Wednesday, October 30, 2019

Chemistry Experiments Lab Report Example | Topics and Well Written Essays - 750 words

Chemistry Experiments - Lab Report Example This methodology is widely use to determine concentration of various metal ion like Cu, Al, sulphide etc. being highly sensitive and accurate methods precautions should be taken while performing estimations. some of them are as follows. Copper iodide forms week complex with molecular iodine (I2), which slowly leach out and gives re-coloration to the solution after discoloration. Avoid that potassium thiocynate can be added to the system. Proper observation of discoloration must be taken and any modification in it leads to differential endpoint and hence final result. White bright tiles or any white paper can be kept below flask to distinguish different coloration and end point. There is slight difference in obtained results and actual values as there are chances (Mary Ann Varanka-Martin) (WKU website) (MHS Chemistry ) of error and limitation of procedure leads this difference. Both experiments gives Idea of water contain in hydrated Cuso4 crystal and make us understand how water plays important role in crystallization. Slight modification in above mention experiments give us more information about thermodynamics of crystallization and how different lows of physics and chemistry applies to crystallization process For example if we estimate the water evaporated during heating by obtaining condensate of it, gives clear cut idea of law of mass conservation and also validate results by one more means. Similarly estimation of heat generated during rehydration of CuSo4 gives idea of law of energy conservation and make us understand how energy get disappears in form of

Monday, October 28, 2019

Race representation in Desmonds and Mind your language Essay Example for Free

Race representation in Desmonds and Mind your language Essay In this essay I am going to compare the ways in which race has been represented in the two sitcoms Desmonds and Mind your language. Desmonds is a sitcom set in a barber shop in the 1989 and Mind your language which is set in a school in 1970s. Mind your language reinforces stereotypes by the peoples accents for example Ali said that he goes around and nicking on peoples doors when hes meant to say knocking on peoples door thats why you cant trust him and this also makes him sound dishonest. Ali and Ranjeet are in a conflict with each other because of the war against India and Pakistan. Jamila the Pakistani woman is represented as domestic because she is always knitting in class also there is conflict going on with Ingrid the Swedish woman and Anna the German woman who are trying to attract most of the men in the class because mostly the class is full of men. Ranjeet is shown as a typical Indian because he is always shaking his head and moving his hands and also him going to be arranged married to a another person that he doesnt even know and doesnt like. Taro the Japanese man has a camera on him because it shows that all Japanese people carry cameras and makes them look like tourists. All the students in Mind your language dont take learning English seriously by not doing their homework instead they buy it of Giovanni the Italian and coming late to their classes. Desmonds is a sitcom set in 1980s in a barber shop. Desmonds is different to mind your language. It is subverting stereotypes because in Desmonds the people own their own business and when the show starts you see white people hanging around with black people instead of white people on one side and black on the other. This is represented by Shirley how is the daughter of Desmond has a white friend and when the show is starts you see a Blackman and a white man shaking hands. In Desmond the barber shop is used for social conversation about black people achieving things and how political comments are made negative at stereotyping in the media. Sean is the son of Desmond. Hes represented as a claver and wanting to go to school and wanting to learn. As well as listening to rap music and the older brother Sean has left and started working as a bank manager how lives well and also owns his own house. In conclusion I think mind your language is bad because it makes the people sound dishonest and bad but Desmonds on the other hand show positive view on TV because of showing black people wanting to learn and at the same time being into rap music and also black people being friends with white people.

Saturday, October 26, 2019

The Promise of the Dietary Supplement :: Research Science Diet Essays

The Promise of the Dietary Supplement Fat Busters, Fat Trappers, Fat Magnets and Fat Absorbers all have one ‘miraculous’ agent in common – chitosan. Why is this supplement all the rage in today’s weight loss market? Will chitosan live up to its touted potential? The dietary supplement, chitosan is the processed, more water-soluble form of one of the most common substances in nature: chitin (KITE-in). The exoskeletons of arthropods (ants, shellfish, etc.) and the walls of many molds, yeast and fungi contain this building block of nature. Chitosan was first discovered in 1811 by Henri Braconnot, director of the botanical garden in Nancy, France. Bracannot observed that a certain substance (chitin) found in mushrooms did not dissolve in sulfuric acid. Over the last 200 years, the exploration of chitosan has taken on many different forms. Several other researchers continue to build on the original finding of Bracannot, discovering new uses for chitin as they find different forms of it in nature. Chitosan aids in the â€Å"reduction of triglycerides due to its ability to bind dietary lipids, thereby reducing intestinal lipid absorption† (Koide, 1998). Translation? Basically, chitin molecules have the ability to latch on to heavy metals, amino acids and FAT. Chitin may be able to ‘soak up’ fat in the intestine and flush it through the body before it can be absorbed. If effective, this process should lead to weight reduction. Neutralize fat, thus causing weight loss Reduce cholesterol Provide a safe and natural weight loss program with minimal / no side effects According to Sally Squires, in the March 28, 2000 issue of The Washington Post, several factors involving chitosan should be considered before buying chitosan-based products: 1) The composition of chitin can vary depending on the seawater, the animal from which it is taken, and the time of year. There is no ‘pure form’ that can be counted on. 2) Following the Dietary Supplement Health and Nutrition Act in 1994, the FDA has a limited ability to regulate vitamins, minerals and other dietary supplements (i.e. chitosan). It is, therefore, possible to stock shevles full of a product without providing related scientific evidence. 3) The Federal Trade Commission (FTC) won an $8.3 million judgment against a company violating federal consumer protection laws with false claims concerning chitin. 4) The FTC lawsuit is the first of several additional (non FTC) suits for false claims regarding chitin and chitosan, including a lawsuit filed by both Napa and Sonoma counties in California.

Thursday, October 24, 2019

Grapes Of Wrath: Summary :: essays research papers

Grapes of Wrath: Summary The book Grapes of Wrath tells about the dust Bowl people's troubles they had coming to California. It tell about the Joad's trip from Oklahoma to California. There are twelve people in the Joad family. The one person that stood out the most between thee family was Ma. Ma's great strength, and smart thinking is what keeps the Joad family together and going. Ma's strong suites are shown through out the book. Nancy Reagan once said, "A women is like a tea bag-only in hot water do you realize how strong she is." I don't know how Nancy Reagan did this but she described Ma Joad to you exactly. The first time that Ma's strength was showed was when grandma died. She lied to an inspector telling him, "We got a sick ol' lady. We got to get her to a doctor. We can't wait." The inspector bought the story and let them pass on their way to California. Even then Ma didn't tell the family that grandma was dead, instead she laid there next grandma's dead carpus until they got to California. "She looked over the valley and said , Grandma's dead." She keeps the family together when they want to split up. The first time that this was showed in the book when they pulled over to help the Wilsons with the car. Tom suggested that him and Casey stay and fix the car while the rest of the family go's on to Bakersfield and that they would meet them there. Ma then let out her fury, she held up a tire iron and demanded that they all stick together and that they will go to Bakersfield together. Ma is also very smart. Her common sense is a higher then the rest of the family's. When Tom gets hit under the eye by a officer Ma devises a plan to get Tom out of that government camp. She says, "We'll put one mattress on the bottom, an' then Tom gets quick there, an we take another mattress an' sort of fold it so it make a cave." She really puts her foot down with what she wants

Wednesday, October 23, 2019

Data Compression and Decompression Algorithms

Table of Contents Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦2 1. Data Compression†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2 1. 1Classification of Compression†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2 1. 2 Data Compression methods†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦3 2. Lossless Compression Algorithm†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 2. 1 Run-Length Encoding†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦4 2. 1. 1 Algorithm†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 5 2. 1. 2Complexity †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 5 2. 1. 3 Advantages and disadvantage†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 3.Huffmann coding†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 3. 1 Huffmann encoding†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 3. 2 Algorithm†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 4. Lempel-Ziv algorithm†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 4. 1 Lempel-Ziv78†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 8 4. 2Encoding Algorithm†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8 4. 3 Decoding Algorithm†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 12 5. Lempel-Ziv Welch†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 14 5. 1 Encoding Algorithm†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 5. 2 Decoding Algorithm†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 17 INTRODUCTION: Data compression is a common requirement for most of the computerized applications. There are number of data compression algorithms, which are dedicated to compress different data formats. Even for a single data type there are number of different compression algorithms, which use different approaches. This paper examines lossless data compression algorithms. 1. DATA COMPRESSION: In computer science  data compression  involves  encoding  information  using fewer  bits  than the original representation.Compression is useful because it helps reduce the consumption of resources such as data space or transmission  capacity. Because compressed data must be decompressed to be used, this extra processing imposes computational or other costs through decompression. 1. 1 Classification of Compression: a) Static/non-adaptive compressio n. b) Dynamic/adaptive compressioin. a) Static/Non-adaptive Compression: A  static  method is one in which the mapping from the set of messages to the set of codewords is fixed before transmission begins, so that a given message is represented by the same codeword every time it appears in the message ensemble.The classic static defined-word scheme is Huffman coding. b) Dynamic/adaptive compression: A code is  dynamic  if the mapping from the set of messages to the set of codewords changes over time. 2. 2 Data Compression Methods: 1) Losseless Compression: Lossless compression reduces bits by identifying and eliminating  statistical redundancy. No information is lost in Lossless compression is possible because most real-world data has statistical redundancy. For example, an image may have areas of colour that do not change over several pixels; instead of coding â€Å"red pixel, red pixel, †¦ the data may be encoded as â€Å"279 red pixels†. Lossless compression is used in cases where it is important that the original and the decompressed data be identical, or where deviations from the original data could be deleterious. Typical examples are executable programs, text documents, and source code. Some image file formats, like  PNG  or  GIF, use only lossless compression 2) Loosy Compression: In information technology, lossy compression is a data encoding method that compresses data by discarding (losing) some of it. The procedure aims to inimize the amount of data that needs to be held, handled, and/or transmitted by a computer. Lossy compression is most commonly used to compress multimedia data (audio, video, and still images), especially in applications such as streaming media and internet telephony. If we take a photo of a sunset over the sea, for example there are going to be groups of pixels with the same colour value, which can be reduced. Lossy algorithms tend to be more complex, as a result they achieve better results for bitma ps and can accommodate for the lose of data. The compressed file is an estimation of the original data.One of the disadvantages of lossy compression is that if the compressed file keeps being compressed, then the quality will degraded drastically. 2. Lossless Compression Algorithms: 2. 1 Run-Length Encoding(RLE): RLE stands for Run Length Encoding. It is a lossless algorithm that only offers decent compression ratios in specific types of data. How RLE works: RLE is probably the easiest compression algorithm. It replaces sequences of the same data values within a file by a count number and a single value. Suppose the following string of data (17 bytes) has to be compressed: ABBBBBBBBBCDEEEEFUsing RLE compression, the compressed file takes up 10 bytes and could look like this: A 8B C D 4E F 2. 1. 1 Algorithm: for (i=0;i

Tuesday, October 22, 2019

Experience Archaeology Firsthand in a Field School

Experience Archaeology Firsthand in a Field School Would you like to go on an archaeological dig? Do Indiana Jones movies give you wanderlust? Does the thought of conducting scientific research in exotic locations sound like the perfect way to spend your hard-earned vacation? Are you tired of reading about ancient cultures from the pages of books and websites and do you long to learn about those dead societies first hand? An archaeological field school might be just what youre looking for.   An archaeological field school means that even if youre not a professional archaeologist, you, too, can spend part of your summer digging in the dirt. After all, it doesnt seem terribly fair that we should have all the fun, does it? Well, fortunately, there are lots of university-based excavations going on all year long, called field schools, and some of them take unaffiliated volunteers. Whats a Field School? An archaeology field school is an archaeological dig that is organized partly to train the next generation of archaeologists. Of course, field schools are always arranged to conduct real, scientifically-based archaeological research for the professors and their graduate student assistants. The only reason to go into the field and excavate sites must always be to gather new information about ancient behaviors and culturesarchaeology is a destructive process and if youre not gathering data, you shouldnt be digging. But field schools are specifically tailored to teach new students the methods and philosophy of archaeology. And the good news? Even if youre not planning on becoming an archaeologist, you can still attend a field school. In fact, I always recommend that anybody even considering a career in archaeology should go to one early in their education, if possible even before they start taking university classes, to find out if they like hanging around other sunburned and filthy people pursuing scientific research enough to warrant the cost of a college education. Attending a Field School A field school works this way: a small band of studentsgenerally ten to fifteen, although the size varies considerably from school to schoolis collected by a university anthropology department. The students go to an archaeological site where they get instructions on how to survey and dig, and then they dig. Many field schools feature lectures and tours to nearby archaeological sites; sometimes students are assigned a special project of their own. The students get college credit and training that way,   starting them off in a career in archaeology. Most field schools last between two and eight weeks in the warm or dry season, depending on what part of the world the excavations are located. Many field schools also welcome members of the local historical society or archaeology club, or provide opportunities for the public to experience archaeology for themselves. Almost every archaeology department or anthropology department with a concentration in archaeology in the world conducts archaeological field research in schools every summer or every other summer. What Youll Need To attend such a field school, youll need physical stamina, clothes you dont mind destroying, a hat with a brim, and SPF 30 or better sunblock. You may get college credit. You may have to provide your own travel and housing expenses, or they may be provided as part of the experience. Youll need a strong sense of adventure; a stronger sense of humor; and the ability to work hard without complaining (too much!). But you might have the time of your life. So, if you have a few days or weeks off next summer, and you want to experience a little real-live archaeology, this is the time to start looking! Finding a Field School There are several ways to find a field school. There are several dozens being held all over the world every year. Here are a few sites that can be trusted to contain up-to-date listings from around the globe.   Archaeology Anthropology Field Schools ShovelBums site, R. Joe Brandon Archaeological Fieldwork.com, Jennifer Palmer Field School Opportunities from the American Anthropological Society Archaeological Fieldwork Opportunities Bulletin from the Archaeological Institute of America You could also contact the archaeologists associated with the anthropology, archaeology, or ancient history department at your local university. You might consider joining your local archaeology society or club. Good luck and good digging!

Monday, October 21, 2019

Ethical Dilemma Essay Sample

Ethical Dilemma Essay Sample Essay on Ethical Dilemma If You Saw Your Best Friends Cheat on a Test, What Would You Do? Always remember that when you cheat or planning to cheat, then you always lose. This is especially when you are going to cheat on your exams because you are attempting to outsmart your professor or teacher by means of violating the rules. If you happen to see your best friend cheating, it is important to remind them that what they are doing is inappropriate. Cheating is not acceptable and therefore anyone who is caught cheating will face punishments from the teacher. The teacher is not the only one who will provide punishments because the school is expected to apply the same. This is because cheating is the most unacceptable form of offense at school because it can generate a public scandal to the community. As the best solution, it is important to approach your best friend and inform that their recent action is unacceptable. Getting caught could risk their academic status, especially if there is a proof to show to the school administration such as the principal. Promoting awareness regarding the consequences of cheating is implied because the best friend will soon realize that the value of honesty. As a best friend, acting as a guide is important because it shows how concerned you are to your friend who is drawn into an action that is not acceptable. This is instead of reporting your best friend to the teacher or school administration that he cheated on a certain activity such as exams. In this way, your best friend will feel that you seriously care for them and are now willing to follow your advice not to repeat the same mistake for the next school assignment process. The only concern is to know what is going on inside the head of that particular best friend. This is because they think that they are offended by the situation. Some best friends argue when their action is seen by them as the rightful thing. There are numerous reasons to consider because there are factors that influence a person to commit such behaviors, which forces them to commit such actions. Criticisms are sometimes not the rightful way to approach your best friend to take such actions. In this case, the relationship between friends is at risk for being strained. Telling your best friend that his act was wrong during the exam should be treated with a proper approach to ensure that you are going to tell them using the right approach as well as using the right word. Cheating is the mortal sin of education because it is an act of taking advantage of the subject matter against the practices of any academic institution. When a person cheats, they violate the policies of the school where they are currently learning. Students who commit such acts are usually suspended from school because it negatively affects the performance of the school. Disciplining the student in a right manner ensures that the response becomes subjective, relevant, and appropriate to prevent similar offenses in the future. Always remember that there were students who were expelled from the school because they were caught cheating in their previous classes by their teachers and school administration. Every offender offends the moral and ethical values of learning because they are taking advantage against the law’s implementation that could lead them to a humiliating consequence after committing an unacceptable action (Blumenthal, 2013). Reference Blumenthal, William (2013). Models for merging the US antitrust agencies.  Journal of Antitrust Enforcement. Oxford Journals.  1  (1): 24–51.

Sunday, October 20, 2019

Apophenia †Filling the Blanks

Apophenia - Filling the Blanks Apophenia Filling the Blanks Apophenia Filling the Blanks By Maeve Maddox Readers comments on What Does [Sic] Mean? point up the curious feature of the human mind that infuses meaning into the meaningless. I always thought it was an abbreviation for â€Å"Spelling Is Correct.† I think I read on this site that someone believed â€Å"sic† to stand for â€Å"said in context†. I had previously thought it was an acronym for â€Å"Spelled InCorrectly†. This type of fill-in-the-blanks reasoning is at work in elaborate conspiracy theories and when someone sees the face of Jesus in a tortilla. The tendency to find meaning in the partially-known is called apophenia: finding meaning or patterns where none exist. Unfamiliar with the source of the notation [sic], readers make use of the letters and the context to create something that makes sense to them. We all fall into this kind of fallacious reasoning at some time or another. Uncomfortable in a new situation, we hear laughter and are certain that the people are laughing at us. The narrative of the movie A Beautiful Mind revolves around the protagonists apophenic beliefs. For those of us who write fiction, some aspect of apophenia must be at work when we spin whole narratives out of a chance remark or the glimpse of an oddly-dressed person on a train. The human mind craves meaning. We look at our lives and see a meaningful narrative. We find evidence for beliefs that other people find preposterous. If you browse the Wikipedia articles that stem from the one on apophenia, youll find several types of this kind of thinking. One type is called Mortons Demon, named by Glenn R. Morton to explain what was at work in his mind when he believed in a widely-held theory he no longer believes in. Morton entered the study of physics believing firmly in creationist theory. His study of geology changed his belief. He then gave a name to the type of reasoning that had enabled him to believe in a theory with insufficient physical evidence: Mortons demon stands at the gateway of a persons senses and lets in facts that agree with that persons beliefs while deflecting those that do not. With a national election only days away, were being hammered with all kinds of assertions about the candidates. Its probably a good time for voters to watch out for apophenia in their thinking. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:20 Great Similes from Literature to Inspire YouHang, Hung, HangedIs "Number" Singular or Plural?

Saturday, October 19, 2019

U choose a topic Case Study Example | Topics and Well Written Essays - 1000 words

U choose a topic - Case Study Example This water industry operated under strict regulations from both governmental and nongovernmental organizations concerned with quality assurance. One such organization includes the International Bottled Water Association (IBWA), and the America’s Food and Drug Administration (FDA). These bodies are usually concerned with facilitating adoption of safety and quality related standards to consumer markets. Within any economic environment, bottled water industry plays a significant role in enhancing management and rational utilization of ground water (Gleick 54). In addition, this industry provides numerous opportunities for commercial ventures involving different stakeholders like suppliers and logistical manufactures. In the recent past, statistics indicates steadily increasing sales in bottled water within the global consumer market. In 2009 alone, sales of bottled water were approximately $78 billion within that fiscal year alone. In 2010, sales increased by 4.3% to hit a revenu e target of $81 billion. This specific increase within that short period indicates availability of business opportunities within the industry (Eshleman 71). In this regard, certain success factors facilitate achievement of production, distribution and sales objectives by involved companies. One such factor is conformance to production standards required by the industry. Bottled water industry is under governance by federal and state authorities in matters relating to product quality. In order for any organization to gain considerable recognition within any given marketing environment, they will first develop reliable standards of production allowed by relevant authorities. Within the American market, success only comes after an organization gains quality approval from the Food and Drug Association. Apart from such a local quality assurance authorities, other producers choose to advance towards attainment of standards required by international bodies like IBWA (Vasconcellos 84). In t his context, success is directly related to level of conformance to existing standards of product quality in the market. Another integral success factor in bottled water industry involves marketing strategies employed by a given company. In this case, an example of strategy that directly influence marketing trends include distribution and sales patterns used by a marketing agency to reach target consumers (Eshleman 88). Consumer trends suggest that individuals are more likely to purchase a convenience related product whenever their proximity to that product increases. In actual consumer markets, bottled water occupies same shelves as those of other soft drinks in convenience stores. In addition, bottled water can also be sold along with other soft drinks in restaurants, hotels and snack shops. This means that the ability of an organization to avail their product to these premises increases their chances of sales success. From a more practical illustration, Coca Cola utilized its sof t drink distribution channels to deliver its bottled water brands to the market. Fortunately, Coca Cola had a fully developed and efficient distribution channel for their soft drink market. The company was under no commercial obligation to develop a new distribution channel for their new products (Eshleman 92). In this regard, the company in subject supplied mineral water filled bottles to store shelves selling their popular soft drinks. Changes in the industry Since its inception on a commercial scale level,

Friday, October 18, 2019

Supply Chain Management Coursework Example | Topics and Well Written Essays - 5500 words

Supply Chain Management - Coursework Example This paper using qualitative research method analyses the effectiveness of supply chain management on the basis of the activities and capabilities that the organizations seek from their supply chain partners. The research basically supports the argument that the effective supply chain management is dependent upon the effective operational and relational competencies of the supply chain partners. However it is also advocated that collaborative supply chain management challenges the traditional supplier-customer arrangements and changes taking place in the respective organizations largely depend on the correlation of competency of the supply chain partners and the long term relationship within the supply chain. Recommendations for the future studies are also made. A supply chain consists of all activities associated with the flow and transformation of goods and services from the raw material stage through to the end user as well as the associated information flows. Supply chain is made up of many interrelated organizations starting with raw material suppliers and including parts and components suppliers, subassembly suppliers, the product or service producer, the distribution channels, and ending with the end-use customer. 1.1 Supply Chain Management The focus of supply chain management is on managing the flow of goods and services and information through the supply chain in order to attain the level of synchronization that will make the supply chain more responsive to the customer needs and at the same time lowering the costs. Traditionally each segment of the supply chain was managed as a separate entity focused only on its goals. However in the present day competitive business environment the ability of a company to enhance its competitive strength is largely determined by the combined capabilities of all of its supply chain members. The

COSTS OF PRODUCTION Essay Example | Topics and Well Written Essays - 750 words

COSTS OF PRODUCTION - Essay Example To understand the concept indivisibility of some factor inputs, we can look at some examples from the Tropical Smoothie cafà ©. Some of the indivisible inputs include the business idea, entrepreneurial skills, and the skills of individual workers among others. In this  case, it is  clear that not all inputs all divisible. Therefore, the indivisible inputs should be utilized efficiently to avoid wastage. There exist several characteristics or features of a competitive market structure. For instance, there are no barriers to entry in the market. In this regard, firms are free to penetrate or exit the market on their own pleasure. As a result, there are many small firms that serve the entire market such that no firm has sufficient power to control the market (Dwivedi, 2006). Therefore, the price of commodities in such a market are determined by the forces of demand and supply. In essence, the firms have to set prices that are in line with the existing market price. Generally, it can be argued  that the firms in such a market are price takers. Van & Camesasca (2001) state that a perfectively competitive firm offers identical products to that of competitors. In this regard, the consumers can switch from one firm to the other since all products are close substitutes. Actually, the products serve the same customers’ needs and wants and, therefore, firms are forced to devise unique means of surviving the competition. In essence, the homogeneity of products in perfectively competitive markets creates a cut-throat contest among the firms in the competition. Perfectly competitive firms operate with resources that are easily transferable from one industry to another. In essence, the firms are flexible to changes and, therefore, can fit in more than one industry. Studies have shown that most perfectly competitive firms do not operate in one industry for their entire life of

Thursday, October 17, 2019

PR & Corporate Communication Essay Example | Topics and Well Written Essays - 2500 words

PR & Corporate Communication - Essay Example There are various lines of thoughts that can be induced from this performance based on the views by the stakeholders. The communication of such information to the public and the perception of stakeholders have various implications on PISA, such as brand building, perception of the product, value of the program, trust and awareness of the program (Gehrt, Moffitt & Carlos 2010). This essay will focus on three frames that have been brought forward by education stakeholders in the UK. These are, first, the PISA results are contributed by the outstanding performance of UK in history. Secondly, the performance is viewed as dismal because of the continued average performance. Finally, the results are viewed as wrong and do not represent the actual state of education in the UK. Before addressing these frames, let us look at the objectives of this PR and corporate communication strategy. This PR and corporate communication strategy endeavours to facilitate the communication of information relating to the performance of United Kingdom in the global education quality ranking. The stakeholders in education have mixed reactions to such performance. The mode in which this information is communicated influences the response by these stakeholders. Therefore, a focus will be given to the opinions raised by the stakeholders. In particular, it shall focus on the influence of history on the current performance. Secondly, it will try to bring out results as a low stoop for the United Kingdom and lastly, it shall look at the results as flawed and does not represent the state off education in UK. The strategy also endeavours that information is passed to the audience in a clear and unbiased way. In addition, it will facilitate the incorporation of the concerns of stakeholders in the education sector such as the government, parents, students, and educators among others. Next, the role of the stakeholders has been put into

International Financial Markets Essay Example | Topics and Well Written Essays - 2000 words - 5

International Financial Markets - Essay Example Furthermore some countries have ended up losing their investment status of grade. This incident has placed the international investors in alert. Even before the downgrading of the first country into a grade of non-investment, the stock market was down, and some countries even become close to lose their access to capital market. As a result of this the European politicians directed their blame to the crediting rating agency of making thee debt crisis worse. Since 2011, the agency of rating has to regularly register with the European Security and Markets Authority (ESMA) which is also mandated with the further preparation of the legal action (Moloney, 2011). This regulation shows that the rating of credits have some control on the capital market. Some of the money market issue that was affected by the crisis that is to be discussed in this paper includes the macro-financial risk, intra-euro area financial flow, and collateral availability. In most of the countries in euro the deposits owned by the domestic banks were stable between 2010 and 2011. However the domestic banks in Ireland and Greece heavily fell. Ireland and Greece were not in a position to replace the deposits that were lost with other market borrowing or wholesale and the gap that existed by borrowing from their central banks (Whittaker, 2011). The relocation of the market money into the central bank balance sheet caused an inter-central bank debt that was very high within the system of the euro. Inter-commercial bank lending is a means of transferring money from area which have surplus to areas deficit areas (Friedman & Schwartz, 1970). For example if funds is withdrawn from the Greece bank and placed in the bank of Germany, this withdrawal will leave the Greece bank with deficit of money while the Germany bank will be in surplus of money. In the market condition that is normal, the

Wednesday, October 16, 2019

PR & Corporate Communication Essay Example | Topics and Well Written Essays - 2500 words

PR & Corporate Communication - Essay Example There are various lines of thoughts that can be induced from this performance based on the views by the stakeholders. The communication of such information to the public and the perception of stakeholders have various implications on PISA, such as brand building, perception of the product, value of the program, trust and awareness of the program (Gehrt, Moffitt & Carlos 2010). This essay will focus on three frames that have been brought forward by education stakeholders in the UK. These are, first, the PISA results are contributed by the outstanding performance of UK in history. Secondly, the performance is viewed as dismal because of the continued average performance. Finally, the results are viewed as wrong and do not represent the actual state of education in the UK. Before addressing these frames, let us look at the objectives of this PR and corporate communication strategy. This PR and corporate communication strategy endeavours to facilitate the communication of information relating to the performance of United Kingdom in the global education quality ranking. The stakeholders in education have mixed reactions to such performance. The mode in which this information is communicated influences the response by these stakeholders. Therefore, a focus will be given to the opinions raised by the stakeholders. In particular, it shall focus on the influence of history on the current performance. Secondly, it will try to bring out results as a low stoop for the United Kingdom and lastly, it shall look at the results as flawed and does not represent the state off education in UK. The strategy also endeavours that information is passed to the audience in a clear and unbiased way. In addition, it will facilitate the incorporation of the concerns of stakeholders in the education sector such as the government, parents, students, and educators among others. Next, the role of the stakeholders has been put into

Tuesday, October 15, 2019

Young Entrepreneurs Essay Example | Topics and Well Written Essays - 500 words

Young Entrepreneurs - Essay Example This project also aimed at providing light to school going children from poor families who could not stand the smoke of the local kerosene lamp. The idea of developing the solar-powered lantern was originally presented by Wadongo at a local congress of young innovative youth’s forum in Kenya and was picked as a promising one with the potential to solve a problem in the community (Arrillaga-Andreessen, 2012). Wadongo did a lot of his research on the design and the sizes that most suited the targeted population. Through his various attempts to design a sustainable product that would not only last for long but also provide a cleaner source of energy, he came up with something that has been appreciated worldwide. His bight idea that only started in a small village in Kenya has now been recognized worldwide on various forums (Arrillaga-Andreessen, 2012). According to the locals, Wadongo’s project is one that has helped more children go back to school and the impact is felt almost immediately. The performances have increased in most schools that have adopted the use of the Solar-powered lantern. According to Wadongo, his project hasn’t reached its peak yet with several additions intended to be made. He wants to extend the scheme to cover more areas in the country, and at the same time sells his solar tapped power to major towns. He says that this approach will work best for him due to the frequent power blackouts experienced in those towns. His idea was driven by the fact that 90% of the country’s power is generated from hydro-power stations and the need for other reliable means of power generation was needed. According to Wadongo, the current power rates in the country are very high, and the consumers will welcome any form of cushioning. With the rates currently at Ksh 75 per kW unit, he intends to produce up to a total of 1000 kW for different premises.  Ã‚  

Most Violated School Policies Essay Example for Free

Most Violated School Policies Essay The formation of character is one of the most important features of the educational system at the University of Baguio. For this reason, the imposed discipline, while observant to the rights and feelings of others, is firm, especially when the reputation of the student body and institution is at stake. Students are expected to manifest both within and outside the University, the respect for order, morality, personal honor, and rights of others, which is required of God-fearing men and women. (UB student handbook, Article XIV: 2010 Edition) Schools have policies that are being implemented for the general welfare of its constituents. These policies provide a set of rules that the students, teachers, etc. should follow. These rules are necessary for the order and uniformity of the students within the school premises. Even with the presence of these rules, some of the students violate them disregarding the sanctions that go along with it. The word policy originated from the Latin word politia or polity. Defined as a definite course of action adopted for the sake of expediency, facility, etc.; an action or procedure conforming to or considered with reference to prudence or expediency. (http://dictionary.reference.com/browse/policy) Educational policies are significant because these are rules that are used in schools to discipline students. These rules determine how effective and efficient the school is in managing students and personnel. The policies have great influence in the quality of education in an area. Educational policies are important because effective policies can help students in school on their day to day activity. For a policy to become effective, it must have a well-pronounced outcome, assumptions should be clear and explicit, linkage to organizational direction must be present, due process in the development has to be observed, the priority should be on the public interest, expectations have to be made, the policy must be both efficient and effective, results should be stated in measurable terms, evaluation of results should be capable, funding and allocation of resources must be appropriate, accountability should not be vague, it should be lawful and administered, it must be based from history, ideas have to be verified before implementation, and the policy results should be well stated. (http://manuals.ucdavis.edu/resources/coordinators.htm) One of the factors why students violate school policies can be explained through their different behaviours. Behaviour is the manner of behaving or conducting oneself; the aggregate of all the responses made by an organism in any situation. (http://dictionary.reference.com/browse/behavior) Based on Operant Conditioning of B.F. Skinner â€Å"All behaviour caused by external stimuli and all behaviour can be explained without the need to consider internal mental states or consciousness.† It means that the actions done by students are responses to its environment. (http://www.learning-theories.com/behaviorism) Another type of behaviourism is Radical Behaviourism which is the connection to role of emotions and the major differences in the acceptance of mediating structures and etc. In order to resolve this problem the group found out that the best solution is the use of Biometric identification systems which can be grouped based on the main physical characteristic that lends itself to biometric identification. There are different kinds of biometric system in which the fingerprint biometrics is the commonly used one. There are also other biometric identification systems such as the hand geometry, palm vein authentication, retina scan, iris scan, face recognition, signature, and voice analysis. There are biometric systems that are composed of more than two physical characteristics to be identified. Statement of the Problem 1) What are the reasons why these students violate such policies? 2) What are the most common policies that are violated by the violators? 3) How can the proposed biometric ID system control students from violating the wearing of ID? Scope and Delimitation This proposal was limited only to the students of the University of Baguio including the administrative staff, teachers, faculty and utilities. Significance of the Study With the help of this proposal, the University of Baguio would be able to control every entrance and exit of the school. The act of not wearing IDs for the students would no longer be possible because they will not be able to enter the school without their IDs. The biometric ID system would strengthen the security of the academe for the safety of the students. The time when the students would enter and leave their classes would be monitored. The system would be able to determine if the students will skip their classes. Also, the entry of thieves and pick-pocketers within the school premises would no longer be possible due to this proposal. With this modernized system to be established in the University, all of the students and personnel of the school will benefit from it. FRAMEWORK The leniency of the marshals in checking the ID’s and proper wearing of uniforms, students not following the rules and regulation of the school and to monitor the entrance and exit of the students of University of Baguio within the school’s vicinity are the reasons why the researchers proposed an ID Biometric System. The students violated the above mentioned rules due to leniency, habitual actions of students, laziness, and unwanted behaviours of students. Some students just wanted to violate such policies because they thought that it was a fun and interesting thing to do. If the proposed project will be fully implemented, there will be organization in the school campus and an effective monitoring of the passage ways in entering and going out of the school. Based on these factors that we have retrieved on the data that we have collected, the theory that would best support our proposal is the belief theory. We chose this theory because we, the researchers, believe that the proposed biometric ID system will work and we will therefore translate these beliefs into action. The researchers foresee that this would be able to control the reoccurring problems that are being done by the University of Baguio students and that is the reason why we have made this very proposal. DEFINITION OF TERMS * Biometric – pertaining to, noting, or using a person’s unique physical and other traits for the purpose of identification and security. * Coincide –to occupy exactly corresponding or equivalent positions on a scale or in a series * Identification – psychological orientation of the self in regard to something (as a person or group) with a resulting feeling of close emotional association. * Implementation – the act of implementing, or putting into effect. * Policy – a definite course of method of action selected from among alternatives and in light of given conditions to guide and determine present and future decisions. * Proposal – An act of putting forward or stating something for consideration. * Scanner – a device sensing a recorded data. * System –a group of devices or artificial objects or an organization forming a network especially for distributing something or serving common purpose. * Units – a piece or complex apparatus serving to perform one particular function ASSUMPTION The group assumed that if the proposal is to be approved by the Board of Directors, it would be implemented immediately. The ordered units will be put up to the designated areas and the Biometric system will start functioning. With the new system of the school, there will be an organization in school activities. The school then will be a safe and humane place to study. CHAPTER II REVIEW OF RELATED LITERARTURE I. EXECUTIVE SUMMARY In the millennial years rapidly advancing technological world, the issue of security is becoming a more and more pressing matter. Computer crimes and identity theft related crimes are becoming more rampant and apparent, requiring better solutions to cope with them. One of the proposed methods for solution for future high-technology security issues lies in the field of biometrics. Biometrics defined simply in its regard to security matters is any method or technology which uses biological measurements to facilitate authentication for verification or identification of a particular user. Although still in major phases of development, biometrics is seen as a highly valuable initiative to one day replace present day security authentication practices due to its ideal concept of being virtually risk free and non-inaccurate. This paper will analyze all aspects concerning biometrics including its overall concept, how a biometrical authentication system works, controversial issues concerning its implementation, its current uses in technology, business, and governmental agencies and its future developments. II. CONCEPT OF BIOMETRICS IN SECURITY A. TWO CATEGORIES Biometrics can be subdivided into two main categories. These include physiological and behavioral categories of specific measurements. Physiological measurements include biological characteristics inherent to individual human beings. Some of these would include facial structure, fingerprints, hand structure, iris and DNA structure of a particular person. Behavioral measurements measure dynamics in individual behaviors. Some of these would include keystroke behavior, signature and voice recognition. B. VARIOUS METHODS FOR COLLECTING MEASUREMENTS FACE: Facial recognition involves technology which scans the face and interprets the data as recognizable characteristics of a particular user, including the size and shape of the face and their relationship to each other. Facial recognition is a natural method that humans use to identify people they come into contact with, but it is not an easy method to duplicate for identification on a biometric system. This is due to changes such as plastic surgery, weight gain or weight loss which can cause the results to be inaccurate. Another emerging method of collecting biometric information involving the face is facial thermograph which detects and measures the heat patterns created by the branching blood vessels within the face and emitted through the skin. FINGERPRINT: Fingerprint analysis has been around for centuries as a means of identifying people. It has been evidenced that ancient Chinese used fingerprinting to sign legal documents as long ago as 1000 BCE. Fingerprint analysis involves examining the ridges on an individual fingerprint in order to match them to a specific owner. HAND: Hands can be analyzed and measured in a few different ways. Aside from fingerprints, another way to use hands in biometrical analysis is through hand geometry which measures and compares the different physical characteristics of a persons hand such as shape and size. Another method concerning hands is palm vein authentication which uses an infrared beam to penetrate a persons hand and measure the complexity of the vein patterns within that persons hand. This specific method is more useful than hand geometry measurement because palm vein patterns are internal to the body, and difficult to be counterfeited by an illegitimate user. EYES: Eyes can be used in two different ways as a part of a biometrical scrutiny process. Iris scanning involves analysis of the rings, furrows, and freckles in the pupil of the eye of a particular human. Retina scanning involves analysis of the capillary blood vessels located in the back of the eye. DNA: DNA verification uses analysis of genetic information found within a specific persons DNA code (or genetic code) as a means of identifying that person. DNA analysis is often used now as a method for identifying paternity of a persons child or in forensic crime investigations as a evidence for convicting individuals for crimes such as murder or rape. ODOR SCENT: Odor and scent analysis is a fairly new development in biometrical analysis and is based on a theory entitled individual odor theory. This theory is premised on the notion that each person has a particular and unique scent. In forensics, odor analysis has been used to identify people by the use of blood hounds (dogs). VOICE ANALYSIS: Voice analysis involves analyzing of the pitch, tone, cadence, and frequency of a particular users voice to facilitate authentication. Voice analysis can technically be seen as both a physiological trait as well as a behavioral trait because voice is not only inherent to a specific person, but also the way that person speaks is also a unique and measurable trait. SIGNATURE: Signature analysis analyzes the way a person writes his/her signature as a basic means of identification. Although handwriting techniques vary for individuals throughout their lifetimes, handwriting identification is seen as a scientifically reliable criterion for measurement. KEYSTROKE: Keystroke analysis measures the dynamics of a persons typing rhythms to facilitate authentication of a particular person. Keystroke analysis may be more useful than other methods of identification because unlike other biometrical authentication methods, keystroke dynamics can still be measured throughout the computer session even after the access control point has been successfully passed by the user. GAIT: Another new developing biometrical technique is one which measures gait which is a persons particular way of walking and facilitating motion. Gait can be used effectively to recognize people coming in from a distance. COGNITIVE BIOMETRICS: Cognitive biometrics is also a developing method in biometrics which uses measurements of brain activity responses when triggered by specific stimuli and matched within a computer database as a means for authentication of a particular user of the system. Currently, systems which utilize this kind of method are being created to trigger responses to odor stimuli. In the future, other triggers may be used to create responses. C. PARAMETERS Given the various methods for collecting biometrical data, each of these techniques must pass a set of parameters to a degree in order to be considered as a viable method for integration within a biometrical system. These parameters include: UNIVERSALITY: The principle of universality stipulates that every user should have the characteristic. Sometimes, in some cases this may not be true as it the case of a person with no hands who cannot use a hand analysis machine for verification. UNIQUENESS: The principle of uniqueness involves the degree of how separable the biometric characteristic is between each individual person. PERMANENCE: The principle of permanence involves how well the technique used for measuring is resistant to changes such as aging, human developmental processes such as pregnancy, or things such as plastic surgery. COLLECTABILITY: The collectability principle is related to how easy the method is to acquire. Easier methods, as well as more sanitary methods are more ideal for a viable biometrical system. PERFORMANCE: The performance principle is concerned with the accuracy, speed and the strength of the technology used to authenticate the user. ACCEPTABILITY: The acceptability principle is related to the degree of social approval for use of the technology as a means for collecting biometrical data. CIRCUMVENTION: Circumvention involves, the biometrical systems ease of adaptation to a substitute should the system need one. 1. COMPARISON OF VARIOUS METHODS WITH PARAMETERS (Based on the Comparison of Various Biometric Technologies table by A.K. Jain, et. al. 2004) FACE: Facial scanning has a high level of universality because it is virtually impossible for any living human-being to possess no form of a face. Facial scanning scores low in its level of uniqueness due to the fact that it can be difficult to distinguish characteristics from person to person at times. This is due to some people having similar features which may be hard to distinguish. In the case of identical twins, this may not be a useful means for authentication at all. Facial scanning scores a medium ranking under the permanence factor. This is due to the fact that although a persons actual facial characteristics never change, they are subject to transformations such as aging, weight gain or loss, and alterations such as plastic surgery or accidents. As far as collectability, facial scanning scores a high mark due to the fact that, going along with its high level of universality, every living human-being does have a face which is easy to locate on a human body. Facial scanning is low in performance because it can tend to be highly inaccurate due to the dynamical aspect of human faces. Facial scanning also scores high in acceptability as a comfortable and accepted way people would want to collect their biometrical data, but it scores low in circumvention because it doesnt have an easy substitute which can replace it. Facial thermograph scores high in universality, uniqueness, collectability, acceptability, and circumvention. It scores low in permanence and medium in performance. FINGERPRINT: Fingerprinting scores medium in its level of universality. This is due to the fact that although all people inherently possess fingerprints at birth, fingerprints can still be damaged via rare skin diseases or through loss of fingers, abrasions, etc. Fingerprinting has a high level of uniqueness and a high level of permanence. Fingerprinting has a medium level of collectability and performance due to the fact that although it is easy to acquire for measurement, there is a 5% failure to enroll rate which exists for everyone even with good sensors and analysis software. Fingerprinting has a medium level of acceptability by the public as a means for collecting data. This is because although it is an easy method of measurement, it may be unhygienic, inaccurate as well as easy to duplicate unlawfully. Fingerprinting has a high level of circumvention due to its ease of adaptation to a substitute if deemed necessary. HAND: Hand geometry scores medium in its universality, uniqueness, permanence, performance, acceptability, and circumvention. Hand geometry scores high in its collectability aspect. Hand vein analysis also scores medium in universality, uniqueness, permanence, collectability, performance, and acceptability; but it scores hi gh in circumvention. The overall reason why hand analysis carries a medium ranking in virtually all the parameters listed is because of a human-beings ability to live without them. EYES: Eye analysis provides for a more accurate analysis approach in a biometric system. Iris scanning scores high in universality, uniqueness, permanence, performance, and circumvention. This is due to the complexity and exclusivity of iris patterns which does make them a better choice method of biometric authentication. Iris scanning received a medium score in collectability and a low score in acceptability due to the complexity of the method and its suitability to the general masses. Retinal scanning also received similar scores, scoring high in universality, uniqueness, performance, and circumvention; receiving a medium score in permanence, and low scores in both its collectability and acceptability. DNA: DNA analysis has split results, scoring high in universality, uniqueness, permanence, and performance, and scoring low in collectability, acceptability, and circumvention. Although DNA can be extracted from a numerous amount of different ways, a method of extracting DNA in order to be used in a biometrical authentication system cannot be done without seeming invasive or unsanitary. Also, many people may be concerned with privacy matters concerning DNA analysis. ODOR SCENT: Odor and scent analysis scores high in universality, uniqueness, and permanence. Although scents can be masked by deodorants, fragrances and lotions, the underlying biological scent of a person cannot be concealed. Odor analysis also scores low in collectability, performance, and circumvention, with a medium score in acceptability. VOICE ANALYSIS: Voice analysis scores medium in its universality and collectability. It scores low scores in uniqueness, permanence, performance, and circumvention, making it not an ideal method for use in a biometrical system. This is because not only does a persons voice change throughout time, but people can knowingly change their voice or use technology to change their voice (such as a recording) in order to dupe a system. Voice analysis scores high in acceptability due to the simplicity of the method. SIGNATURE: Signature analysis scores low in universality, uniqueness, permanence, performance, and circumvention. It scores high in collectability, and acceptability. Signature analysis may not be an ideal method for authentication because although graphology experts can distinguish identities through meticulous handwriting analysis, it may be more difficult for a biometrical system to accurately analyze differences in handwriting for each individual person. This is because a persons handwriting can change depend on various things such as the mood of the person. Also some people may write similarly or use forgery to try to dupe the system. KEYSTROKE: Keystroke analysis is another method which may be seen as not as reliable as some of the other methods for collecting biometric information. Although it has the advantage of being able to simultaneously authenticate a user while he/she is still within the work session, keystroke analysis scores low for universality, uniqueness, permanence, and performance. It also has medium scores for collectability, acceptability, and circumvention. This may be due to the behavioral aspect of typing which can be easily changed if a person learns to type in different ways. GAIT: Gait scores medium in universality and circumvention. Gait has low scores in uniqueness, permanence, and performance. Gait also has high scores in collectability and acceptability. Of all the various methods for collecting biometric data, some of the most reliable methods (according to the table by A.K. Jain et. Al) are iris scanning, retinal scanning, facial thermograph, fingerprint analysis, and DNA analysis. Some of the least reliable methods are keystroke analysis, signature analysis, and voice analysis. Overall, it appears that physiological data is seen as a more reliable method for collecting data than behavioral data. III. BIOMETRIC SYSTEM A. BIOMETRIC SYSTEM A biometrical system although seemingly complicated, has only two main steps, regardless of the methodology or the technology used to facilitate it. The system begins with a process called enrollment which is when the biometric information from individual users is collected and stored within a database and translated into a code or graph. In some instances data may be stored on a smart card which can be carried away with the user. The next operation of the biometrical system is called testing. During this portion of the system, biometrical data is detected and compared with that which is in the database. In order for a biometrical system to be robust, it is necessary that the storage and retrieval of data within the system be highly secured. (http://upload.wikimedia.org/wikipedia/commons/thumb/3/3c/Biometric_system_diagram.png/800px-) A biometrical system can carry out two main functions. These include verification or identification. In verification, the systems objective is to authenticate the user in conjunction with another method such as a smart card, a username, or a password. With identification, the systems intention is to authenticate the user only on the basis of the biometrical data alone. The goal of this function is to identify the user according to the closest match within the allowable limit of the system. B. PERFORMANCE MEASUREMENTS The performance of a biometric systems technology can be broken down into a variety of probability descriptions. These descriptions indicate the level of accuracy the system is able to achieve. FAR- The first measurement is entitled False Accept Rate. This measurement determines the likeliness of a biometric system incorrectly accepting access to the system by an un-authorized user. This measurement is calculated by dividing the number of false acceptances by the number of times an identification attempt has been made. FRR- The second measurement is called a False Rejection Rate which measures the probability that a biometric system will incorrectly reject an authorized user from using the system. This number is calculated by dividing the number of false rejections by the number of authentication attempts. EER- Equal error rate stands for the rate at which FAR and FRR are equal. This measurement can be used to compare two different biometric systems. Whichever biometric system has a lower EER is considered to be a more accurate system than the other. ROC- Receiver operating characteristics deals with the systems accuracy within certain environments as it relates to False Rejection and False Acceptance Rate results. FTE- FTE stands for failure to enroll rate. This measurement is calculated as a percentage of the data which failed to pass through the system due to invalidity. Failure to enroll typically happens when the sample data is of poor quality and does not match the data which is stored in the database of the system. FTC- FTC is the failure to capture rate. This measurement measures the probability that the system will fail to pick up on a biometric characteristic when it is presented accurately. High calculations of this measurement typically mean that this authentication method will be difficult as well as frustrating to use. C. SUSCEPTIBLE AREAS OF ATTACK FOR BIOMETRICS The three most susceptible areas of vulnerability for attack of a biometric system are: 1) Copied-biometric attacks- where the attacker obtains a substitute for the true biometric sample in order to cause proper authentication to occur via the normal system procedures. 2) Replay attacks- where perpetrators obtain valid templates from the original user and then use them to directly dupe the biometric system. 3) Database attacks- where perpetrators access a template database and obtain the ability to replace valid templates with invalid ones. IV. ISSUES WITH BIOMETRICS A. IDENTITY THEFT ISSUE Although the ideal goal of biometrical authentication is to have ultimate prevention of identity theft, the issue of an illegitimate user having the ability to commit identity theft still exists within biometrics and can have even more dire circumstances than with non-biometrical authentication systems. Depending on the method used to collect the biometrical data, a persons identity can be stolen easily. An example of this would be in the case of fingerprints which can be taken from inanimate objects such as glassware or metal objects and then duplicated in order to be used to dupe a biometrical system. The main problem concerning this issue is in the fact that if an individuals identification is stolen by another, the legitimate user may never be able to undo the damage which has been created because, unlike with non-biometrical authentication, once biometrical data has been compromised, it is compromised for the entirety of the legitimate users existence. One proposed possible solution for solving the issue of identity theft is to only use a portion of the biometric data, so that if the data does become compromised, it will not be entirely lost. This way, if one part of the data is stolen, another part of the original users biometric data can be used to replace it. B. PRIVACY ISSUE Privacy can also be a staggering issue with the implementation of a biometrical system from a societal standpoint. Many people may not care to have all of their biological characteristics recorded on some medium for a variety of reasons. One concern is that if information is recorded on systems used at more than one location or by more than one entity, an individuals movements can be tracked preventing anonymity. Safety of the legitimate users can become compromised, if malevolent individuals choose to target that person in order to obtain their goal. Another issue regarding privacy involves physical harm which can be done to an individual using a biometrical system. Physical harm can occur by use of unsanitary instruments used in the technology to obtain the biometrical information, which may cause the system to be considered unsafe. Another issue regarding privacy lies with the administrative ability to misuse users biometrical data without the consent of those users. Currently, few regulations exist to protect biometric information of individuals. C. SENSOR OBSTACLES Different types of technology (hardware software) used within different biometrical systems can counteract one another, making it difficult to have standardized biometrical data. One of the reasons this problem exists is because each vendor of biometrical technology generates their own encryption methods for the recorded information. Unfortunately, many of these encryption methods do not coincide with one another making the use of biometrical systems more difficult and less efficient. The only way unification of the different biometrical systems can occur is by a standardizing process which would require exposing of all the concealed data. Unfortunately, this can also present a serious threat. D. FAILURE TO MEET PARAMETERS Another issue concerning implementation of biometrics is in the issue of a systems failure to meet parameters. In order for biometrical data to be interminable, the biological characteristic must be unique, universal, acceptable, collectible, reliable in regards to the performance and circumvention of the technology used to collect the data, but most importantly, the data must be permanent, which is the most fragile issue concerning the parameters of biometrical data. Unfortunately, most if not all biological characteristics are not guaranteed to be permanent. Many of them can be compromised via accidents, health problems or alterations such as surgery. V. CURRENT USES OF BIOMETRICS Although the field of biometrics as a whole is still in need of major development before widespread implementation will ever occur there are some entities including private industry and governmental agencies which currently utilize biometrical technology. Certain examples of American organizations which currently use biometric technology include: 1) Walt Disney World: Walt Disney World uses fingerprint analysis technology to authenticate the fingerprints of guests in order to ensure that season tickets are used by the authorized ticket owner. This is in order to prevent lost sales through ticket sharing, as well as thefts. 2) First Tech Credit Union: First Tech Credit Union is an Oregon based credit union which utilizes keystroke recognition technology for authentication of users on its online website. 3) Casinos: Over 100 American casinos such as the Imperial Palace casino in Las Vegas use facial recognition technology to identify and prevent known cheaters or dishonest patrons from entering into their establishments. 4) Missing Childrens Clearinghouse: A West Virginia based organization entitled Missing Childrens Clearinghouse uses biometric technology which utilizes scanned digital photographs to search for missing children. 5) Citibank Singapore: Citibank in Singapore uses fingerprint scanning technology for customers who use their clear platinum card for point-of-sale purchases. 6) Coca Cola: Coca Cola uses hand scanning machines to replace time cards for employees in order to document worker time keepinsg records. 7) Welfare crack-down: New Jersey as well as six other states use biometric technology to crack down on individuals who abuse the welfare system by claiming benefits in multiple names. 8) Notebooks: Computer products such as the Compaq Armada E500 are being developed to use fingerprint scanning technology to verify the identity of the user. 9) Prisons: Up to 100 American Prisons use biometric technology to regulate methadone dispersement among prisoners. VI. FUTURE DEVELOPMENTS IN BIOMETRICS Since the occurrence of the September 11, 2001 terrorist attacks, a surge in the demand for biometric technology has begun. Stocks in publically trade biometric companies such as Visionics, Viisage Technology, and Indentix have soared with the overall biometric technology industry projected to have revenues approaching $10 billion dollars annually by 2020. Emerging trends for future uses of biometric technology seem to lean more towards law enforcement, homeland security, and security within certain types of private industry such as in airport security or finance. Many credit card companies such as Mastercard and Visa are beginning to implement biometric authentication methods to verify card users. Also, the Immigration and Naturalization Service may begin implementing biometric technologies to identify illegal immigrants. Certain types of biometric technology which are becoming more widespread include access control facial recognition technology which is used to permit only authorized individuals to enter upon certain facilities, facial recognition passive surveillance technology which is used to monitor premises in order to identify possible terrorists or suspect individuals, and alert management which includes the use of real-time technology in association with biometric technology to provide security alerts of potential security breaches. Applications which use biometric technology will also have an effect on commerce, particularly in e-commerce to provide extra security for online purchases, and installation within certain personal items such as cars and cell phones. VII. CONCLUSION Although not that long ago, the concept of having biometric technology as a part of our mainstream society may have been seen as a science-fictional impossibility, technological innovation has grown to the point where it is becoming more and more of a reality. Although we are not quite ready for widespread implementation of this technology, as the need for better hi-tech security increases, research as well as investor and consumer confidence and innovation within the biometric industry is also expected to improve. Although no single biometric system method is without flaws, combinations of these various methods and technologies may provide the ideal security that we hope to attain one day. CHAPTER III METHODOLOGY There was difficulty in determining the real students of the University of Baguio because of the hard-headed students who cannot abide with the simple rules and regulations which was the reoccurring problems of the security. Due to this problem, the â€Å"mandos† and â€Å"magnas† can easily enter the school’s premises victimizing a lot of students. This was one of the reasons why such simple violations became a huge problem for the school. Regarding this matter, the group came up with an idea for a topic for their action research. Before they finalize their topic, the group went to the Office of the Student Affairs and interviewed the dean to know which rules are commonly violated by the students. After the interview, the group determined that the rules which are commonly violated are: a) wearing of I.Ds inside the school campus; and b) wearing of uniforms on the designated days. The group then convened and finalized their topic that would focus on â€Å"A proposed Biometric ID system to control the reoccurring violations by University of Baguio students.† Since there was already a topic to be talked about in the research, the group started to gather data which were relevant to the research proper like that of related studies and researches and terms that are significant to the study. After collecting relevant information for the research, the group prepared communication letters addressed to the deans of the different schools of the University and respondents likewise with the survey questionnaire. Upon approval of the deans of the different schools, the group administered the questionnaires to the respondents. The survey forms were distributed to the eleven schools of the University having ten (10) respondents each to see which results have the same percentage which were used to know the reasons behind these actions. After distributing the survey questionnaires, the group then retrieve the questionnaires and start tabulating the results. The tabulated data showed the reasons why the students violate these simple policies of the school. The result of the survey supported the proposal that were passed to the Board of Directors. The group then proposed the biometric ID system that will be put up in every entrances and exits of the buildings in the University. The biometric ID system will most likely be very costly but disregarding such amount, the administration will approve it and immediately ordered the said system. By the time the systems that had been ordered arrive, the people designated by the higher ops will put up such systems on the designated areas to make the University a safe and humane place to study. CONCLUSION In light of the findings, the following conclusions are hereby presented: Not wearing of ID has been a habit of the students. Sometimes the teachers themselves forget to check their students ID. The security guard also are not lenient in checking the IDs of these students. Because of this attitude most number of the student no longer uses their IDs. The students think that it is just fine not use their IDs. The researchers are found out that the school really need a biometric ID system. Approximately, one unit of the biometric system will cost more or less two hundred fifty thousand pesos. In such case the University of Baguio can still afford this system since it does not only help the students but it can also secure their safety With the help of this proposal it will lessen the burden of the security personnel. This proposal can also lessen the number of students violating the proper use of IDs. In such situation students can no longer use any ID because of the presence of finger prints. The students whether they like it or not would still be forced to use their IDs. Also, this proposal can help in the security of the school campus because outsiders can no longer come in because of the presence of finger prints. RECOMMENDATION Drawing from the conclusions that the researchers arrived at, the following recommendations are forwarded. The researchers would recommend the strict implementation of the rules and regulations of the university and the maintenance of the biometric ID system. In addition, each of the gates should be closed. Also, the lenient checking on the wearing of IDs should be done. The guards should monitor every student entering the university. In case the students lost their IDs, we recommend that a password that would allow them to enter would be provided by the OSA during the time of the ID’s loss. BIBLIOGRAPHY BOOKS * Addiction Today, Sept. 27, 2008. Prisons Use Biometrics to Manage Methadone. * Germain, Jack M., Sept. 11, 2003. Beyond Biometrics: New Strategies for Security. * New York Times, Nov. 15, 2008. Technology and Media, a Surge in the Demand to use Biometrics. * Osborn, Alice, Aug. 17, 2005. Future of Biometrics-Trends and Emerging Uses for Biometric Technology. * Panko, Raymond R., Corporate Computer and Network Security. New Jersey: Prentice Hall, 2004. * Risk Management, Mar. 15, 2005. Biometrics: The Future is Now. * Technology and Human Values Senior Seminar, 2008. Biometrics. * Tilton, Catherine J., Feb. 2006. The Role of Biometrics in Enterprise Security. * Wikepedia, Nov. 13, 2008. Biometrics.† ONLINE * http://www.addictiontoday.org/addictiontoday/2008/09/prisons-use-bio.html. * http://www.ecommercetimes.com/story/31547.html?wlc=1226777438 * .http://query.nytimes.com/gst/fullpage.html?res=9F06E0DB163EF934A25751C1A9679C8B63sec=spon=pagewanted=1 * http://www.video-surveillance-guide.com/future-of-biometrics.htm * http://www.riskmanagementmagazine.com.au/articles/FF/0C02DDFF.asp?Type=124Category=1240 * http://www.dell.com/downloads/global/power/ps1q06-20050132-Tilton-OE.pdf . * http://en.wikipedia.org/wiki/Biometrics#cite_note-jain_short_article-20 .

Monday, October 14, 2019

The Grammar Translation Method Community Language Learning English Language Essay

The Grammar Translation Method Community Language Learning English Language Essay We have learnt about different teaching approaches during the lecture. The examples of approaches are the direct method, grammar translation method, the silent way, community language learning, communicative language teaching, total physical response and many more. I have chosen the grammar translation method and community language learning as for this report. According to Random House Unabridged Dictionary, grammar translation method means a traditional technique of foreign-language teaching based on explicit instruction in the grammatical analysis of the target language and translation of sentences from the native language into the target language and vice versa. Community language learning means a method of teaching a foreign language that uses small groups and other ways of reducing students anxiety. There are advantages and disadvantages of both approaches. Both approaches are also relevant to use in the current Malaysian Education system. Generally, the grammar translation is derived from traditional approaches to the teaching of Latin and Greek in the nineteenth century (Barb, 2010). Even though the method has been used a long time ago, this method is still useful to our current education system. According to Richard and Rogers, 2002 (as cited in Barb, 2010), the grammar translation method is a way of studying a language that approaches the language first thought detailed analysis of its grammar rules, followed by the application of this knowledge through the task of translating sentences and text into and out of the target language. The first advantage is that grammar rule is taught deductively. This means that the pupils are taught about the grammar rule and then they have to apply to the new examples. It is important for the pupils to learn about the grammar rule of the language. This will make them use and apply the language better. They can lessen their mistake when they know about the grammar rule. They also wi ll be able to explain about the grammar rule of certain words when they have the knowledge. Next, translation is the easiest and shortest way to understand English. This is because most primary school children do not familiar with this language. They can only understand their mother tongue. So, by teaching English using the mother tongue, the pupils manage to catch up with their study better. Translation is needed to teach the children. The usage of mother tongue is very important for the pupils in learning English in the early year. This is to make them understand better. For example, if we talk using English during lesson, the pupils may not be able to understand a single thing during the lesson. By using the mother tongue during the lesson, the pupils also do not have any problem in understanding and responding to the teacher. So, there is interaction happen in the classroom. The communication between the pupils and the teacher does not cause any problem. Translation is very important element in learning English for these children. The other advantage is the pupils have been introduced to the literature texts during the early years of their study. It is a good sign that the pupils learn about literature during the lesson. When they have learnt about the literature texts, they manage to interpret the literary passages well based on their experience during the learning process in the class. They can show their understanding in literature by managing to interpret the literary texts. There are also disadvantages of this method. The first disadvantage is less participation from the pupils. This method is teacher-oriented. The teacher has the full authority to control the class. So, the inputs of the learning are given by the teacher from the beginning of the lesson until the end. The pupils job in the class is to hear to the teachers instruction without questioning anything. They are like silent learners. There is no discussion or sharing opinion occurs during the lesson. As a result, the pupils cognitive skill and critical and creative thinking will not develop. Not only that, the teacher also is the one to decide whether the pupils answers are correct or not. If the pupils do not manage to get the correct answers, the teacher will give the correct answers to the pupils. The teacher does not even try to give the pupils another chance to answer to the questions. They will not become autonomous learner. This is one of the teacher-centred methods in the learning pro cess. These skills are required for the pupils to develop so that they will be able to understand their learning better and manage to do well in their study. Not only that, the other disadvantage is little or no attention given to the speaking skill. According to Brown (2001), it does virtually nothing to enhance a students communication ability in the language. This is because they only do the reading and writing during the class. The pupils are not exposed to any other skills in learning like listening, speaking and writing. These skills are vital for the pupils in their learning. By learning a lesson with these skills, they will be able to understand the lesson and manage to complete all the works given by the teacher. If this situation continuously happens, it will promote to the boredom to the pupils. This is because they keep on doing the same thing during the lesson. Primary school children always like to have fun and doing fun things. When they are doing the same thing durin g the lesson, the tendency for them to withdraw from the lesson is higher. As a result, the lesson process will not progress well. The disturbance that occurs will interrupt the learning process. They will also disrupt other students who wanted to learn. Besides that, the teaching using this method is against the natural way of learning a language. The natural order of learning a language is listening, speaking, reading and writing (Purwarno Hadinata, 2006). Through this method the pupils are to ask to read texts and literature texts during the lesson. This method is unnatural method. Even though the primary school children want to learn about their mother tongue language while they were young, they still have to listen to the other peoples words before they can speak out the words. It is hard for them to learn about English which is not their mother tongue through reading. They will not understand the sentences or words through reading. The last disadvantage of grammatical translation method is much vocabulary is taught in the form of lists of isolated words. The teacher gives the meaning of single words instead of the meaning of the sentences or phrases. For example, the teacher gives the meaning of the word happy in the mother ton gue. The pupils only know the meaning of the word happy. There are also other words that related to the word happy like happiness, happily and many more. When reading sentences that have the word happiness, the pupils may become confused. This is because they only know the meaning of the word happy. This method is relevant for the rural area pupils. This is because using this method; the teacher does not has to use any high-tech teaching aids. High-tech teaching aids such as LCD (liquid crystal display) projector can be quite bothersome sometimes. The teacher just has to use the textbooks as the main resource in the classroom. Furthermore, in rural area, the high-tech teaching aids are rarely found there. Sometimes, the electricity resource is not enough for them. There are some places in rural areas that do not have water and electricity resources. So, textbooks are the important resources in the classroom. Other than that, the target language is translated into the mother tongue. So, the rural area pupils will be able to understand English well when the words are translated. This is because many of them do not capable in understand and using English. They are not exposed to this language since they were little. When they entered school, they have to learn about this language a s a second language and they are very new to this language. Translation using the mother tongue is very essential for them. This can build their interest towards the language. Even though they find it hard learning English for the first time, as the time goes by the interest towards the English language will be developed. Since this method is teacher-centred, the pupils can depend on the teacher to learn English. They have no one to teach them English at house compared to the pupils who live in the urban area. The other approach is community language learning. This method is also known as counselling-learning. Basically, community language learning is based on the student-centred. The pupils will become autonomous learners. In this method, teacher acts as the counsellor while the pupils as the clients. The pupils are asked to sit in a close group of six to ten persons. They have talk about anything they like and the teacher has to be outside the circle. The pupils also have the chance to choose their own topic. They are given the time to brainstorm the ideas. The most important thing is their discussion will be recorded. Besides that, during the discussion, the pupils can also talk using their mother tongue and the teacher will translate for them the actual sentences. At this point, the pupils are responsible for their own learning. They have to be more confident to have the conversation among the members in the group. The recorded conversation will be shown to the pupils in order to impro ve their abilities in the English language. Even though this is student-centred approach, the teacher plays a vital role in this method. Teacher plays the role as he facilitator and guider for the pupils during their learning process. The second advantage is it will boost the pupils speaking and listening skills. When the pupils use this method for the first time, they may feel a bit of awkwardness during the conversation. When they are used to this method, the feeling of awkwardness will disappear. They will find this method enjoyable and fun. This is because the topic is not specific by the teacher. The pupils have the freedom to choose the topic for themselves. Thus, their speaking and listening skills will be improved. They will be able to use the language without any worry. They are not afraid to make mistakes when speaking. As a result, they have the confident in using the language. The other advantage of this method is encourage teachers to see their students as whole persons, where their feelings, intellect, interpersonal relationships, protective reactions, and desired to learn are addressed and balanced (English Raven Educational Services 2007). This method is also a part of humanistic approach in the language learning. This is because it will help the teacher to understand their pupils emotions or feelings. When the teacher is able to understand the pupils feelings, the teacher will be able to help them in their learning. It also encourages the teacher to know more about their pupils. So, the teacher is capable to fulfil the pupils needs in their learning. The pupils learning process will run smoothly. The last advantage is it will enhance the relationship between teacher and pupils. According to Joyce, Calhoun and Hopkins (2002), this model emphasizes the partnership between students and teachers. The teacher will help the pupils to translate the sentences that the pupils produced in their mother tongue. This is because the pupils will seek for their teachers help whenever they need the help. So, the teacher will always ready to help the pupils outside the circle. The relationship between the teacher and pupils will become closer. It can also decrease the pupils anxiety while doing the conversation in the group. This is because they manage to build trust among themselves. They are able to support each other during the conversation. Teacher can also help the pupils to overcome their negative feeling towards English by turning them into positive energy to further their learning. Teacher can encourage the pupils to speak English. The teacher can also praise the pupils when they manage to speak English during the conversation. This will motivate them to learn about English. In the class, teacher is responsible to correct the pupils when they make mistakes. Teacher should be able to comfort the pupils during the conversation. Then, the fe ar of learning English by the pupils will disappear slowly. There are also disadvantages in this method. Firstly, this method is time consuming. A lot of time is needed for this method to be progressed successfully. The teacher should be more patient while using this method. The teacher has to give more time for the pupils on their learning process. Sometimes, the learning process will be delayed. In addition, not all pupils will be able to participate in the conversation at a time. Only a few pupils will be participating. The teacher has to follow the time that has been allocated during the lesson. If the learning process has delayed, the teacher has to find some other time to continue with the session. If this method requires a lot of time, the pupils will feel bored when they do not capable to acquire the language. This will lead to frustration to the pupils. Thus, they will lose the interest in learning English as the second language and tend to withdraw themselves from the conversation. Furthermore, it is very hard for the teacher to tra nslate certain sentences for the pupils. This is because there are some classes which have multiracial pupils. They also use different mother tongue language. So, the teacher will find it hard for them. The teacher may not be able to understand every pupil in the class. There are also a few teachers that are not really capable in using the English language. As they continue using this method; it will also lead to frustration to the teachers. The teacher may not be able to help the pupils in their English. So, in order for the teacher to be able to help the pupils, the teacher should be fluent in the mother tongue language and also English. Other than that, some of the pupils do not have the confidence is speaking in English. So they may use a lot of mother tongue in the conversation. This will not improve their English as second language. They are afraid to try to speak in English. They will feel embarrass when their friends laugh at them if they make mistakes. Some pupils may feel rather passive and will not volunteer to speak anything. This is because they have to depend on themselves during the conversation. The teacher will serve as a facilitator and will monitor them during the conversation. They will also feel embarrass when they hear the recorded tape. Some of the pupils may not be able to speak fluently when they know that they are being recorded. They will lose the feeling of security learning English. Even though this method is non-threatening, some of the pupils may find this method threatening. This is when they are not capable to acquire the target language. They may have low self-esteem in using the langu age. The tendency for them not to speak in English during the conversation may be higher. This is because they have to be responsible for their own learning. They have to depend on themselves and the other members in the group. When they are not able to speak using the target language, they will have the feeling of frustration in themselves. This approach is relevant to the secondary school and tertiary level education. This is because this is student-centred approach. They should be able to be responsible towards their learning. They are able to think about the thing that will benefit them. By using this method in learning, the students will be able to become autonomous learner. This is because the current Malaysian education system encourages the students to find their own way of learning. They should not depend on the lecturers that teach them. They have to find other alternatives in their learning. So, by using this method, the students will be able to achieve the aspiration of the current education system. They will also enhance their speaking and listening skills. The order of learning a language is by learning listening and speaking skills first. If they are able to listen to teacher well, they will be able to speak English well. Hence, they will have the confidence in using the target language everywhere. In conclusion, both methods have their own advantages and disadvantages. It depends on how it is being used in the school. In order to make this method successful in the class, teacher and the administration of the school play an essential role.