and Georgia (all three part of the former USSR) and Iran, and to the south by Iraq and Syria.? Strategically located, Turkey controls the Turkish straights including the Bosphorus, Sea of Marmara, and Dardanelles.? Because Turkey is positioned on an area where Europe meets Asia and is very close geographically to Africa, the country provides a link between these three continents. The European part of the country is named Thrace, while the Asian part is known as Anatolia.? Throughout history, Turkey, especially Anatolia, has been a prominent center of commerce because of its land connections to three continents and the sea surrounding it on three sides (?Tur key at a Glance?).? Additionally, Turkey?s geographical location plays an important role in the geo-politics of Europe and Asia not just as a crucial land bridge between Europe and Asia but as an integral part of the prosperous Mediterranean economy, a center for trade, and a critical link to the sea for Russia and the Ukraine.? In the past, Turkey?s geographic location has been the center of the Byzantine and Ottoman Empires and has acted as a fortress against an expanding Soviet Union and more recently an expanding Iraq (Larson). Turkey?s Role in ?Operation Iraqi Freedom? Within the past year, Turkey has played a vital role in ?Operation Iraqi Freedom. The United ... ...ews. 10 Dec. 2003 Stanford, Dick. ?Panel Discussion, Turkey's Relationship and Foreign Policy Issues with ?her Neighbors and the European Union.? 12 June 2003. Accessed on 22 Nov. 2003.< http://facweb.furman.edu/~dstanford/med04/topic3.htm> Stanford, Dick. ?Water Control Issues in the Eastern Mediterranean region.? 13 June ? 2003. Accessed on 22 Nov. 2003. ?Turkey at a Glance.? Google. 10 Dec. 2003 ?Turkey Belongs in Europe.? The Economist 7 Dec. 2003: LexisNexis Acadmic: News. ?10 Dec. 2003 ?Turkey, Iraq, Sign Protocol to Boost Trade.? Turkish Daily News 22 Nov. 2003: LexisNexis Acadmic: News. 10 Dec. 2003 Turkey's Strategic Geographical Location In The World of Geo-Politics E Turkey's Strategic Geographical Location In The World of Geo-Politics The country of Turkey, slightly larger than Texas in size (780,580 sq km), lies on the southeastern side of Europe and the southwestern side of Asia.? It borders the Black Sea, the Aegean Sea, and the Mediterranean Sea.? Land wise, Turkey is bordered to the northwest by Bulgaria and Greece, to the east by Azerbaijan, Armenia, and Georgia (all three part of the former USSR) and Iran, and to the south by Iraq and Syria.? Strategically located, Turkey controls the Turkish straights including the Bosphorus, Sea of Marmara, and Dardanelles.? Because Turkey is positioned on an area where Europe meets Asia and is very close geographically to Africa, the country provides a link between these three continents. The European part of the country is named Thrace, while the Asian part is known as Anatolia.? Throughout history, Turkey, especially Anatolia, has been a prominent center of commerce because of its land connections to three continents and the sea surrounding it on three sides (?Tur key at a Glance?).? Additionally, Turkey?s geographical location plays an important role in the geo-politics of Europe and Asia not just as a crucial land bridge between Europe and Asia but as an integral part of the prosperous Mediterranean economy, a center for trade, and a critical link to the sea for Russia and the Ukraine.? In the past, Turkey?s geographic location has been the center of the Byzantine and Ottoman Empires and has acted as a fortress against an expanding Soviet Union and more recently an expanding Iraq (Larson). Turkey?s Role in ?Operation Iraqi Freedom? Within the past year, Turkey has played a vital role in ?Operation Iraqi Freedom. The United ... ...ews. 10 Dec. 2003 Stanford, Dick. ?Panel Discussion, Turkey's Relationship and Foreign Policy Issues with ?her Neighbors and the European Union.? 12 June 2003. Accessed on 22 Nov. 2003.< http://facweb.furman.edu/~dstanford/med04/topic3.htm> Stanford, Dick. ?Water Control Issues in the Eastern Mediterranean region.? 13 June ? 2003. Accessed on 22 Nov. 2003. ?Turkey at a Glance.? Google. 10 Dec. 2003 ?Turkey Belongs in Europe.? The Economist 7 Dec. 2003: LexisNexis Acadmic: News. ?10 Dec. 2003 ?Turkey, Iraq, Sign Protocol to Boost Trade.? Turkish Daily News 22 Nov. 2003: LexisNexis Acadmic: News. 10 Dec. 2003

Saturday, August 17, 2019

All the reasons not to eat at Mcdonalds Essay

Almost every American has probably at one time or another eaten at one of McDonald’s many restaurants or they have at least heard of the mega fast food chain. For decades, Americans have enjoyed their array of menu items. Recently, people have been looking deeper and deeper into if McDonald’s is really a healthy restaurant to eat at. I propose that customers who enjoy McDonald’s food should no longer consume it because it can make you obese, the portions are way too big, and the food at McDonald’s is practically phony. To start off, people all over the world that like the McDonald’s should not eat at the familiar restaurant because it could lead to serious weight problems. Hopefully, people who eat at McDonald’s will realize it is not doing them any good. Studies show that those who frequently eat at McDonald’s gained 10 pounds more than those who did so less often, and were more than twice as likely to develop an insulin disorder linked to diabetes. Clearly, fast food eaters could gain more pounds especially if the foods that are high in fat, like the food served at McDonald’s. Therefore, if you do not want to get fat, I might steer clear from McDonald’s. The second reason as to why you should not eat at McDonald’s is because the portions are becoming larger. As the year’s progresses, the portions at McDonald’s are getting bigger and bigger even though you might not even realize it. The problem is that people tend to eat or drink what’s in front of them. We also significantly underestimate how many calories we consume. But even when consumers try to do right by their diets by choosing a small or medium of something at a fast-food chain, they may be getting more than they expect. Basically, this is teaching us that it is okay to eat what is in front of us, even if there is a lot. Last but not least, the food that they serve at McDonald’s is not authentic because of all of the extra additives that they have added just for the taste. I believe that there is definitely a difference between real food and fake food. Real food is savory and in some cases it melts in your mouth, while fake food doesn’t even taste and the texture is similar to plastic. People deserve much better than fake food and that is the kind of stuff that you are consuming when you eat McDonald’s. I do not know about you but a sausage burrito containing 50 different ingredients including milk, egg, wheat, corn syrup, and a range of chemicals and preservative agents does not sound very tempting to me. Not only that but the hash browns are cooked with animal products and the bacon contains wheat and soy. I just do not think that is right. The food that people eat should have real ingredients like potatoes in hash browns, not all those fake preservatives. You would not cook a meal at home with all of that extra stuff in it, so eating it at McDonald’s does not make much sense to me. Much of the food at McDonald’s contains extra additives. I think that we deserve much better than that. Just because of the ingredients in the food, I don’t think that we should eat at McDonald’s. People that take pleasure in the food at McDonald’s should not eat there any longer because the risk is far too high. It can make you gain weight because of the extra calories and fats that you are consuming. The portions of the food have grown year by year and you may not even know how much food you are actually eating. Also, there are so many other restaurant alternatives that offer a much better selection of food that actually have true ingredients. So, the next time you go to eat at a restaurant even if a McDonald’s is nearby, I would rethink your options.

Friday, August 16, 2019

Skywest

Case: SkyWest, Inc. and the Regional Airline Industry in 2009 Assignment Questions: What are the general economic conditions of the U. S. regional airline industry macroenvrionment? What is the relationship of the industry to the national and global airline industries? The U. S regional airline industry has been suffered and experienced declining of their profit. This case can be explained by the component of macro-environment. Focuses on the global forces and technology, the businesses nowadays have been changed dramatically to global business.What I meant by that is, not only do the business in domestically, but also with different nationality partners. It could lead them to think then, if the business has been changed to globally, more people will fly with the airline industry. However, the technology improved day by day tremendously that people who are doing the business do not required to fly. They can do the business by telecommunication, email, live meeting with visual, or etc . This improved technology could be the one reason that decline the passengers typically in categorized in business travelers.Another factor is General economic conditions. Lately, the world economy is experiencing a long recession which affect almost all the businesses not only just the airline industry. Many countries have difficulties with managing their financial status. The relationship between national and global airline industries seems does not too much different. Both U. S national airline industry and global airline industry are suffering from rising fuel cost, global recession, improved technology, safety issues, and etc. The world is connected as big one nation these day.If one failed, all the other parts will be falling apart as well. It’s just a matter of time when it would happen. What does a Five Forces analysis of the industry tell you about competition in the regional airline industry? Which forces tend to be the strongest? The weakest? The five forces analy ses of the airline industries show that it has normally a intense competition which means their profit margin have been thin. Normally, overall impact of the five competitive forces is moderate to weak is good place to expect good profit and a nice return on investment.The strongest forces: The weakest forces: What factors are causing change in the regional airline industry? What is the individual and collective impact of these changes on the regional airline carriers? There are several factors that caused dramatic changes in the regional airline industry. Rising fuel cost is the one factor. Rising fuel cost is not the only issue for the airline industry, but for almost every business on earth. The amount of fuel that we could utilize is limited, but there is no alternative energy source for fuel yet for commonly used.Day by day, the cost of fuel rising, and typically airline industry are suffering from that. The cost of fuel takes parts almost 45% of the whole expense. Therefore, m any airline companies are trying to lower the expense from somewhere other such as give pressure to lower or smaller airline company to reduce their cost or number of departure. The other factor can be the safety matter. After 9-11 tragedy, safety rises above the surface and became one of the main factors for the people who want to fly with airplane.The 9-11 terror affected to the people that stop using the airplane along with the new created government regulations which would cost airline companies to cost even more money. What are the key factors that determine success for companies in the regional airline industry? Make sure that the regional airline industry has enough partnerships with many different major airlines. The more partnership that regional airline have with major airlines, they will be guaranteed with stable income balance. Also, the customer satisfaction is the key factors for the success.Find the way to work with the major airlines that no immediate schedule change , accurate luggage system along with the departure/ arrival time, and safety. What is SkyWest, Inc. ’s strategy? What kind of competitive advantage is it trying to achieve? SkyWest Inc. is well-known airline company with its high customer satisfaction and employee satisfaction factors. Their strategy is keeping the strong factors and be more competitive with acquire more routines by partnership with major airlines other than United and Delta. By getting more partnership with other major airlines, the SkyWest Inc. an gain more routes and connection flight to the major cities which will increase their revenues. What are SkyWest’s competitively important resources and capabilities? What are its resource weaknesses and competitive deficiencies? Its market opportunities? Its external threats? Their important resources are their customer and employee satisfaction with the airline. The potential threat could be the sister companies’ culture. The SkyWest Inc. is nonunio nized airline, but ASA is unionized airline company. If the SkyWest Inc. mployees are unionized, there will be some decline in productivity and cost more money for airlines for each flight. What does an analysis of SkyWest, Inc. ’s financial statements reveal about the company’s performance? The SkyWest Inc. was suffered from 2004 through 2008 with decreased net profit caused by multiple factors such as rising fuel cost, decline on customer satisfaction, and etc. However, the financial statements for 2009 shows hope for the company that it can start pick back up their revenues. The airline is doing its best trying to increase their profit by acquisition and getting more partnership with major airlines.What recommendations would you make to the management of SkyWest, Inc. to strengthen the company’s competitive position and improve its financial performance? In the Service-Provide industry, customer should always be the main focus for the firm. No matter how good their product or cheap their product is, if the customer experienced or had bad impression from the firm, the chances for customers to come back would be very low. Fortunately, SkyWest Inc. is already well known for the good customer satisfaction with good safety standards and the quality of service during the flight.Therefore, the airline should put effort in to maintain what already they are strong and complement the weak points as well. The weak point that the SkyWest Inc. is their dependency to the major airlines. To increase their dependencies, the airline would need more contract with major airlines other than just Delta and United. Also, they need to start thinking in expanding their business internationally. China, Brazil, and other nation’s growth in airlines increase rapidly. Therefore, they need to look more into the international business not limited only for the U. S region.

Thursday, August 15, 2019

Proposal Eye Clinic System

Table Content 1. Introduction †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 3 2. Planning Phase 1. Problem statement†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 2. Objective†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4 3. Scopes 1. User Scope†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 2. System Scope†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 5 3.Software Requirement†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 4. Analysis Phase 1. Methodologies†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6 1. Planning†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 6 2. Analysis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 6 3. Design†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦ 7 4. Implementation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 5. Diagram 1. Flow chart†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ – 15 2. Entity Relationship Diagram (ERD)†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 3. Data Flow Diagram (DFD)†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 17 – 19 6. Conclusion †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 20 7. Appendix 1. Interface design†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 – 42 INTRODUCTION LaserPro Eye Centre Clinic System is a system where it is an eyes specialist clinic and is a place where the patient gets supervision from doctors about eyes diseases.Laser Pro Eye Centre clinic system is having unstable and lack of capability in managing the clinic. For example, this system cannot store the information of the patients and the diagnosis of the doctors. This is due to they are still using the manual ways in handling their patient records. Therefore, they will need to look for the records and it will be troublesome if the records have been kept for a year. Besides that, there will be a need in calculating the medical fees. It will be not efficient if they are still using the manual way to do the calculation.After that this system also will print the receipt and the report. Therefore, this system is developing to make the management of the clinic more systematically, easier and smooth. This clinic will do some charity, like didn’t count the consultation fee for all the patients, the poor people also afford to pay the medical fee. Because some patient not affordable to pay the expensive medical fees, they will choose don’t want go for treatment, maybe will cause the disease become serious.This system is a system were using the first come first serve method, so it will not provided appointment for the patients to book the appointment, because this is not fair for those walk in patients if they come early in the morning but because of the appointment patients, they have to wait until doctor finished the appointment patients first only diagnose them. In this system, I will include some modules. These modules are login, searching for the staff information, product information, and patient information, calculation for medication fee, delete and update module, clear, print receipt PLANNING PHASE Problem StatementThere is a few problem that occur if there is no systematic system for this clinic. It will be taking longer time to look for the records of the patient and medical dispenses. Besides that, it also require larger storage place, not environment friendly since they are using papers in keeping the records and the inactive records which have been put aside must have been lost. Besides that, some of the records are missing due to the large amout of patients record or information. In addition, manual method which required many processes such as finding old details that have been kept for a year is quite troublesome.OBJECTIVE The main purpose is to automate LaserPro Eye Centre clinic management system. The derivative are as follows: †¢ To automate the staff information system. †¢ To automate the product information system. †¢ To automate the patient information system. †¢ To automate sales report and product list. †¢ To automate the calculation of the medical fee. SCOPE User Scope: The target user s of this system are the doctors and nurses of LaserPro Eye Centre Clinic System. With this system,admin are able to : 1. Login into the system using security password. . View, update, add, and search details of staff information. 3. View, update, add, delete, and search details of product information. 4. View, update, add, delete, and search the patient information. 5. View sales report, and stock report according to overall sales, by day. Print out the report. 6. Calculate for the medication fees and print the receipt. With this system, staffs are able to: 1. Login into the system using security password. 2. View, update, add, and search details of staff information, but can’t update particular details. 3.View, update, add, delete, and search details of product information. 4. View, update, add, delete, and search the patient information, but can’t add or update the treatment of the patient. 5. View sales report, and stock report according to overall sales, by day. P rint out the report. 6. Calculate for the medication fees and print the receipt. System scope: The system use in LaserPro Eye Centre and its major function are: 1. Security password is required to allow admin and staffs to login into the system. 2. Store records of staff in database. 3. Store details of product in database. . Store details of patient in database. 5. Can calculate the medication fees and print the receipts for the patient. 6. Searching function which enables the admin and staff to look for patient records. 7. Help function to guide user in using this system. Software Requirement: 1. Microsoft Visual Basic. Net 2008: use to create or build interface of †LaserPro Eye Centre Clinic System†. 2. Microsoft Office Access 2007. 3. Microsoft Office Visio 2007. ANALYSIS PHASE Methodologies The methodology that was used to create the LaserPro Eye Centre is the System Development Life Cycle (SDLC).It comprises of 4 stages which are planning, analysis, design and impl ementation. PLANNING †¢ The system is built for easily search and find needed information of the clinic for the Admin and the staff of the clinic. †¢ The users would want search and find the staff information, patient information, product information in a quick and effective way. And also calculate the medical fee for the patient. †¢ The system is to be built by using the Visual Basic. Net programming language from the Visual Studio. Net software. ANALYSIS The users of the system are people who want to search, add, update, clear and delete the staff information, product information, patient information. †¢ The LaserPro Eye Centre will display the staff information, product information, patient information, calculation for medical fee, and the sales report that the users searched. †¢ Besides, there is a print button to let the user print out the receipt of the medical fee, sales report, product information the users has counted and searched. †¢ The syste m can only be used in LaserPro Eye Centre Clinic. DESIGN In the manager menu and the main menu, the users can select the staff, product, and patient information that they want to search or update. †¢ When the users choose to search the information, the information will be display. †¢ The users can calculate the medical fee using the calculation page. After calculated the medical fee, also can print out the sales report and the stock report. †¢ When the users choose to update the information, the users are allow to add, update, edit and delete the information. †¢ They can exit the system any time they feel like doing so.IMPLEMENTATION †¢ The system is supposed to be delivered by the 14th week and presented on the 15th week. †¢ The system is test before deliver. Flow Chart Login [pic] Forget Password [pic] Manager MenuMain Menu [pic] Staff Information [pic] Product Information [pic] Patient information [pic] Sale Information [pic] Sale Calculation [pic] E ntity Relationship Diagram (ERD) [pic] Data Flow Diagram (DFD) Context Diagram [pic] †¢ Level 1, Process 1 and Process 2 : [pic] †¢ Level 2, Process 1, and Process 2 [pic] †¢ Level 1, Process 3 and Process 4 : [pic] CONCLUSION:After going through all the processes and procedures involved, I have succeeded build the LaserPro Eye Centre Clinic System. With this system, users will no longer have difficulty in searching, editing, adding, calculating and deleting the details that they wanted. Besides that, they can save their time and easy in doing so. This system is created for two users to use which are admin and staff. Other than that, these systems have some feature that can be use and seen by staff so these systems can be avoiding the staff to see other user feature. Besides that, if user have forgotten their password. They can