Tuesday, November 26, 2019

Acknowledgement Essays

Acknowledgement Essays Acknowledgement Essay Acknowledgement Essay Chapter 1 The Problem and its Background Introduction The term RFID refers to Radio Frequency Identification, a technology which uses radio waves to automatically identify items or people. Most commonly this involves the use of an RFID tag and a reader device. In general terms, Radio Frequency Identification systems consist of an RFID tag (typically many tags) and an interrogator or reader. The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information. On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the system’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie Theater Charging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk – wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. The system was able to track whom librarian is accountable for the loss of a returned material. The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..

Saturday, November 23, 2019

Syrian President Bashar al-Assad - Profile

Syrian President Bashar al-Assad - Profile Why Bashar al-Assad Matters: Syrias Hafez al-Assad, in power since June 10, 2000, is one of the Middle Easts most ruthless, autocratic, minority rulers in one of the worlds most closed societies. Assad also maintains Syrias pivotal role on the Middle Easts strategic map: He is an ally of Irans Shiite theocracy, he supports and arms Hamas in the Gaza Strip, as well as Hezbollah in Lebanon, thus maintaining a level of enmity toward Israel that so far has precluded peace: Israel has occupied Syrias Golan Heights since the 1967 war. Presumed a reformer when he took Power, Bashar al-Assad has proved no less repressive than his father. Bashar al-Assads Early Life: Bashar al-Assad was born on Sept. 11, 1965, in Damascus, the Syrian capital, the second son of Hafez al-Assad (1930-2000), who had tyrannically ruled Syria since 1971, and Anisa Makhlouf Bashar. He had three brothers and a sister. He spent years training as an eye doctor, first at a military hospital in Damascus then in London, at St. Marys Hospital. He was not being groomed for the presidency: his oldest brother Basil was. In January 1994, Basil, who led Syrias presidential guard, died in a car crash in Damascus. Bashar was immediately and unexpectedly thrust into the limelightand the succession line. Bashar al-Assads Personality: Bashar al-Assad was not groomed to be a leader. Where his brother Basil was gregarious, outgoing, charismatic, arrogant, Dr. Assad, as he was referred to for a while, was retiring, shy, and appearing to have few of his fathers wiles or will to poweror ruthlessness. Friends admit, The Economist wrote in June 2000, that he cuts a rather meek and awkward figure, unlikely to inspire the same terror and admiration as his handsome, athletic, outgoing and ruthless brother. Basil was the gangster type, says one Syrian. Bashar is much more quiet and thoughtful. Early Years of Power: Bashar al-Assad had been running a private medical practice. But when his brother died, his father summoned him from London, sent him to a military academy north of Damascus, and started preparing him for the reins of power- which he took when Hafez al-Assad died on June 10, 2000. Bashar has gradually turned into a younger version of his father. I have a lot of respect for experience, Bashar al-Assad said just as he was taking power, and I am going to try always to acquire it. Hes lived up to that pledge. He suggested that hd relax Syrias repressive police state, even explore political reforms. He barely did. Toying With the United States and Israel: Almost from the beginning of Bashar al-Assad reign, theres been a yo-yo effect in his relations with the United States and Israelimplying engagement during one phase only to retreat into intransigence and extremism the next. Whether its a strategy or a lack of self-confidence might seem unclear until the approach is seen in the context of how Bashars father maintained power: not by innovating, not by daring, but by keeping the opposition off balance, by undermining expectations rather than living up to them. Theres been a see-saw effect on two fronts since 2000, without as yet producing lasting results. Bashar al-Assads See-Saw: Cooperation With the U.S.: Shortly after the 2001 terrorist attacks on the World Trade Center and the Pentagon, Assad proved to be a relatively reliable ally in the fight against al-Qaeda, cooperating with U.S. intelligence and, in more sinister ways, lending his prisons to the Bush administrations rendition program. It was in Assads prisons that Canadian national Maher Arar was tortured, at the administrations behest, even after Mahar was found to be innocent of any ties to terrorism. Assads cooperation, like Muammar el-Qaddafis,was not out of appreciation for the west but out of fear that al-Qaeda would undermine his regime. Bashar al-Assads See-Saw: Talks With Israel: Assad has similarly see-sawed with Israel over peace talks and the resolution of the Golan Heights occupation. In late 2003, Assad, in an interview with The New York Times, appeared ready to negotiate: Some people say there are Syrian conditions, and my answer is no; we dont have Syrian conditions. What Syria says is this: negotiations should be resumed from the point at which they had stopped simply because we have achieved a great deal in these negotiations. If we dont say this, it means we want to go back to point zero in the peace process. But similar suggestions were made over subsequent years, to no end. Syrias Nuclear Reactor: In September 2007, Israel bombed a remote area of northeast Syria, along the Euphrates River, where, Israel and the United States alleged, North Korea was helping Syria build a plutonium-based nuclear plant that would have been capable of producing nuclear weapons. Syria denied the allegations. Writing in The New Yorker in February 2008, investigative reporter Seymour Hersh said the evidence was circumstantial but seemingly damning. But Hersh raised serious doubt about the certainty that it was a nuclear reactor, even though he conceded that Syria was cooperating with North Korea on something military. Bashar al-Assad and Reform: As with his stance toward Israel and the United States, Bashar al-Assads promises of reform have been many, but his retreats from those promises have been just as frequent. Theres been a few Syrian springs where dissenters and human rights advocates were given a longer leash. But those brief springs never lasted. Assads promises of local elections have not been followed through, though financial restrictions on the economy were lifted early in his reign and helped the Syrian economy grow faster. In 2007, Assad held a sham referendum extending his presidency seven years. Bashar al-Assad and Arab Revolutions: As of early 2011, Bashar al-Assad was firmly planted on Middle Eastern soil as one of the regions most ruthless tyrants. He brought Syrias 29-year occupation of Lebanon to an end in 2005, but only after the likely Syrian- and Hezbollah-backed assassination of Lebanese Prime Minister Rafik Hariri triggered the Cedar Revolution on Lebanons streets and drove the Syrian army out. Syria has since reasserted its power over Lebanon, re-infiltrating the countrys intelligence services and, ultimately, reasserting Syrian hegemony when Hezbollah brought the government down and brokered its re-institution, with Hezbollah at the helm. Assad is not merely a tyrant. Like Bahrains Al Khalifa ruling family, which is Sunni and ruling, illegitimately, over a majority of Shiites, Assad is an Alawite, a break-away Shiite sect. Barely 6 percent of Syrias population is Alawite. The majority is Sunni, with Kurds, Shiites and Christians forming minorities of their own. In an interview with the Wall Street Journal in January 2011, Assad said downplayed the risks of revolution in his country: I am not talking here on behalf of the Tunisians or the Egyptians. I am talking on behalf of the Syrians, he said. It is something we always adopt. We have more difficult circumstances than most of the Arab countries but in spite of that Syria is stable. Why? Because you have to be very closely linked to the beliefs of the people. This is the core issue. When there is divergence between your policy and the peoples beliefs and interests, you will have this vacuum that creates disturbance. Assads certainties were soon proven wrong as disturbances erupted in various parts of the countryand Assad assaulted them with his police and military, murdering many protesters, arresting hundreds, and silencing Internet communications that have helped organize protests across the Middle East. In short, Assad is a flirt, not a statesman, a tease, not a visionary. Its worked so far. Its not likely to work for ever.

Thursday, November 21, 2019

Skilled Human Resource Management In Africa Essay

Skilled Human Resource Management In Africa - Essay Example The topic of our discussion is brain drainage from the continent that is not yet established and due to such actions of individuals they tend to loose many important resources that could have been utilized in the betterment of their economic position. The world is currently facing diversion in terms of human resources from one part of the world to the other, it is fair to say that educated people do not want to stay in their country until and unless their country is fully supporting them and providing them with every basic of life, countries like America and England do not have a drainage problem due to many reasons which are also related to their currency value, however Africa is facing a serious problem as it cannot afford its skillful people to leave it which is happening. Almost every country is having a class that is willing to stay in it and work with dedication, but such organizations are providing its employees with something wonderful and they are motivated to work for the same without thinking about any struggle to earn more. As early as the 1500s, the African slave trade had already brought thousands of Africans to the new world. In what the mid period, Africans were exported from their homelands to the America to deve lop and sustain plantation agriculture and to work the mines of South America in a new and unfamiliar environment, the Africans were indentured for specified periods, but as the economic advantages of their forced labor became clearer, the period of serving soon came to be expanded to the duration of their lives. The Africans brought not only their labor, but also skills and knowledge in areas useful to the white colonizers. In Africa, the captives had been farmers, builders, artisans, craftsmen, healers, and even the rulers. For many of the African immigrants, the journey to the United States involves a global migratory pattern, leaving because of Africa's worsening economic and political problems, or to pursue education, or to join up with family members, these immigrants typically reach the United States in stepwise fashion, sometimes living in several other countries before managing to secure a visa for their ultimate destination in the United States. Relative to other immigrant population groups such as Hispanics or Asians, the African immigrants have a low rate of naturalization. Many consider themselves as visitors in United States, intending to return home when economic and political conditions improve. Africa's brain drain is taking place as the continent stands at the crisis of economic development and Africans appeal for the establishment of democratic institutions and political accountability. Africa's dilemma starts from the fact that the colonial and post-colonial policies of economic, political, and cultural development have been framed from a Euro American perspective that offers little or no relevance to the needs of the people on the continent. For instance, the rapid expansion in secondary and postsecondary education since 1945, although essential for economic and cultural development, was undertaken without any assessment of how school leavers would be incorporated into the labor market. The inability of the labor market to absorb school leavers has resulted in massive underemployment and unemployment. Unable to find jobs, both skilled and unskilled workers are compelled to search for jobs in Western

Tuesday, November 19, 2019

The Image Narrative Research Paper Example | Topics and Well Written Essays - 1250 words

The Image Narrative - Research Paper Example â€Å"Manga artist Mizuki Shigeru (b. 1922), creator of the famous supernatural series GeGeGe no Kitaro, is one individual who could not be blamed for feeling like a victim.†1 In fact, Shigeru lost his left arm in the war but sees himself, it seems, reflected through his art in the way that the war was torturous and terrible. The key players in the text include Japanese officials, as well as one character we see throughout the panels. They are both parodied, and the character guiding one through the panels who is the main character acts as though he knows nothing about WWII. The cartoon character which is parodied in the panel definitely adds to the overall tone of the piece, giving War and Japan a slightly humorous bent, although little about War and Japan is really humorous. The topic of the cartoon is carnage, massacre, disaster, and war—at their worst. The suffering of the Japanese people is aptly portrayed in this graphic cartoon, bringing the reader to a very dark place. In this sense, it is understood why the cartoon is offensive to some people, both to the Japanese and those who are not Japanese. This cartoon disturbs the reader, but with an overall intent to educate—not just to shock. That is the redeeming value of this cartoon, is that it seeks to educate its readers about the horrors of war as it relates to Japanese history, pre- and post-World War II. This cartoon exemplifies the suffering of the Japanese in different eras, that is supposed to enlighten the reader as to why the Japanese have a certain mindset regarding the war and its effects. III. Second Set of Questions (150 words) Images echo each other in this piece in the sense that violence mirrors itself continually through the piece, not only talking about the Nanking Massacre—but contrasting that with the atomic bomb that dropped on Hiroshima and the carnage that resulted in that. Not only that but, we see the overlap and evolution of soldiers having been sent of f to the South Pacific and Burma from Japan to fight in WWII, an often unseen added element about the War that Shigeru sheds light upon. The images are fixed in terms of being frozen in time, but there is definitely a sense of movement in the images, giving oneself an idea that it is like watching a little movie of World War II from a Japanese viewpoint. The images are more ambiguous when it comes to larger overviews, like the Nanking Massacre and one jungle scenes seen later in the panel. IV. Third Set of Questions (600 words) Sensory stimulation is paramount to War and Japan. The rhythm and pacing is switched up. At first, Shigeru shows us graphic images, and then gives our eyes a rest between graphic images to process what we have just seen, and then the cartoon character narrator tries to explain what is going on in the mind of ordinary Japanese people, bringing the reader back to a sense of normalcy—right before the next image is proffered on-screen. The larger pattern o f movement overall is a wax and wane, bringing us in peaks and valleys to a crescendo of realizing what it means to be a true Japanese—to â€Å"stand tall.† In this way, the progression from panel to panel is very cyclical, nonlinear, and evocative of an emotional rollercoaster in which Shigeru engages us. The turning point of the entire â€Å"cartoon,† if it can be called that—since one usually thinks of cartoons as more humorous than grotesque—is the massacre that occurs after the Manchu people are worked like slaves

Sunday, November 17, 2019

Climate Change Essay Example for Free

Climate Change Essay Once, I visited a hospital for my health checkup,there I saw a man with shattered skin,rashes all over the body;clearcut it was the case of allergy.Doctors are rushing and making report on it.After a week I again visited that hospital for my scheduled checkup,then I came to know a shocking news-that allergy case was the case of Ganga bath!! Alas! Holy river Ganga, ancient river Ganga ,that Ganga which takes away all the sins from mankind, today causing allergy,irritation,skin rashes!!! that man has to pay price for his religious belief†¦ Also scientists got some samples from Ganga from specific places having disease causing microbes. This small case itself indicate the change we have made in our nature. Change is the law of nature,change is inevitable and change is evergoing process,but Climate Change is one of the most complex,multifaceted and serious threat that the World face. Whether you are adding your bit to the heap of garbage piling up in your locality or not become meaningless when the garbage begins to rot-the stench will reach your nose too,Climate Change induced by global warming works much the same way. World famous scientists all over the country had evaluated climate change and came to conclusion that Greenhouse Gases ,CFC, Carbondieoxide and many other toxic gases are the cause of environment degradation.Though it is true scientifically,the root lies elsewhere;that is in the greed of human being.Our greed led to adavancement of technology and led us farther from peace and prosperity of all. Increasing consumption of electricity due to intiation of several new industries,disposal of garbage without treatment to maximize profit,use of environment hazardious substances like polythene in our daily life are concrete examples of human greed. People have been influencing the Biosphere for at least 8000 years,since the invention of Agriculture,but Climate Change has proposed a threat over our Agriculture.The most affected area of Climate Change will be Agriculture and its biodiversity. The first and foremost impact of climate change is in biodiversity specially Islands biodiversity.nearly one –fourth of the worlds countries are Island and they are treasure trove of biodiversity.Also they provide food,fresh water ,wood,fibre,medicine,fuel and other raw materials. But increasing sea level has given a alarm threat to them,The New Moore Island of India in Sunderbans has been consumed recently by rising sea,many other Pacific atoll nation Island of Kiribati,Islands of Vanuatu also submerged in early history.we are loosing huge . biodiversity;these are initial cases†¦ Rather IPCC has warned that a rise in sea levels of between 18 and 59cm by 2100 would be enough to submerge many other big islands, including Maldives and make them unhabitable,also of the 724 recorded animal extinctions in 400 years about half were Island species .also climate change will bring degradation of coastal environment and natural resources on which poor rural people depend.Higher rates of erosion and coastal land loss may vanish our islands In context of Agriculture,sea level rise will also cause increased salinity due to encroachment of the sea and saltwater intrusion into freshwater lenses,contributing to an increasing shortage of water supply and loss of agriculture land.The most vulnerable section will be the poor and marginal farmers with small landholdings because ‘extreme weather events’will specially occur in tropics,fundamental changes in rainfall pattern together with rising temperature will shorten growing season and reduce crop productivity . Acco.to World Bank 75% of 1.2 billion people are trapped in extreme poverty,so they will fail to adopt new rotation practices and thus most vulnerable to climate change. World wide farming is a significant source of greenhouse gas emissions accouting for 20% of total emissions.Atmospheric concentration of methane has more than doubled during the past 200 years.Natural wetlands,fossil fuels related to natural gas,coal mines coal industry,electric fermentation,rice fields,biomass burning,landfills accont for 75% of methane production in our environment. thus major source of greenhouse gases is agriculture itself. Rice fields are the most significant contributors of atmospheric methane accounting for 11-13% of the world’s total methane production. Also, rice production will need to expand by around 70% over the next 25 years to meet the demands of fast growing human population whose food demand is expected to double in developing world in next 40 years. Thus if we increase our crop area specially staple crop area in near future then the problem of global warming is likely to increase. Already in today’s era 800 million people are unnourished, in India only 30 million people suffer hunger,46% children are underweight and 17000 people are dying per day due to hunger on an average. Thus in near future we are going to face a great threat not only of climate change but also of food security†¦. However, Not all effects of climate change on agriculture are expected to be negative, most of the major food crops are C-3 plants including staple food like rice ,wheat, oat, barley will show increase in yield ranging from 25% to 64% due to increased CO2 level, also most of the noxious weed are C4 plants and their growth will be checked. But this is only one side of the coin ,increased temperature due to increase in CO2 level may rise the pest attack up to 25% and fungal disease attack up to 20% and also disturb our monsoon pattern.In an overview it can be said that it will create more and new problem rather than benefits because the worst sufferers would be farmers of Rainfed agriculture which cover 60% of all cultivable lands. Today humanbeings have become dependent on technologies which are dependent on non -renewable resources and produce illeffects in long run.nowdays we say that glaciers are shrinking;may be shrinking but more that the heart of the people and their philosophy is shrinking too.while the drastic effects of global warming has been discussed in many scientific circles,had their run on T.V. and even had well meaning Hollywood films but the need of the hour is to change ourselves,to reduce our luxurious wants. The need of the hour is to develop a) True sustainability,there should be synergies between climate mitigation strategies and development policies in areas of energy efficiency,fuel substitution,renewable ,afforestration,and land and waste management. b) The planning should not be for temporary economic gains and support,but for sustainability in future as well.There should be partnerships with communities,individuals,and private sector to frame effective measures to reduce the impact the effect of climate change. Today we all peoples of the world need to change our habbits ,not only in Agricultural practices but also in our daily life practicices†¦ Switching of fans and light before leaving room ,efficient use of water at home , proper garbage disposal at micro level, though seems to be a very minute step but the huge building of true sustainability will only form above these basic steps because this will be the 1st step against our greed, so step ahead and realize your own responsibility ,because it is not the time to curse the darkness but to light a small lamp. References: 1. â€Å"Know climate change† by Tanya Agarwal 2. â€Å"Global climate change† by Arnold J.Bloom 3. Science Reporter (CSIR) 4. IPCC website

Thursday, November 14, 2019

J.B.Priestley’s play, An Inspector Calls - Eva Smiths Diary Essay

I've just got back from my summer vacation. It was lovely. I'm really looking forward to going again next year. Life's looking up at the moment. It's great! Just one problem though, the money I'm receiving at the factory. I've spoken to quite a few other girls on vacation and they earn much more than twenty-two and six. I'll speak to Mr. Birling tomorrow to ask him about raising it to 25 shillings a week. I don't see why not myself. I'm a good worker and have been in the factory over a year. We'll just have to see what he says. 12th September 1910 That's it! I'm not taking any more. A few other girls and me, who are sick of the terrible money, are going on strike. He'll have to raise our weekly wage then won't he; well if he doesn't I'm not carrying on working for him. He's a mean man, and only cares for himself, wants all the money. It's not very often I get annoyed I don't like to call people and say nasty things about them, but I really have had enough today. This man has really angered me. I'm an excellent, hard, pleasant worker. How dare he have the cheek to say no! I told his this afternoon for the 6th time in the past 2 days, that because I was being promoted to leading operator I would at least expect a pay rise. His reply was the same, that it was his duty to keep labour costs down. His exact answer if I remember was; "I've told you again and again Eva, every time you've asked me. It's my duty to keep labour costs down. I don't know why the hell you waste your time bothering me when you could be working - earning good money for my factor. The answers a straight no, so get out of my office girl. Get back to your bleeding work." What a lovely charming man Mr. Birling is, oh great is he. ... ...ll because of no food, no roof above their head. I don't want that. I don't want my child not having the advantages that other children have; that other children take advantage of. Waking up everyday with a roof above their head, breakfast on the table for them, loving parents that are there for them when they need help or are feeling down. Everyone takes advantage of everything they own, even their lives. They don't realize it until they've lost those things they love and care about though. Then it will suddenly hit them like a ton of bricks. People should learn to love what they have, but me, I can't go on any longer trying to be happy for what I have. I don't have anything, so I can't try to be happy. I've tried too many times, and now - I'm giving up trying. I'm weak and so far I've lost everything apart from my life. Which soon I will also be loosing.

Tuesday, November 12, 2019

Diabetes Type II

Diabetes is a condition characterized by individuals having elevated levels of blood sugar resulting from the body not producing sufficient insulin or the body cells not effectively responding to the insulin already present in the body (Kilvert & Fox, 2007). Insulin, a hormone produced in the pancreases, enables the body cells to take up glucose and oxidizes it into energy (Zieve & Wexler, 2009). Lack of this glucose uptake by the body cells will result to the accumulation of glucose in the blood, a condition known as hyperglycemia (Kilvert & Fox, 2007).Hyperglycemia leads to a number of other serious complications. In type II diabetes also known as non-insulin-dependent diabetes mellitus (NIDDM) results from the body cells becoming resistant to insulin or the insulin that is produced in the body is insufficiency (Kilvert & Fox, 2007). The onset of diabetes type II can be characterized by individuals having general weakness, chronic fatigue, malaise and lethargy. Frequent urination i s not unusual and individuals often complain of excessive thirst.Excessive movements in the bowel and unexplained weight loss have been observed among individuals afflicted by the condition (Mayo Clinic, 2009). The individuals suffering from diabetes type II start having blurred vision caused by the alteration in the shape of the lens due to osmotic factors chiefly the elevated levels of blood glucose. Frequent thirst leads to the affected individual taking a lot of fluids. Diabetes type II is known to be a genetic disease although medical causes have been explained (Kilvert & Fox, 2007).There is an observation of an increased risk of developing diabetes type II in families where the parents have the disorder. A mutation in the gene known as the Amyloid Polypeptide gene lead to the early signs of the condition and makes the progress to a more severe diabetes type II condition possible (Kilvert & Fox, 2007). Apart from genetics, the condition can be caused by an alteration in the met abolism and deranged cell processes. Environmental factors have also been blamed to cause diabetes type II particularly some diets and weight (Zieve & Wexler, 2009).Some drugs have been identified to increase the risk of diabetes type II such as the thiazide diuretics, which inhibit the secretion of insulin because of the hypokalemic condition they cause. Thiazides also increase the insulin resistance due to elevated levels of mobilization of free fatty acids (Mayo Clinic, 2009). Other drug agents that can be blamed for drug induced hyperglycemia include beta blockers, somatropin, protease inhibitors, phenothiazines, flouroquinolones, corticosteroids, antipsychotics and calcium channel blockers. Treatment of Diabetes Type IIThe immediate objective of treating diabetes type II is to reduce the elevated levels of blood glucose while the long-term goal of diabetes treatment is the prevention of diabetes-related conditions, which arise after individuals have developed the complication. Diet and exercise remain the primary ways of managing diabetes (Ligaray & Isley, 2010). The afflicted individuals should be able to accurately test and record their levels of blood glucose. The knowledge on what to eat and what medications to use should be well known by people suffering from the disease. The patients should get important information from their doctors.Individuals with diabetes type II are recommended to eat at the same times every day and their meals should be consistent in terms of the type of foods they choose to eat (Ligaray & Isley, 2010). The adherence of the meal intervals and the type of foods eaten help prevent the increase or decrease in the levels of blood sugars. Individuals can plan their meals by eating the right quantity of foods, choosing healthy foods and eating the meals at the required time. Another aspect is the weight management. It has been observed that some people after cutting weight can stop taking medications even when they still have diabe tes.In extreme overweight individuals, bariatric surgery may be recommended. Gastric bypass surgery and laparoscopic gastric banding are some of the weight reduction procedures that can be recommended in the management of diabetes (Ligaray & Isley, 2010). For diabetics, regular physical exercise is imperative (Mayo Clinic, 2009). It has been observed that aerobic exercise carried out regularly can help reduce the levels of blood sugars without the need of any medication. Exercise help to burn any excess fats and calories and therefore individuals with diabetes can easily manage their weight through exercises.Blood pressure and blood flow, which may be seen as a problem in diabetes type II can be improved (Mayo Clinic, 2009). Exercise decreases the insulin resistance in body cells without necessarily having any body loss. The body’s energy level is also said to improve with exercise and the ability to handle stress as well as lowering of tension are some of the benefits of exe rcise. When all the options of exercise and diet have failed, individuals may opt for medications that are prescribed by physicians. The drugs acting against diabetes function to lower the blood sugar levels in a number of ways (Ligaray & Isley, 2010).Physicians may prescribe for patients more than one type of medication because of the different modes of action of the different agents used in diabetes management. The drugs are also prescribed along with insulin when it is required. The drugs used in diabetes treatment are either given intravenously or orally. For instance, biguanides sold as metformin is used to decrease the hepatic production of glucose (Mayo Clinic, 2009). The rationale of biguanides is to make the fat cells, hepatic cells and the muscle cells to absorb more glucose from the bloodstream hence lowering the total blood sugar levels.Alpha-glucosidase inhibitors are also important agents that lower the carbohydrate absorption from the digestive tract. This lowers the glucose levels especially after the meals. Sulfonylureas help in triggering the pancreases to produce more insulin and they are administered by oral route (Ligaray & Isley, 2010). Other agents used in diabetes management include the thiazolidinediones, pramlintide and exenatide and meglitinides. Insulin is only prescribes to patients who fail to respond to other methods of disease management such as diet monitoring, exercise and other medications (Mayo Clinic, 2009).In addition, insulin may be recommended for individuals who have poor reactions towards other medications used. Usually, insulin is injected under the skin by the use of an insulin pen device or a syringe. Insulin is never administered orally as proteolytic enzymes in the stomach may act on the hormone hence affecting the efficacy. In diabetes type II, the body cells fail to respond effectively to insulin even when it is present (Ligaray & Isley, 2010). This is typically seen in type II diabetes mellitus where the resist ance is cause by post-receptor derangements.Post-receptor effect implies that the insulin is sufficiently produced but the cells which should physiologically respond to the molecule have a problem recognizing the insulin (Ligaray & Isley, 2010). There is a general observation that the increased glucose production in the liver particularly in inappropriate times contributes to the inability of the body cells to respond to the ligand, insulin (Ligaray & Isley, 2010). This process, the conversion of glycogen to glucose affects the insulin level, which is important in hepatic function.The reduced insulin-dependent glucose transport especially in muscles and adipose tissues also contributes to the problem of diabetes type II. Similarly, there is an impaired function of beta-cells in the early phase of insulin release following the hyperglycemic stimuli. Diabetes type II is a condition which not only affects the regulation glucose levels but also other important body systems such as the i mmune system, renal function, reproductive system and cardiovascular system are largely affected (Kilvert & Fox, 2007). The immune system is hampered among the individuals suffering from diabetes type II.This can be seen in situations where diabetic individuals take a longer healing from the wounds and minor surgical incisions. The incidences of coronary artery complications as well as the arterial diseases are common among the individuals suffering from diabetes type II (Zieve & Wexler, 2009). Renal failure can be the most disturbing complication of diabetes type II where individuals may require dialysis for blood purification (Mayo Clinic, 2009). Diabetes type II has also been identified to be causing erectile dysfunction which can be a major problem in marriages.In general, diabetes type II is a problem which affects a number of body systems and leaves the affected individual and the family members and friends with a great burden. It is a condition of economic importance and effe ctive approach should be directed to its prevention and treatment. The social aspect of the patients and those close to them is affected. Although medications have been developed to manage the condition, effective treatments have not been developed, which can completely treat the problem. This calls for extensive research to come up with ways to manage diabetes type II.

Sunday, November 10, 2019

Fin 571 Week 4

Guillermo’s Furniture Store Scenario There are three alternatives available to the Guillermo’s Furniture Store. One is they can keep the current position or they can become broker or make it high-tech. Therefore, Guillermo’s furniture store can divide the project into current project, High tech project and the broker project. Guillermo’s furniture store needs to select the option which is good for them and can provide competitive advantage to the store. It has been clear that managers are responsible for the use of capital budgeting techniques to find out exclusive project. We have different types of capital budgeting techniques. These capital budgeting techniques are: 1-Simple Payback, and/or Discounted Payback 2-Net Present Value (NPV) 3-Internal Rate Of Return (IRR) The simple payback period: â€Å"We can define the simple payback period as the expected number of years required to recover the original investment by Guillermo’s Furniture Store† (Brown, et. al, (2006), i. e. if the store has invested $300 millions in its project, then how much time it will take to recover its invested amount. Payback period is the first formal method used to evaluate capital budgeting projects. Here is the payback period for Guillermo’s Furniture Store. The cumulative cash flow of Guillermo’s Furniture store at t = 0 is just the initial cost of -$300,000. At Year 1 the cumulative cash flow is the previous cumulative of $300,000 plus the Year 1 cash flow of $500: -$300,000 + $42,573=-$257,427. Similarly, the cumulative for Year 2 is the previous cumulative of -$257,427 plus the Year 2 inflow of $42,573, resulting in –$214,854. We see that by the end of Year 7 the cumulative inflows have more than recovered the initial outflow. Thus, the payback occurred during the third year. If the $40,584 of inflows comes in evenly during Year 3, then the exact payback period can be found as follows: pic] Applying the same procedure to Project High-Tech and Broker, we find Payback period for them is 1. 53 years and 5. 89 years respectively. It is known that the shorter the payback period, the better. As the projects are mutually exclusive, Project High-tech would be accepted but Project current would be rejected. If the projects were mutually exclusive, High-tech would be ranked over Broker and Current because High-Tech has the shorter payback. Mutually exclusive project means that if one project is taken on, the other must be rejected (Brigham, 2004). Discounted Payback Period: In the real world firms use a variant of the regular payback, the discounted payback period, which is similar to the regular payback period except that the expected cash flows are discounted by the project’s cost of capital (WACC). So we can say that the discounted payback period uses the time value of money in its decision. Here, the discounted payback period is defined as the number of years required to recover the investment from discounted net cash flows generated from the project. If we look at the values of discounted cash flows we can find that the discounted payback period for Current project is 9. years whereas High-Tech and Broker project 1. 4 year and 8. 1 years respectively For Projects Current, High-Tech and Broker, project High-Tech ranked higher as compared to the others (Brigham, 2004). Payback Vs Discounted Payback: We can also says, that a payback is a type of â€Å"breakeven† calculation in the sense that if cash flows come in at the expected rate unt il the payback year, then the project will break even for that year. Here the simple payback period doesn’t consider the cost of capital whereas the discounted payback does consider capital costs it shows the breakeven year after covering debt and equity costs. The biggest drawback of both the payback and discounted payback methods is that they ignore cash flows that are paid or received after the payback period of the project. For example, suppose Project High-Tech had an additional cash flow at Year 5 then the discounted and simple payback period will ignore these values. In real live project with more cash flow after the pay back period would be more valuable than Project with no cash flow, yet its payback and discounted payback make it look worse. This is the reason, the shorter the payback period, other things held constant, the greater the project’s liquidity. Apart from this, since cash flows expected in the distant future are generally riskier than near-term cash flows, the payback is often used as an indicator of a project’s riskiness because the longer the payback period the higher is the risk associated with the project (Brigham, 2004) (Fabuzzi, 2003). Overall there is only one major demerit of the discounted cash flow method that it do not consider the cash flow generated by the company after the payback period and due to this a project with high cash flow after the payback period is rejected in front of a project that pays no cash flow after the payback period. Net Present Value (NPV): NPV is known as the best technique in the capital budgeting decisions. There were flows in payback as well as discounted pay back periods because it don’t consider the cash flow after the payback and discounted pay back period. To remove this flows net present value (NPV) method, which relies on discounted cash flow (DCF) techniques is used to find the value of the project by considering the cash flow of the project till its life. To implement this approach, we proceed as follows: a. Find the present value of each cash flow, including all inflows and outflows, discounted at the project’s cost of capital. b. Sum these discounted cash flows; this sum is defined as the project’s NPV. c. If the NPV is positive, the project should be accepted, while if the NPV is negative, it should be rejected. If two projects with positive NPVs are mutually exclusive, the one with the higher NPV should be chosen. [pic] Here CFt is the expected net cash flow at Period t, k is the project’s cost of capital, and n is the life of the project. Cash outflows (initial investments like expenditures such as the cost of buying equipment or building factories) are treated as negative cash flows for the project because the investor cash position decrease with the investment. In evaluating Projects Current, High-Tech and Broker, only CF0 is negative, but for some project the cash flow remains to be uneven (Brigham, 2004). We can find out the most effective project using NPV method by following techniques. An NPV of zero signifies that the project’s cash flows are exactly sufficient to repay the invested capital and to provide the required rate of return on that capital. If a project has a positive NPV, then it is generating more cash than is needed to service the debt and to provide the required return to shareholders, and this excess cash accrues solely to the firm’s stockholders. This is the reason, if a firm takes on a project with a positive NPV, the wealth of the stockholders increases due to inflow of net cash in there investment. If we take the projects Current, High-tech and Broker shareholders’ wealth would decrease by $26,755 if the firm takes on Project Current, increase by $955,065 if it takes the project High-Tech but by only increase by $27,014 if it takes on Project Broker. So we can easily decide, as the projects are mutually exclusive the Project high-tech is ranked higher than the other two (Brigham, 2004). We can also say that there is a direct relationship between NPV and EVA (economic value added of the project. As NPV is equal to the present value of the project’s future EVAs generated each year. This is the reason if a project has a positive NPV its EVA and MVA (market value added, or the excess of the firm’s market value over its book value) will remain positive (Fabuzzi, 2003). This is commonly used capital budgeting technique by the managers in the current scenario. Internal Rate of Return (IRR) The internal rate of return is similar to the concept of calculating bond yield to maturity. Similar concepts are used in capital budgeting when the internal rate of return (IRR) method is used to evaluate any project. The IRR is defined as the discount rate that equates the present value of a project’s expected cash inflows to the present value of the project’s outflows: [pic] Here CFO is the cash out flow from the project where CFI is the cash inflow from the project. Now how we can find the most valuable project using IRR there are following technique that will help to find out which project among Project Current, High-Tech and Broker is most valuable: i) The IRR on a project is its expected rate of return. i) If the internal rate of return exceeds the cost of the capital (WACC) used to finance the project, a surplus will remain after paying for the capital, and this surplus will accrue to the firm’s stockholders. Therefore, taking on a project whose IRR exceeds its cost of capital increases shareholders’ wealth. iii) But, if the internal rate of return is less than the cost of capital, then taking on the project will impose a cost on current stockholders. If we look at the project Current, High-Tech and Broker we can find that for project Current, IRR is 6. 9% where as the cost of capital is 9. 7%, for project High-Tech IRR is 64. 7% and the cost of capital is 9. 17% and for project broker IRR is 11% and cost of capital is 9. 17%. Hence we can decide that project high-tech is more valuable for Guillermo’s Furniture Store (Brigham, 2004) (Fabuzzi, 2003) (Reilly & Brown, 2006). Works Cited Brigham, E. F. , & Houston, J. F. (2004). Fundamental of Financial Management. South Western: Thomson. Brown, & Reilly. (2006). Investement Analysis and Portfolio Management. Thomson ONE – Business School. Fabozzi, F. J. (2003). Financial management and analysis. New Jercy: John willy and sons.

Thursday, November 7, 2019

9 Super-Tricky Job Interview Questions and How to Answer Them

9 Super-Tricky Job Interview Questions and How to Answer Them You’ve done a lot of interview prep already and you’re feeling pretty ready. But you’re still dreading the questions you haven’t prepped for- or the really tricky ones that seem perfectly simple, but have multiple strategic layers designed to get at something subtle. Don’t get tripped up or surprised by the following tricky questions- prepare your answers now so you’re calm, cool, and collected on your interview day.1. â€Å"Why did you leave?†Mostly tricky if you just got fired or quit soon after starting. Easy enough to answer if you lost your job as a part of a restructuring or layoff; just be honest there. Otherwise, be as transparent as possible and try to give answers about things that were out of your control (lack of growth opportunity or challenge, etc.). And restrain yourself from saying anything negative about the company or your former boss.2. â€Å"What’s your salary requirement?†Remember: loser speaks first. Try to avoid being the first person to say a hard number in this situation. Pivot if you can and do your best to get them to throw out a number first. If you must give a direct answer, make sure you have a good sense of what sort of salary range would be appropriate for you and start there. Make sure the bottom is no lower than your current salary or the low end of their advertised range.3. â€Å"How did you hear about the position?†You might be thinking: why do they want to know this? But remember, most hirers like referrals and it’s all about who you know. They’re trying to figure out who you might already know at the organization. They want to know whether you’re a champion networker, up on all the latest industry intel. Try to find an elegant answer to this question that isn’t just â€Å"uh†¦ I found it on a web search?†4. â€Å"What is your greatest professional achievement?†You get a chance to go into one accomplishment in depth here and really sell yourself. Try to load in plenty of quantifiable and verifiable detail into your answer. Back up any claims of your own greatness. But  don’t go overboard with the self-praise- humility might also be something they are looking for.5. â€Å"Where do you see yourself in 5 years?†They want to know first and foremost that you have a career vision for yourself. They also want to know if you’re so obsessed with finding a path up that you’ll be taking the first path out. Strike a balance between assuring them you’re keen to be a loyal contributor to the company for the long haul, and showing your ambition. Enthusiasm for the company itself will go a long way here, particularly if you feel you’re a great fit for their work culture and could see yourself advancing internally.6. â€Å"What’s with the gap in your employment?†You should be ready for this question if there are gaps in your employment. Be honest and succinct. Make sure to mention any volunteering or education that could earn you extra points. And be passionate about explaining any career changes, taking extra care to mention how your unique skills translate perfectly to this job.7. â€Å"Are you hoping to start a family?†Questions about your marital status and plans to have children are illegal, but you will occasionally be asked. Pivot from this answer as quickly as you can. Say something like: you’re really more focused on your career at the moment and very interested about this fascinating part of the company’s work†¦ is there more they could tell you about that?8. â€Å"Do you like to work on your own or as part of a team?†Both. You like both. Explain how great you are at both. Don’t let yourself get pigeonholed here, because you’ll never know when they’re looking for a self-starter they don’t have to worry about, or a true team player for a more collaborative environment.9. â€Å"Do you have any questions for us?†Interviews are supposed to be more of a two-way street than an interrogation. You will be asked if you have any questions and you will need to have a few. Even if most of your questions have been answered in the course of the interview, have one or two things you could ask. When in doubt, try: â€Å"What’s your favorite thing about working here?† And give your interviewer a chance to talk about herself and the company while you regroup.

Tuesday, November 5, 2019

Georg Baselitz, Creator of Upside-Down Art

Georg Baselitz, Creator of Upside-Down Art Georg Baselitz (born January 23, 1938) is a Neo-Expressionist German artist best known for painting and exhibiting many of his works upside down. The inversion of his paintings is a deliberate choice, aimed at challenging and disturbing viewers. According to the artist, he believes that it makes them think more about the grotesque and often disturbing content. Fast Facts: Georg Baselitz Full Name: Hans-Georg Kern, but changed his name to Georg Baselitz in 1958Occupation: Painter and sculptorBorn: January 23, 1938 in Deutschbaselitz, GermanySpouse: Johanna Elke KretzschmarChildren: Daniel Blau and Anton KernEducation: Academy of Visual and Applied Art in East Berlin and Academy of Visual Arts in West BerlinSelected Works: Die Grosse Nacht im Eimer (1963), Oberon (1963), Der Wald auf dem Kopf (1969)Notable Quote: I always feel attacked when Im asked about my painting. Early Life and Education Born Hans-Georg Kern, the son of an elementary school teacher, Georg Baselitz grew up in the town Deutschbaselitz, in what would later be East Germany. His family lived in a flat above the school. Soldiers used the building as a garrison during World War II, and it was destroyed during a battle between Germans and Russians. Baselitzs family found refuge in the cellar during the combat. In 1950, the Baselitz family moved to Kamens, where their son attended high school. He found himself heavily influenced by a reproduction of Interlude During a Hunt in Wermersdorf Forest by 19th-century German realist painter Ferdinand von Rayski. Baselitz painted extensively while attending high school. In 1955 the Art Academy of Dresden rejected his application. However, he began studying painting at the Academy of Visual and Applied Art in East Berlin in 1956. After expulsion due to socio-political immaturity, he continued his studies in West Berlin at the Academy of Visual Arts. In 1957, Georg Baselitz met Johanna Elke Kretzschmar. They married in 1962. He is the father of two sons, Daniel Blau and Anton Kern, who are both gallery owners. Georg and Johanna became Austrian citizens in 2015. Lothar Wolleh / Wikimedia Commons / GNU Free Documentation License First Exhibitions and Scandal Hans-Georg Kern became Georg Baselitz in 1958, when he adopted his new last name as a tribute to his hometown. He began painting a series of portraits based on observations of German soldiers. The focus of the young artist was the German identity in the aftermath of World War II. The first Georg Baselitz exhibition took place in 1963 at Galerie Werner Katz in West Berlin. It included the controversial paintings Der Nackte Mann (Naked Man) and Die Grosse Nacht im Eimer (Big Night Down the Drain). Local authorities deemed the paintings obscene and seized the works. The ensuing court case was not settled until two years later. Various Signs (1965). Hans-Georg Roth / Getty Images The controversy helped propel Baselitz into notoriety as a rising expressionist painter. Between 1963 and 1964, he painted the Idol series of five canvases. They focused on profoundly emotional and disturbed renderings of human heads echoing the emotional angst of Edvard Munchs The Scream (1893). The 1965-1966 series Helden (Heroes) represented Baselitz at top form. He presented ugly images that were designed to force Germans to confront the ugliness of their violent past during World War II and political suppression in East Germany. Upside-Down Art In 1969, Georg Baselitz presented his first inverted painting Der Wald auf dem Kopf (The Wood on its Head). The landscape subject matter is influenced by the work of Ferdinand von Rayski, Baselitzs childhood idol. The artist has frequently stated that he turns the works upside down to irritate the view. He believes that people pay closer attention when they are disturbed. While the paintings displayed upside down are representational in nature, the act of inverting them is considered a step toward abstraction. Some observers believe that the upside-down pieces were a gimmick to draw attention to the artist. However, the prevailing view saw it as a stroke of genius that rattled traditional perspectives on art. St. Georgstiefel (1997). Mary Turner / Getty Images While the subject matter of Baselitz paintings stretches far and wide and defies simple characterization, his upside-down technique quickly became the most easily identifiable element of his work. Baselitz was soon known as the pioneer of upside-down art. Sculpture In 1979, Georg Baselitz began creating monumental wooden sculptures. The pieces are unrefined and sometimes crude, like his paintings. He refused to polish his sculptures and preferred to leave them looking like rough-hewn creations. BDM Gruppe (2012). FaceMePLS / Wikimedia Commons / Creative Commons 2.0 One of the most celebrated of Baselitzs sculpture series is the eleven busts of women he created in the 1990s designed to commemorate the bombing of Dresden during World War II. Baselitz memorialized the rubble women he saw as the backbone of efforts to reconstruct the city after the war. He used a chain saw to hack away at the wood and help give the pieces a crude, defiant appearance. The emotional intensity of the series echoes the 1960s paintings of the Heroes series. Later Career In the 1990s, Baselitz expanded his work into other media beyond painting and sculpture. He designed the set for the Dutch Operas production of Harrison Birtwistles Punch and Judy in 1993. In addition, he designed a postage stamp for the French government in 1994. The first major U.S. retrospective of the work of Georg Baselitz took place at the Guggenheim in New York City in 1994. The exhibition traveled to Washington, D.C., and Los Angeles. Georg Baselitz continues to work and produce new art in his 80s. He remains controversial and is often highly critical of German politics. Georg Baselitz exhibition at White Cube Gallery (2016). rune hellestad / Getty Images Legacy and Influence The upside-down art of Georg Baselitz remains popular, but arguably his willingness to confront the horrors of World War II in Germany in his art has the most enduring impact. The emotional and occasionally shocking subject matter in his paintings exerted a powerful influence on Neo-Expressionist painters around the world. Oberon (1963), one of the most recognized masterpieces by Baselitz, demonstrates the visceral impact of his work. Four ghostly heads stretched into the center of the canvas on elongated and distorted necks. Behind them, what looks like a graveyard is drenched in a bloody red color. Oberon (1963). Hans-Georg Roth / Getty Images The painting represents the rejection of the prevailing winds of the art world in the 1960s directing young artists toward conceptual and pop art. Baselitz chose to dig even deeper into a grotesque form of expressionism laying bare the emotional horrors that continued to impact post-war Germany. Discussing the direction of his work, Baselitz said, I was born into a destroyed order, a destroyed landscape, a destroyed people, a destroyed society. And I didnt want to reestablish an order: Id seen enough of so-called order. Sources Heinze, Anna. Georg Baselitz: Back Then, In Between, and Today. Prestel, 2014.

Sunday, November 3, 2019

The Rewards For Caring for a Pet Essay Example | Topics and Well Written Essays - 1000 words

The Rewards For Caring for a Pet - Essay Example Having a dog as a pet is a big responsibility and requires that the owner give as much to the pet as they expect in return. A dog can't get to the doctor, shop for dog food, or open the door to go outside. The well cared for dog needs a human's attention on a regular basis. The rewards that are gained from a happy and healthy dog come from giving your dog the proper care and treatment that they need. The care for any new dog in the household begins when the puppy is just a few weeks old and lays a foundation for its future good health. As a puppy, the first trip outside the home will probably be to visit a veterinarian to get the preventative care that they need to stay healthy. The veterinarian will typically give the dog a series of shots that prevent the dog from acquiring such illnesses as distemper and rabies. This will usually be followed up at a later date by the second series of booster shots, including de-worming, that ensures that the dog will have a lifetime of immunity to the diseases that most commonly afflict dogs. These initial vet visits will be augmented throughout the life of the dog by ongoing treatments for other threats to a dog's health. The veterinarian gives the dog the first line of defense against the major canine ailments, but it is up to the owner to provide regular and ongoing treatment for additional problems that face the dog. The veterinarian can give the dog a pill that kills any existing worms and will need to work with the owner to maintain a regimen of ongoing treatment to eliminate the possibility of a lethal case of heartworms (Crans). In addition, a dog can be subject to fleas, mites, skin conditions, and ear infections that may require additional treatment. The owner needs to regularly observe the animal for signs of unusual scratching or behavior that might indicate a health problem. There are many products such as flea collars, pills, and drops that provide lasting prevention for fleas and ticks (Potter). In addition, the dog's ears require regular cleaning and many other conditions can be attended to with over the counter medicines or with the help of a veterinarian. A dog that is in good health will have a healthy appetite and it is essential to maintain a proper diet to make a happy dog. While many dogs enjoy people food, it can be a recipe for bad health. A steady diet of table scraps is usually not well balanced in terms of the fat and protein that fit the special needs of a dog. Improper feeding or overfeeding can cause a dog to become overweight and places undue strain on the dog's well being. The dog's diet should reflect the proper mix of protein, fat, carbohydrates, and vitamins. The dog's veterinarian, or reliable Internet information, can recommend good food or provide the nutrient requirements that are required for a healthy dog. Dog owners can usually do very well if they buy a high-quality dry dog food and add some meat broth, leftover vegetables, or lean meat scraps (Building a Balanced Diet). In addition to eating the correct food, it is important to not overfeed the dog. Some dogs may eat until the food is gone and the quantities will need to be monitored. The correct amounts are printed on all dog food packaging to make the owner's job easy. Following these simple steps will result in a dog that is fit and trim.

Friday, November 1, 2019

Create a crisis action plan Coursework Example | Topics and Well Written Essays - 500 words

Create a crisis action plan - Coursework Example It is also important for the management to attempt to create goodwill in the company so that it can have a good image in the eyes of the (Flippo, 1961). There are different steps that can be taken when resolving conflicts in an organization. According to Armstrong (1994), there are mainly four stages that are involved in conflict resolution which involve the following: carry out research about the root cause of the conflict, design an action plan, implement the plan and finally evaluate the effectiveness of the crisis action plan. Some claims of sexual harassment that are reported in the organization are baseless hence the need to conduct some investigations to establish if the case has actually happened. In the event that sexual harassment claims are real, a proper course of action will be required in order to rectify the issue so that the parties involved can work together in harmony again. The action plan ought to involve the parties involved in the case of sexual harassment. This action plan should not only be limited to the people who are directly involved in the case but should be a leading example to the would be offenders in the future. The people involved should be brought to the drawing table where their case is openly discussed. The views of both parties are taken into consideration and a solution that is satisfactory to both parties is found. For the sake of progress and unity in the organization, reconciliation is the way forward when the offender and the victim have understood each other and hav e agreed to forgive each other. Thus, in the case highlighted above, the action plan involves the parties involved burying the hatchet and working together in unity. However, this course of action ought to be implemented by a responsible person like a leader in the organization. In order to implement this course of action, the leader should make sure that the people involved do not revert to the issue again but they should just focus on