Saturday, August 31, 2019

The Automotive Industry and Green Awareness

After suffering massive market losses to foreign cars which were considered to be fuel efficient, American automotive industry has reawakened to the green awareness campaign advocated by consumers, which is represent the future of the industry.There has been increased call by the consumers for the American auto industry to develop cars which emits less green house gases to save the environment.The industry has responded by putting efforts on development of electric cars and hybrid plug-in in vehicles to adapt to the market needs and to sustain the growth of the economy.Green technology presents the future and the American automotive industry must grow along this line to compete effectively in the market.With a large segment of their market lost to foreign automakers, the American auto industry and the government in general responded by taking measures to enforce a green auto industry. For example California passed a law which required 2% all the cars sold in the state to have zero em ission which led to the development of the electric cars (Kilkenny, 2006). However, conspiracy between leading auto makers like Ford and the oil industry led to the mysteriously death of the car (Shnayerson, 2006).Realizing that the future of the auto industry is green, the industry has responded by investing in research and design which has seen the development of hybrid and plug-in hybrid cars, electric cars, lithium batteries which will support the future green auto industry, and various innovations in auto components. These inventions are likely to see the end of the use of gasoline powered engines which have been the leading environmental polluter. (Kaho, 2008)The future of the auto industry is green. In order to compete effectively with other auto makers in the world, and ensure the contribution to the industry to economic growth and sustainability American auto industry must continue with their efforts in the development of a green auto industry. (Globe, 2008)The auto industr y green awareness is an important topic of concern to all Americans and the rest of the world. Our country is still the leading emitter of green house gases to the atmosphere and the auto industry has been one of the leading contributors to this emission.Reference:Globe, (2008): Future auto motive industry. Globe Foundation, March 2008Kaho, T. (2008):Â   2008 Washington Auto Show: Technology and green future. GREENCAR.comKilkenny, N. (2006): Who killed Electric Car? Accessed from http://www.reformation.org/who-killed-electric-car.pdf on 4th August 2008Shnayerson, M. (2006): The Inside Story of GM's Revolutionary Electric Vehicle. Random House publishers

Friday, August 30, 2019

Amadou Diallo Essay

Social cognition is the study of how people form attribution or judgments about themselves and the social world from the social information they received from their environment (Chapter Review, 2010). However, it was discovered often marked by apparent errors and biases. People make quick judgment based on their past experiences, hence at times leading to tragic endings. The Amadou Diallo case study was an example of the tragic error which was made by four New York City Police officers. The police shooting of an unarmed man was an act of automatic inferences which happens when people use mental shortcuts to simplify the amount of information they receive from the environment. Automatic thinking is known as the thinking that is unconscious, unintentional, involuntary and effortless (Taylor, Peplau, & Sears, 2006). While, schemas are mental structure people use to arrange their information regarding the social world around themes or subjects: schemas affect what information we notice, think about, and remember (Chapter Review, 2010). During the incident February 4, 1999, Carroll had made a low-effort automatic thinking with schemas when Diallo reached into his jacket to get his wallet by assuming that Diallo was reaching for a gun in his pocket, and shouted â€Å"Gun! † to alert his colleagues. Officer Carroll’s action was due to his natural instinct or response as most criminal would reach into their pocket for gun during the detection of police officers. He had use schemas to form an expectation of the event in which made him to expect a gun pulling out of Diallo’s jacket rather than his wallet. As he attends to his schema-consistent knowledge: criminals would pull out guns from their jacket when they spotted police officers; his schemas filtered out any inconsistent information: Diallo reached in his jacket to get his wallet; had caused the NYPD officers to fire at Diallo. Besides that, there are also a few theories or concept under automatic thinking with schemas that had shown relevance to the Amadou Diallo case study, such as, accessibility. Accessibility is the ease with which schemas can be brought to one’s mind (Taylor, Peplau, & Sears, 2006). The four police officers had practiced accessibility when they saw Diallo ran up the outside steps toward his apartment house doorway at their approach, ignoring their orders to stop and â€Å"show his hands†. When they saw Diallo ran after they claimed to have identified themselves as NYPD officers, they might assume that Diallo was the serial rapist they were searching for, as logically a serial rapist or a criminal would ran when approached by police officers to avoid getting caught. The ease of the thought that criminals would run when they spotted police officers, had made the four police officers to identified Diallo as a criminal, although that was not the truth in Diallo’s case. As a result, a firestorm had unfortunately occurred. Furthermore, the four police officers had practice priming in this case study. Priming is the process which related to recent experience that made schemas or concept to come to one’s mind more readily (Taylor, Peplau, & Sears, 2006). For example, when Officer MeMellon fell down the steps, appearing to be spot, the other three officers might assume that Diallow had fire a gunshot towards Officer McMellon hence causing him to fell down those steps because they had linked it to their recent experiences of gunshot and thought that Officer McMellon had been spot and that Diallo had shot him with his gun. As one would logically fall back when shot. Perseverance effect was also shown in this case study. Perseverance effect is known as the tendency for people’s beliefs about themselves and their world to persist even when those beliefs are discredited (Taylor, Peplau, & Sears, 2006). When the four NYDP officers thought Diallo matched the description of a (since-captured) serial rapist, it might be due to the fact that Amadou Diallo was an immigrant to the United States and the four police officers could have the belief that immigrants are the major causal crime increment in the Unites States. Hence resulting the police officers to think the worse out of Diallo when he ran and even though he was reaching into his jacket to get his wallet, the police officers had persisted that the square object had been of a firearm although in logical terms both wallet and gun do not share the same shape and size. On the other hand,people also tend to use mental strategies and shortcuts to organize and make sense of their social world, especially when they are lack of full processing time, lack of solid information to use for decision making, information overload, or when the issues are not important to them (Taylor, Peplau, & Sears, 2006). Mental strategies and shortcuts help people to make decisions easier and allow them to get on with their lives and not turn every decision into a major hurdle. Four NYDP officers had practise judgmental heuristics when they made judgments about Diallo. Police officers thought Diallo had matched the description of a (since-captured) serial rapist. This might be because that Diallo was a dark skin immigrant which had logically matched the description of the serial rapist leading officers to made a quick decision so that they do not need analyse in detailed and make a major hold-up over the matter. Furthermore, the four police officers also did performed availability heuristic in this case. Availability heuristic is a mental rule of thumb whereby people base a judgment on the ease with which they can bring something to their mind (Taylor, Peplau, & Sears, 2006). During the incident, Diallo had been mistaken that he was reaching into his jacket to get his firearm whereas he was actually reaching to get his wallet. Officer Carroll had shouted â€Å"Gun! † to his colleagues. His judgment might be due to his ease with which he can bring to his mind, which in this case, was automatically thinking that Diallo’s wallet was a gun, hence warned his colleagues about the matter. Attitude heuristic is the determination of what is â€Å"true† based upon an individual’s feelings towards or for a matter (Taylor, Peplau, & Sears, 2006). The four police officers also had carried out attitude heuristic towards Amadou Diallo. For example, these police officers might dislike Diallo because he was an immigrant or ‘black’ person therefore assuming that Diallo’s intention, plan, or doings would also be bad too. This caused Diallo to be misinterpreted to be a criminal trying to escape from police detention rather than his true intention, which was believed to initially intend to show the NYPD officers his identification card in his wallet before he wrongly shot. Besides theories and concept of automatic thinking with schemas, the Amadou Diallo case had also displayed a few relevant theories of social perception. During the incident, the four police officers had displayed the attribution theory. Attribution theory is a description of the way which people explain the causes of their own and other people’s behavior (Taylor, Peplau, & Sears, 2006). It is because that Diallo had run up the outside steps of his apartment after they claimed to identified themselves as NYPD officers, and that he had reached into his jacket, the police officers have made a cause and effect explanation towards Diallo’s behavior hence assuming that he was a criminal or the serial rapist they were searching for, therefore Diallo had run up in the attempt to escape and when he reached into his jacket for his wallet, they thought that he was reaching for his gun to defend himself. Due to this theory, it made sense of he reason four police officers have assumed that Diallo was a criminal and they had to fire back Diallo. All this might be due to the attachment of meaning they decode from Diallo’s nonverbal behavior. In addition, the fundamental attribution error was also shown in the incident when the four police officers have focus on Diallo’s action to run and reached into his jacket, rather than the situation causes of his action, which was intending to reached into his jacket to get his wallet to show the police officers that he was innocent when he was approached by the police officers and asked to â€Å"show his hands†. Fundamental attribution error is known as the tendency to overestimate the extent to which a person’s behavior is due to internal, dispositional factors and to underestimate the role of situational factors, one reason people make fundamental attribution error is because the observer only put their attention on the actor, while ignoring the situational causes of the actor’s behavior (Taylor, Peplau, & Sears, 2006). Furthermore, Diallo had also displayed the spotlight effect in this case study. The spotlight effect is the tendency to overestimate the extent to which our actions and appearance are salient or clear to others (Taylor, Peplau, & Sears, 2006). When Diallo had reached into his jacket to get his wallet, he might had assumed that the NYPD officers know or understand what he was doing, which in his case, was the probability to take out his wallet and show them he was not the criminal or man they were searching for. However, the four police officers were not aware of his action hence assumed that he has a gun, hence fired at Diallo. Moreover, police officers had also displayed the aggression objects as cues concept during the shooting event. Aggression objects as cue is an aggressive stimulus that act as an object that is associated with aggressive response, and whose mere presence can increase the probability of aggression (Taylor, Peplau, & Sears, 2006). The aggressive stimulus in this Diallo case is the guns that the police officers possessed. When the police officers had encountered a threatening or violent stimulus, they were more likely to â€Å"shoot† regardless of what stimulus actually appeared (Baumann & Desteno, 2010). Due to the possession of firearms, the four police officers had the higher possibilities to response aggressively towards Diallo, hence the gun act as the object that associated with their aggressive response. Without the firearms that the four police officers possessed, the act of aggression towards Diallo would decrease therefore the firestorm would not have happened. According to Correll et al. (2002), it was found that participants’ performance shown difference regarding race of the targeted person. When a decision making process was time limited, participants had made more errors shooting unarmed African American targets than unarmed White targets. Whereas, participants had made more errors not shooting armed White targets than armed African American targets. In other words, participants were more likely made errors evaluating African American targets as threatening compared to White targets. This means that because Diallo was a ‘black’ immigrant, it increases his rate of being shot. This is an act of stereotype as because Diallo was a ‘black’ immigrant, they assumed that he might be a criminal, hence the police officers thereby increasing the likelihoods for certain interpretations and ensuing actions during the crucial moment, resulting them to mistaken Diallo’s wallet as a gun, hence shot him. In another words, it is like the Arabs possess guns, resulting in more frequent mistaken â€Å"shootings† of Arab men within the context of the shooter bias paradigm (Unkelbach, Forgas, & Denson, 2008). There are also group prejudices that had been displayed in the Amadou Diallo case study. The four police officers had shown prejudice against Diallo because he was a dark-skin immigrant, hence they have ordered him to stop and â€Å"show his hands† without confirming whether he was the serial rapist they were searching for. Seeing the suspect holding a small square object, Officer Carroll yelled â€Å"Gun! † to alert his colleagues, believing thatDiallo had aimed a gun at them at close range, the officers opened fire on Diallo. Diallo was a West African immigrant with no criminal record (Cooper, 1999). It was clearly shown the act of prejudice towards Diallo, whom was misunderstood or misinterpreted just because of his race. Furthermore, discrimination was shown in the Amadou Diallo case when the four NYPD officers had opened fire to shoot Diallo without proper investigation on his identity and the square object that he was holding during the incident. The action carried out by the four police officers was unjustified and harmful towards Diallo because he was a West American immigrant in the United States. Finally, illusory correlation was also shown in the Amadou Diallo case. An illusory correlation is the tendency to see relationships, or correlations, between events that are actually unrelated (Taylor, Peplau, & Sears, 2006). When Diallo ran up the outside steps of his apartment and pulled out his wallet, the police officers had correlated his action to a criminal’s doing hence leading them to assume that he was a criminal ready to open fire at them in short range. These two events are distinctive and hardly correlated. Because Diallo was a West African immigrant, therefore the police officers correlated the two events together, causing Diallo his innocent life.

Thursday, August 29, 2019

Are women likely to suffer from depression than men Essay

Are women likely to suffer from depression than men - Essay Example Proper treatment would alleviate the symptoms in over 80 percent of the cases. Yet, because depression is often unrecognized, depressed individuals often continue to suffer needlessly. Women are almost twice as likely as men to experience depression. Research continues to explore how this psychological problem affects women. At the same time, it is important for women to increase their awareness of what is already known about depression, so that they seek early and appropriate treatment. Major depression and dysthymia affect twice as many women as men. This two-to-one ratio exists regardless of racial and ethnic background or economic status. The same ratio has been reported in eleven other countries all over the world. Men and women have about the same rate of bipolar disorder (manic depression), though its course in women typically has more depressive and fewer manic episodes. Also, a greater number of women have the rapid cycling form of bipolar disorder, which may be more resistant to standard treatments. Many factors unique to women are suspected to play a role in developing depression. Research is focused on understanding these factors, including: reproductive, hormonal, genetic or other biological factors; abuse and oppression; interpersonal factors; and certain psychological and personality characteristics. But, the specific causes of depression in women remain unclear. Many women exposed to these stress factors do not develop depression. Remember, depression is a treatable psychological problem, and treatment is effective for most women The Dimensions of Depression in Women Adolescence:_ Studies show that the higher incidence of depression in females begins in adolescence, when roles and expectations change dramatically. The stresses of adolescence include forming an identity, confronting sexuality, separating from parents, and making decisions for the first time, along with other physical, intellectual, and hormonal changes. These stresses are generally different for boys and girls, and may be associated more often with depression in females. Some researchers have suggested that men and women differ in their expression of emotional problems. In adolescence, boys are more likely to develop behavioral and substance abuse problems, while girls are more likely to become depressed. Adulthood: relationships and work roles Stress can contribute to depression in many people. The higher incidence of depression in women may not be due to greater vulnerability, but to the particular stresses that many women face. These stresses include major responsibilities at home and work, single parenthood, and caring for children and aging parents. Social expectations play a role here as well. In two career families, women are more likely to have responsibility for a greater share of child care and household responsibilities. Role conflict is also an issue, as debate continues regarding whether women need to choose between family and work responsibilities, and about which choice is the "proper" one. Reproductive events:- Women's reproductive events include the menstrual cycle, pregnancy, the post pregnancy period, infertility, menopause, and sometimes, the decision not to have children. These events bring fluctuations in mood that for some women include

Wednesday, August 28, 2019

Transportation Before, During & After the Industrial Revolution (if Essay

Transportation Before, During & After the Industrial Revolution (if you have a better idea please feel free to use it) - Essay Example 213) wrote, mankind has used these five machines –lever, wedge, wheel and axle, pulley, and screw – for many years. What happened shortly before and during the industrial revolution was that scientists and inventors found ways to combine these machines, control their use, and improve the efficiency in the way these machines worked. The keys to these (Van Doren, 1991, p. 214-215) were the works of great scientists – Galileo, Descartes, and Newton in the 17th and early 18th centuries – that explained why and how these simple machines did what they did. On top of this radical way of thinking, a process now known as the scientific method, were built the early inventions of Arkwright (water frame), Hargreaves (spinning jenny), Crompton (weaving), Whitney (cotton gin), and others whose machines were powered by the steam engine, developed in England by Newcomen, Watt, and Trevithick and in the United States by Evans (Bergen, 2006). The industrial revolution was marked by changes in several aspects of ordinary life: the way people worked, where and how they lived, the new uses for raw materials mined under the earth, the creation of wealth, and how the money was stored and spent. From the etymology (OED, 2001) of the word â€Å"transport†, which combines the Latin words trans meaning â€Å"across† and portare meaning â€Å"to carry†, we propose a general definition of the transport industry as one that exists and develops to meet the growing needs of people to move themselves and their goods from one place to another. Movement or motion is one of the signs of life, and our human history chronicles the movements of peoples for different reasons: escaping from natural disasters, searching for greener pastures, trading with other people, or invading peoples and territories for enslavement, preservation of territorial peace, or the accumulation of power, among other possible reasons. In each of these examples, people moved their bodies and the things

Tuesday, August 27, 2019

Student's Musical Experience in the EKU Center Essay - 2

Student's Musical Experience in the EKU Center - Essay Example One song the reporter chooses is â€Å"Shortcut Home† by Dana Wilson composed in 1946. The tempo was very fast with a strong influence of the brass instruments. Heavy percussion was included. The tune then switched to something a little softer but then picked up speed again. It continued to go back and forth but the underlying tempo maintained a fast speed while some of the other instrument sections played over the top of it. The end was very powerful and most of the time it was played very loudly. Toward the end, the song had a sinister twist. There was more use of bells and the triangle at the end. â€Å"Shortcut Home† is a fanfare style song and each ensemble had its own special portion where it was featured within the song. The style was made of several different jazz styles. The music is profound in some areas and cascades until the final C Major chord. Hearing this song in person versus hearing songs in class was very arousing. There was just a vision that he coul d associate with how it made me feel. Since it is called â€Å"Shortcut Home† I think that it is a piece about someone who is frantic to get home and all of a sudden they find a shortcut, go scurrying, and then, at last, they are at home. The other song he chooses is â€Å"Cloudburst† by Eric Whitacre in 1970. It was interesting because it had audience participation. The music started out with the horns blaring at a slow pace, followed by woodwinds and then a short brief silence until all of the ensembles came together to perform. The sound of the cymbals would lead the first section to a climax. Then it was almost a dark thundercloud was lingering as the deeper brass instruments began to play their low haunting tune. Based on the slow tempo and the crashing cymbals, the reporter thinks that â€Å"Cloudburst† was about a thunderstorm. It was very soft and mellow at many points and then there would be a light crashing of the cymbals again.

Monday, August 26, 2019

An analysis of 12 angry men Essay Example | Topics and Well Written Essays - 750 words

An analysis of 12 angry men - Essay Example An analysis of "12 angry men" Note how the leadership in the movie depend on that which Aristotle had previously given . Also note that Aristotle's formation of rhetoric makes it a component of every human effort, apart from (perhaps) those aspects of technical discussion which are so famous as to be established practically without question. In groups, large or small, the identity and make up of who becomes the leader and who becomes the follower is difficult to explain. In the case of the movie "Twelve Angry Men," the small group is the jury and the verdict they have to find. There is an underlying assumption that the jury will judge their fellow man fairly and without any personal bias. However the imperfections of man make this process less than perfect. It is here, when emotions and logic are inserted into the thought process, that conflict, doubt and questioning of motives start to occur. When the leader, in this case the foreman, takes charge we see his influence and power over the other members of the group (jury) start to take place and eventually the power shifts to another individual, in this case another jury member, an architect. On first look, the jury probably would have unanimously voted for conviction, however, as the discussion progressed, the architect gets the rest of the members to question their quick decision. While the foreman was relying on his legitimate place of power as the foreman, the architect keeps the group talking and discussing the facts of the case, and listening to each other. The foreman stayed focused and kept the discussion going and wanted all voting procedures to be fair, while the architect used rationality and logic and wanted the others to discuss their way to a still unanimous decision, but better defended. The fear of disappointing the group is stronger than perhaps their own judgment, and after the vote was not unanimous for a guilty verdict, each member tried to convince the architect, the dissenting vote, as to why they feel the suspect is guilty. After much discussion, another vote is taken, only this time it is done by secret ballot, and eventually it comes back with another unanimous decision. However, this time it is opposite of its original position: not guilty, here we find Aristotle's leadership rhetoric plays an essential role here as in this scenario as the foreman bases his leadership on Aristotle's rhetoric of leadership he strongly believes that truth needs protection exactly like the perpetration of wrongs. The bad guys will defiantly make use rhetoric...why should the good guys be powerless There is a political sense in this theory too: right thinking leaders like the jury and foreman, those who have well of the most in mind, ought to be able to take effective leadership action like the jury and foreman did in the movie (and must do so).When the group was assembled in the jury room they were polite, organized and civil to each other. They very well knew what their responsibility was as well as they collectively were thinking this was a precise case. The expectations which most of the members of jury were that a decision of guilty would be reached quite promptly and all of them would be able to leave. Compliance with this norm was first evident with the first vote taken, only one of the jury members voted for a guilty verdict. No one wanted to disappoint the group. All of the jury's leadership strengths seem to again reflect Aristotle's leade

Sunday, August 25, 2019

Use of drugs in Sports Dissertation Example | Topics and Well Written Essays - 1500 words

Use of drugs in Sports - Dissertation Example A quick review of print and electronic literatures reveals that doping has been an integral and controversial issue for the sports fraternity since historical times. In most literatures on doping in sports, the types of drugs used and their effects on individual sportsmen, sportswomen, their families, their nations, their fans and the sporting fraternity have been given quite a wide coverage. This kind of coverage emphasizes the importance of the fight against doping in sports. Besides, seeking to ensure a level and fair playing field for sportsmen and women, the fight against doping has been portrayed in literatures as seeking to eliminate and reduce the negative effects of doping on health, well being and the image of sports (Berryman, 1992). Literatures have also covered the interventions designed and impended to curtail doping problems in sports. For example, as a consequent of drug use by athletes and the subsequent health effects and deaths, sports governing bodies such as the International Olympic Committee (IOC) set up medical and testing commissions to test athletes for signs of illicit substances and ban the use of these drugs and other performance enhancing substances. Although these testing started in a small scale in the 1968 Mexico Olympics, it would be introduced in a full-scale at the Olympic Games in Munich four years later (Wayne, 2000). Following the banning of substances such as anabolic steroids, many sportsmen were disqualified in the years that followed 1975 and 1983.

Saturday, August 24, 2019

Conflict Management Scholarship Essay Example | Topics and Well Written Essays - 750 words

Conflict Management - Scholarship Essay Example This paper illustrates that leadership and teamwork have a symbiotic relationship that cannot be overemphasized. Exemplary leadership often promotes teamwork and reduces conflicts within organizations. Conflicts are common at all group levels, be it at workplaces or in learning institutions, because of communication breakdowns. The situation is even severe at present because everybody is aware of his or her rights. The conflict has both positive and negative effects on a team, depending on the way managers and team leaders propose resolution measures. Constructive-cooperative conflict management fosters innovation in work teams. According to Desivilya, Somech, and Lidgoster, intragroup conflict radiates from interpersonal pressures among team members because of real or superficial differences. The quality of internal relationships determines the effectiveness of work teams and the leadership approach taken to handle relationship conflicts (emotionally driven conflicts) and task confl icts. The researchers propose the Dual Concern Model, which highlights the concern for self and concern for the other party as concerns interpersonal conflict-management. In this case, a participative leadership approach encourages cooperation and collaboration, in which team members share a mutual concern for each other. Team effort determines the achievement of tactical objectives and strategic goals of the organization. Victor Sohmen’s study proposes the best practices that would balance leadership and teamwork and result in successful outcomes in the contemporary competitive environment. Organizational leadership is essential to exercise interpersonal influence across a team. This is only possible if such leaders embrace a Five-Dimensional Leadership Competency Model, which encompasses transformational, transactional, organic, contemporary, and ethical dimensions. A leader must learn when to use either of the dimensions and when to combine the dimensions as the situation demands. At times, an accommodative leadership approach, in which a leader surrenders the leadership position to settle a conflict is essential.

Friday, August 23, 2019

Classroom Management - Setting Expectations Assignment

Classroom Management - Setting Expectations - Assignment Example 2. Students who miss a day of school should see the Make-Up Work Folder located on the bookshelf next to the pencil sharpener. In this folder, students can find a detailed list of what notes and activities they need to make up. Handouts will be in the folder, but students must borrow notes from another student and copy them by hand to their notebook. Missed assignments are due within 3 school days of the student's return. 3. Required daily materials include a black or blue pen, a pencil, a designated 3-ring binder, and the course textbook. Any other daily materials will be listed on the classroom board, so students can view them as they enter the room and get any required materials before the bell rings. 4. Homework will be assigned daily Monday through Thursday and due at the beginning of class, whether the class reviews it then or later. All work is to be original. Some assignments will be based on completion; others will be graded item by item. 5. Students will use a 3-ring binder dedicated to this course to collect notes, maps, graphic organizers, and other classroom materials. Each item in the notebook, regardless of its type, will be called a document and given a consecutive number. The notebook will be collected and graded based on completion once each grading period and constitutes a large part of students' daily work grade. To communicate these standards to students, verbal and graphic methods should both be used. Also, the plan has to be communicated to parents as well as students (Wong, 1991, p. 170). Graphic methods include writing the rules and procedures for students on handouts that they include in their class notebook, as well as posting the rules on the classroom wall. Parents will be asked to read the rules and procedures established for the class, and then sign a note confirming they have knowledge of them. During the first days of class, students will hear explanations of the procedures and practice them (Wong, 1991, p. 177). To implement standard 5, regarding the class notebook, the teacher should produce samples of notebooks from previous years for students to view, and explain the different types of documents to be included. If possible, handing out a table of contents beforehand helps students' notebooks stay organized. The teacher must emphasize when documents for the notebook are being made, and differentiate them from daily class work that would be handed in. Consistent reinforcement during the first weeks will help students remember to include all necessary documents in the class notebook, allowing them to score a high grade on their daily work. Establishing high expectations for students provides them the immediate benefit of improved academic performance and allows them to realize their potential. Reference Wong, H. K. The first days of school: How to be an effective teacher. Sunnyvale, CA: Harry K. Wong Publications,

Human resource management and performance in health care organisation- Essay

Human resource management and performance in health care organisation- the NHS - Essay Example There is a range of approaches to managing the healthcare workforce for high(er) performance. In the UK, two streams of activity are evident: the first focuses on making the NHS a ‘good employer’ thereby recruiting and retaining ‘good staff’, which could be called human resource (HR) management; the second approach concerns rethinking how to provide ‘high quality services’ as ‘efficiently’ as possible, which could be called ‘different ways of working’. Such approaches are often referred to as ‘modernisation’ (see Bach 2002). However, Seifert and Sibley’s argument that ‘modernisation’ is not a neutral step forward but a highly coloured version of progress rooted in market-style efficiency’ (2005: 226) indicates the contentious nature of such terminology. ‘Different ways of working’ is an attempt to avoid value judgements on the process and outcome of the different ways of working for employees, employers and service users. Given that the UK NHS is the third largest employer in the world, employing 1.3 million staff in 2004, it provides a useful case study to illustrate the processes, outcomes and questions raised by both streams of work. The paper begins by outlining characteristics of the healthcare workforce in the UK and the challenges raised for managers. Against this background, the paper reviews the rationales put forward for HR management and different ways of working, providing recent UK examples of both types of initiatives. We use the Changing Workforce Programme as an example to provide an illustration of some issues which should be of particular concern to managers endeavouring to get the best from their healthcare workforce. Healthcare organisations are characteristically made up of a large proportion (around 50%) of professionally qualified staff providing frontline services to recipients of healthcare. This type of organisational arrangement has been called a ‘professional

Thursday, August 22, 2019

Educating Essay Example for Free

Educating Essay â€Å"Individuals venturing into new experiences may encounter obstacles but may also gain significant rewards†. â€Å"Do you agree with this perspective?† In your response, refer to your prescribed text and atleast one other related text of your own choosing. Individuals venturing into new experiences may encounter obstacles but may also gain significant rewards. This is present in the text ‘Educating Rita’ written by Willy Russell and the film ‘The Help’ written by Kathryn Stockett. In this text we see a fairly un-educated woman blossom and find herself through education; the obstacles she faces on her way to knowledge are the stepping stones in finding herself and entering the new world of education. Rita is a typical uneducated woman; her life is already planned out for her consisting of children, cooking/cleaning, pub trips and the overall expectation to be content with this life and not expect any more. However throughout the text we see Rita break away from this lower class/restricting stereotype to blossoming and finding herself in the world of education. The opening scene portrays to us the two completely different worlds in which Rita and Frank live. Rita has enrolled in an Open University course as she sees education as a way of moving out of her world; she feels out of step with her working class background and wants to discover herself first before having a baby and tying herself down for life. Rita’s constant desire to ‘know everything’ makes Frank feel that he is an appalling teacher because he feels he has nothing to offer her. Frank is Rita’s course tutor; he is a very negative and dismal man who is heavily reliant on alcohol to dull his boredom and frustration. Although being a jaded alcoholic he is also a very precise, formal and educated professor who is just on a downward spiral in his life. Throughout the text we see Rita and Frank’s relationship grow as Rita makes him feel as if he has hope again, therefore his drive comes back. In scene one we observe Rita struggling to open the door into Frank’s office; this symbolises her struggle to enter that world, it’s a barrier, however she’s determined to get what she wants – in this case education – therefore almost breaks the door in order to get in. â€Å"You’re the first breath of air that’s been in this room for years† quoted by Frank symbolises the opening up of a new world for him, he’s now got someone new and different to experience. This is a good change for Frank. Scene two beings with Rita oiling Frank’s office door, then handing the oil to Frank. This is symbolic of giving him the key/tool to open up to another world. Rita still doesn’t portray herself as a ‘proper student’ and her self esteem/confidence is still very low. She doesn’t think she is capable of achieving the great essays that the other students write and doubts herself that she will even finish the course. This scene really reveals the cost that trying to change herself is likely to have on Rita. She is dissatisfied with her life and has a desire to change it, yet it would be easier in her opinion to simply stay as she is and continue her boring life of hairdressing and different flavoured beers. Frank assigns Rita 3 novels to read as her hunger for knowledge is starting to grow extremely. The slow change in Rita is starting to become evident as she can read/take on any book presented to her, â€Å"it feeds me inside†. Her hunger is growing and making her slowly discover who she is, â€Å"it makes me stronger comin’ here†. Although Rita feels as if she’s finally accepted in the university and has a place/fits in with the ‘proper students’, she still has barriers to face in her personal life that are important determining points in her progress and choices as an individual. Rita’s husband Denny isn’t accepting nor happy about her doing this ‘whole learning thing’ and forces her to choose between him and education as he doesn’t understand that this is the first time she’s happy and felt a sense of purpose in her life. Denny has made her constantly feel stupid for even considering getting an education and therefore burns all of her books. The burning of the books is symbolic of Denny trying to prevent Rita from moving away. â€Å"You’d think I was havin’ a bloody affair the way he behaves† â€Å"And aren’t you?† symbolises Rita’s affair with education. Although she may not be cheating on Denny, she still desires to educate herself more than spend time with her husband and is happy with this choice as it is her own choice and no one else’s. In scene six we start to see a notable change in the relationship between Rita and Frank. When Rita bursts into Frank’s office excited to tell him that she saw one of Shakespeare’s plays â€Å"it was bleedin’ great†, Frank thought that something serious had happened – which indicates that he is beginning to care for her. After inviting Rita to a dinner party at his house Frank feels closer to Rita – this invite symbolises the change in the basis of their relationship from teacher and student to a more personal one. Throughout the text we have seen Rita grow and shape herself as an individual, no matter what obstacles and new experiences she has encountered with on her way she has got through them with determination and strength, and as a result has been great personal gain. Towards the end of the text Frank presents Rita with a dress; this is symbolic of a dress for an educated woman, she is now one and can wear the dress with pride. Frank decides to leave the university, as he does not feel it is the right career for him anymore and would prefer to spend his time doing something else. Rita and Frank have both grown and found themselves throughout this text which is also evident in the film ‘The Help’ written by Kathryn Stockett. The Help is set in Mississippi during the 1960s, main character Skeeter (Stone) is a southern society girl who returns from college determined to become a writer, but turns her friends lives and the Mississippi town upside down when she decides to interview the black women who have spent their lives taking care of the richer upper class families. Davis, Skeeters best friends housekeeper, is the first to open up and be interviewed to the shock of her friends in the close black community. Despite Skeeters life long friendships hanging in the balance, she and Davis continue their partnership and soon more women come forward to tell their stories and as it turns out, they have a lot to say. Along the way, unlikely friendships are forged and a new sisterhood emerges, but not before everyone in town has a thing or two to say themselves when they become unsuspectingly/unwillingly caught up in the changing modern times. This is relevant to the text Educating Rita as the women find the co urage and self confidence to venture into new experiences to help better either themselves or their community.

Wednesday, August 21, 2019

What Is Plagiarism And The Ethics Of It Philosophy Essay

What Is Plagiarism And The Ethics Of It Philosophy Essay Plagiarism comes from the Latin word plagio. It is translated as to steal. It is better to formulate a definition of plagiarism from the verb plagiarize. To plagiarize means to steal or to borrow someones ideas, works or thoughts. In such a way, plagiarism is copying the work of others and turning it as your own. On the one hand, plagiarism is a deliberate action. It is cheating. People assume the intellectual property rights for their realization in our world. It is the easiest way for realization. Therefore plagiarism is an obstacle for society. It doesnt let society develop in science and technology. It is a process of destruction a man as a person. Plagiarism kills intention to be the first and wish of something new. In our childhood we often hear such words: Dont take it! These things are others! And you mustnt take them! Plagiarism is the same thing. We know that it is wrong, but we do it. In my opinion, plagiarism is usual for young people, who went to achieve fame or to be generally recognized very quickly and without any effort. This kind of people is very lazy and doesnt want to work hard. But their aim is to be famous and they achieve these goals. We can meet plagiarism in many spheres, for example, in literature, music, science, art etc. All people know the composition Lambada. The author of this composition was an unknown composer. Lambada has remained unnoticed for a long time. But then two young boys used this idea. They made new arrangement, changed this composition a little and gava a new life for this melody. Lambada has become very popular in many countries. When this composition began to bring in return, a real author proved his case in court. And then he got ten million dollars. He was satisfied with money, because he didnt want to achieve a success and fame. Provided to be, if somebody use more than seven notes from another composition, it will be real plagiarism. It is a good example of copying the work of others. In art we meet plagiarism very often too. Artists draw their pictures and then these works are copied by somebody else. There is a good example of this process in Kiev. The most popular are Gustav Klimts works. He has made his works in one copy with oil painting. But now people, who replicate them, use china, wood, posters etc. And the most interesting thing is authorship of these copies. These people dont forget to write the name Gustav Klimt. In my opinion, it is absurd. Pictures must be in one copy and be kept in museums. But there is one big problem. If pictures arent duplicated, many people cant see them, because they dont have a chance to travel. We can meet plagiarism in journalism too. Many journalists sit at home and only copy articles of other authors. And then they diffuse it with the help of Internet. Who knows what results will develop from this work? But I think that this work is useless. Authors can cope with it themselves, if .they want. But people like to make a profit out of somebodys work. And it is a pity. Another important thing, which I want to discuss, is our education. Plagiarism is found here very often. It becomes a part of our education. And this problem is eternal and nobody can solve it. Students copy essays, term papers, degree woks. And they dont want to develop. They only seek easy ways. And it begins from the school, when we copy tests; ask our parents or friends to help us with our compositions or to paint a picture. We explain our actions in such a way, we cant do it ourselves. But it is deception and our cunning. Of course, we can, but we dont want to try. We dont want to think. Pupils get into the habit of plagiarism. Their parents must explain them what is good and what is bad. Parents are their tutors during our life. And their purpose is to teach them how children must behave, because then it can be worse. And when children grown up and become students, they think, that whole world center around them and all must be at their feet. I know that I behave sometimes in s uch a way. But I try to wrestle with myself and advise it everybody. In my opinion, this habit is awful. And people cant be stead on their legs, if they dont want to improve. We should improve and improve every day. But plagiarism prevents it. We shouldnt rely on somebody; we must achieve a success themselves. But it is very difficult for some people. They are used to plagiarize and cant live without this process. How can we discuss our education, if we copy somebodys work? We dont want to develop our thinking. We dont aspire to be well-educated, independent, purposeful, and self-confident and we dont want to be a person. We must know that our education only depends on ourselves. Laziness and unwillingness are motives of plagiarism. But how we can tell the difference between plagiarism and borrowing? When is borrowing over and plagiarism begins? At first sight these two notions are the same. But this opinion is deceptive. We meet borrowings in literature. New literary work is based on other ideas in literature, which are well-known for us. Problems, actions, themes and sometimes dialogues and inner monologues are very similar in each novel or story. Authors write about issue of the day. There are many problems, which will be vital at any time, in our life. But authors develop a subject in different ways. And of course they have different plots, characters and their own views on this problem. But we should be very careful with borrowings and know a distinction between borrowing and plagiarism. On the other hand, plagiarism possesses positive qualities. With plagiarism many things are passed on from generation to generation. For example, all inventions had appeared many years ago. But then somebody uses this idea and improves it. In such a way we get a new invention. In my conclusion I want to say, that plagiarism has more negative qualities, than positive. And it is a criminal action. We must remember that it is sued at law. But these things stop people very seldom. It is impossible to struggle with plagiarism, because people choose their life themselves. If they want to use somebody for the sake of their purpose, they will do it. One can show the right way to another, but he must choose how he wants to live.

Tuesday, August 20, 2019

Facial Recognition Technology for Identification

Facial Recognition Technology for Identification Abstract Facial recognition is a crucial factor of everyday identification processes: human beings recognize and evaluate each other by means of the face. Whenever driving licences, identity and membership cards are checked or wherever access is controlled by security staff, the identity is verified by looking into somebodys face. Thus, unlike other biometric features, e.g. the fingerprint or iris recognition, facial recognition is a transparent procedure well-known to human beings. However, especially in the context of the international fight against terrorism it has become obvious that the traditional way of identifying individuals is insufficient. There are certain limits to the natural recognition process carried out by human beings: The recognition performance is not only impaired by difficulties with the recognition of people from other ethnic origin or deceptions due to a different hair-do or beards, but also by subjective impression based on a persons outward. The requirement of successful personal identification in access control and in other cases leads to using the results of biometrics. Biometrics Face recognition is a passive, non-invasive method for verifying the identity of a person, Offers the benefits of its unique facial technology in the form of customized overall solutions for the areas of access control, border control, ID-Management, search for criminals and video surveillance Face recognition has come to be an active research area with numerous applications in recent years. In this thesis, a variety of approaches for face recognition are reviewed first. These approaches are classified according to basic tasks i-e Face Detect, face Normalization, and Face recognition. Then, an implementation of the face recognition method, the Eigenface recognition approach is presented in detail as well as other face recognitions methods i-e Local Feature Analysis, Neural Networks and Automatic face processing are discussed in general. Introduction Ever since the birth of first mankind, human beings have continually been seeking for personal possessions. From the very basics of food and clothes, to cars, houses, and the more recent substantial property of data and information, it is becoming increasingly important that such valuable assets be sheltered by means of security control. Throughout history, the types of technologies used on the access control systems are countless. From the traditional systems such as security guards checking personal IDs to the very fundamentals of keypads and locks and password or entry code, the focus now has moved to the more advance technologies, particularly in todays multifaceted society. Organisations are continuously seeking for a more secure, suitable and economical way of property protection. The problem associated with traditional mechanisms is that the possessions could be lost, stolen, forgotten, or misplaced. Furthermore, once in control of the identifying possession, any other unauthorised person could abuse the privileges of the authorised user. Therefore there is a need of another approach to properly differentiate the correct (right) person from an impostor by positive identification of the person seeking access. Biometrics is one rising development in the field of access control system that provides true identification. Although the word biometrics sound very new and high tech, it is in fact the oldest form of identification known to man. Since the dawn of man, a persons face and voice was used to identify him/her. Before the digital age, a hand written signature was the only method used by a person to assert a unique form of identification that was difficult to copy. Popular biometric systems in use today include fingerprint recognition, iris recognition, voice recognition, and facial recognition systems. These systems are in practice in different organizations like banks, airports, social services offices, blood banks and other highly sensitive organizations. Biometric system offers the most accurate authentication solution and convenience. Biometrics systems can be integrated into any application that requires security, access control, and identification or verification of people. With biometric security, we can dispense with the key, the password, the PIN code; the access-enabler is human beings not something he/she know, or something in his/her possession. Chapter 02 This part of the dissertation provides the general overview of biometrics. Definitions such as Automatic, Physiological and Behavioural characteristics are also discussed as well as different types of biometric systems i.e. one-to-one and one-to-many. General Biometrics Base systems model, how it works and Multimodal Biometrics systems are also discussed in detail. In the last section of this chapter, a comprehensive overview of the right approach in selection of different technologies for an origination in terms of business objective, user acceptance, FFR, FAR, organisational environments, cost and a comparison of all biometrics are also presented. Chapter 03 Different types of biometric technologies are described in this chapter i.e. finger prints, iris and retina, voice, biometric signature and how these technologies work and the main features of these technologies with the help of diagrams. Chapter 04 This chapter is one of the most important chapters which explain the general back ground of face recognition technology and how face recognition works. It gives a brief discussion of how verification and identification is achieved with the help of face recognition system. Actual techniques involved during face verification and identification i.e. faces detection, face normalisation and face recognition are also discussed in detail. Steps involved during the face detection i.e. coarse detection phase and refined search phase are discussed as well as how Normalisation is achieved through different steps i.e. lighting normalisation, scaling normalisation, rotation normalisation and background subtraction. Face recognition and methods of face recognition i.e. Eigenfaces, feature analysis, neural network and automatic face processing are discussed in this presentation. Chapter 05 In this chapter of my dissertation, a proposed model of face recognition system for attendance of university students is discussed. The specification of the system is also compiled after the extensive study of face recognition products of different Vendors. Chapter 06 This final chapter of my dissertation contains the conclusion, future work and issues involved with face recognition system. A review of the biometrics technology Biometrics: An overview In todays networked and digital world the role of system security has a vital importance. In originations a large number of professional people are involved in one form of electronic transaction or another. Securing a companys digital assets and identities is a necessity for financial success. Ignoring IT security increases the risk of losses for any company moving through this electronic world. Logging on to a system by entering user ID and password is very simple but its simplicity makes serious security problems. There are, however, people who use easy guess passwords or leave written passwords near to their computer. In this situation there is no way to confirm that the person is logged on the system using his/her ID and password or some one else, nothing can prevent someone else from accessing sensitive material. Its like a passport system that doesnt require a photograph. In addition, time consuming tasks behind the management of user ID and passwords divert already insufficient resources from other important responsibilities. Establishing an accurate identity is the main focus of the information systems security in recent years and great efforts are made in this field. Two types of identification systems are in use now today. In one type identification system flawed identity checking results in unnecessary duplication, fraud and client disruption, resulting costs and risks. While in other type of identification system an accurate identification procedure and effectiveness may be undermined by unpopularity resulting falsification and evasion. Chapter2 Three conventional forms of identification are in use. Origination ID or smart cards. The use of passwords or Personal Identification Numbers, mother name, place of birth, home address etc. The third form of identification is to identify something unique about a person, such as fingerprints, voice recognition, hand geometry, face structure, iris and retina. This third form of identification is known as Biometrics. Biometrics is a branch of science in which we study, what makes us biologically unique. It is also referred to the science and application of statistical analysis of biological characteristics (Physiological/ Behavioural). In security terms, Biometrics refers to technologies that analyse human characteristics for security purposes. Therefore Biometrics technologies are concerned with the physical parts of the human or personal trait of human being. There are different definitions of security base biometrics that have been circulating for a numbers of years. According to Ashbourn, an expert in Biometrics, Biometrics is a measurable physiological and / or behavioural trait that can be captured and subsequently compared with another instance at the time of verification). [1] The Biometrics Consortium states Biometrics is automated methods of recognizing a person based on a physiological or behavioural characteristic. [2] The international Biometrics Group defines biometrics as the automated use of physiological or behavioural characteristics to determine or verify identity [3] Physiological characteristics are fingerprint, Hand geometry, iris pattern ,retinal, ear shape and facial scans etc Behavioural characteristics are voice pattern, key strokes, signature etc. As mentioned, biometric technologies are anxious with the physical parts of the human or personal mannerism of human beings. The word automatics basically means that biometrics technology must recognise to identify /verify human characteristics rapidly and automatically, in real time. Unique physiological characteristics or behavioural mannerisms are examined in biometrics verification for an individuals identity. Physiological characteristics are essentially unchangeable such as hand geometry, iris pattern , palm prints, face structure and vane shape etc .while behavioural characteristic such as ones signature, voice or keystroke dynamics are changeable and these behavioural characteristics can change over time. They are both controllable and less controllable actions. The initial sample of the biometrics template, which is stored in the data base during the Enrolment, must be updated each time it is used. Although behaviour characteristics based biometrics is less costly and less intimidating to users, physiological characteristics have a tendency to offer greater accuracy and security. In any case, both techniques grant an extensively higher level of identification and verification as compare to smart cards or passwords technologies. A password or personal identification number (PIN) is not unique for an individual ,it can be stolen ,forgotten or lost, while a biometric characteristic is unique to each individual; it can be used to prevent fraud or theft. It cannot be lost, stolen or forgotten. There already many places such as research laboratories, defence (military) installations, VIP offices, day care centres and cash points where access is guarded by biometrics base authentication system. The following biometric identifiers currently obtainable or under development are fingerprints, body aroma, ear shape, face recognition, keystroke dynamics, palm print, retinal scan, iris pattern, signature, DNA, vein check and voice pattern. Biometrics-based Systems A biometric based system is a system that in some way uses physical characteristics or personal traits of a human being. These systems are not only, mainly used for security, but also use for encryption. Encryption The processes of translating a message (plaintext), with the help of software, into a programmed message/encoded text (Cipher text), called Encryption. This is usually accomplished using a secret key and a cryptographic code. [4] Type of Biometrics-based Systems There are two types of Biometrics-based systems. One-to-one systems (Verification system) One-to-many systems (Identification System) One-to-one system (verification) This type of biometric system works on the base of one to one matching and authentication principles where the system asks and attempts to answer the question Am I who I claim to be? At first a biometric sample of a person is provided to the system and then the system matches this sample to the previously stored template during the enrolment mode for that person. The system then decides whether that is the person who claims the identity. After a successful matching of the fresh sample with the stored template, the system authenticates the person. These types of systems are also referred to as verification systems. The verification system is a fast response system because it minimises the use of resources and time by providing biometrics sample/ information to the system which specifies the stored template in the data base for that person. [5] One-to-many system (identification) This type of biometrics system works on the base of one to many recognition principles. The system attempts to answer the question, Who am I? The basic purpose of this system to identify a persons identity by performing matches against all biometrics templates stored in a data base or a data library. A person does not claim his/her identity to the system; instead the person just gives the system some biometric data. The system then performs to match this data to all templates previously stored in the database and decides whether a match can be made. It is not necessary that the system responds with the persons name, it could be the persons ID or other unique identity. These types of systems are referred to as identification systems [6]. Identification systems have a slow response as compared to verification systems. This is because they require much more powerful resources due to the fact that more comparisons are required by identification systems. The biometrics identification system also prevents a person from registering twice on the system and ensures that a person is not already present in a data base. This type of system can be used in a large scale public benefits organisation, such as being used at banks where a person would try opening a second account on another name. This system can also be used with immigration where a person could try to enter the country on false documents. General Biometrics Base Authentication System Model A general biometrics base authentication system model consists of three major components, hardware, software and interface. Hardware is used to capture the biometrics information and software is used to maintain and manage it while an interface with application system that will use the result to confirm an individuals identity. The system operates in two different modes: Enrolment mode Authentication mode Enrolment mode: In this mode a users biometrics data is provided to a system, which stores this users biometric sample in a database or data library as a template. Hardware such as a biometrics readers/ scanners, cameras are used to capture biometrics sample. This stored template is then labelled with a user identity e.g. name, identification number etc. The way biometrics operate Some biometric base authentication systems may need a number of biometrics samples in order to build a profile of the biometric characteristics. These exclusive characteristics are then extracted and changed in to mathematical code by the system. Which is then stored in to the biometric system as a biometric template for the person who enrolled? The template is store in the memory storage of the system, or in computer database, smart card or barcode. A threshold is set in to the biometrics base authentication system according to the level of security [7], (a high threshold is set for high level of security) To secure the template to the person, a trigger or other mean of securing such as personal identification number, or a smart card that store the template which read by a card reader during the authentication mode, are use in biometrics. In some biometrics system when ever a person interacts with the system a new biometrics sample is provide to the system which is compared to the template. If this new sample and stored template is match (the score of new match if exceed from the set threshold then access is granted to that person). As both physical and behavioural characteristics are inconsistent with time, this change may be due to the age of the person, general health condition, working and environmental conditions and time pressures etc. the biometric base authentication system must allow for these delicate changes, in this case before a match is recorded a threshold *1 is set. This can take the form of an accuracy score *2. The comparison between the template and new sample must exceed this set threshold. If it not exceeds the system will not record the match and will not identify the person. This use of a threshold gives biometric technologies a significant advantage over passwords, PINs and ID badges. The use of a threshold affords a tremendous degree of flexibility and if the comparison between the new biometric sample and the template exceeds the stated threshold, identity will be confirmed. Threshold:-a predefine number, often controlled by system administer, which establish the degree of correlation necessary for a comparison to be deemed a match. Score: A number indicating the degree of similarity or correlation of a biometrics match Capture, extraction, comparison and match/non match are the four stages use by all biometric authentication systems. Capture A physical or behavioural sample is captured by the system during enrolment. Extraction unique data is extracted from the sample and a template is created. Comparison the template is then compared with a new sample. Multimodal Biometric System In some environments a signal biometrics identifier base system such as finger scan, face scan or iris scan etc often not able to meet the desired performance requirement of the organization. Different biometrics base identification system such as face recognition, finger print verification and vice verification, is integrated and worked as a single biometrics base identification system. Multimodal biometrics base identification system is use to over come the limitation of the single identifier biometrics base identification system. Initial experimental results reveal that the identity established by such an integrated system is more reliable than the identity established by a signal biometrics identifier base system. [8] Selecting the Right Approach In Different Environment Different biometrics base authentication systems are used. To choose the right approach to biometrics authentication it is necessary to understand the requirement of the organisation, the application of the biometrics system, and characteristics of the biometrics devices itself. Following factors are also important to choose a biometrics base authentication system, which most devices cant store raw fingerprints and that fingerprints cant be reconstructed based on the data stored within these systems. Intrusiveness is another factor affecting user acceptance of some devices, particularly iris and retinal scanning systems. [9] Business objective of the organisation The most important aspect to consider when selecting a biometrics base authentication system is the organisation business objectives. The choice biometrics system must meet or exceed organisational business objectives as well as sustain organisation in the coming years. Business objective is the bottom line where organisation starts and end. User acceptances Some biometrics, such as fingerprints, may be apparent as an assault of personal privacy. The system must not associate with other govt agencies biometrics (finger print) recognition system that most devices cant store raw fingerprints and that fingerprints cant be reconstructed based on the data stored within these systems. General intrusiveness can be another factor affecting user acceptance of some devices, particularly iris and retinal scanning systems. Following are the errors of biometrics base authentication system. False acceptance rate (FAR) False acceptance rate (FAR) is a system error. It is the rate at which an interloper can be recognized as a valid user. In one -to-one match during user verification, false acceptance is based on fake attempts, not on the total number of attempts by valid users. If FAR is 1%, it means one out of 100 users trying to break into the system will be successful [10]. FARs become more critical when you attempt to identify users based on biometrics, instead of simply trying to verify a person with a one-to-one or one-to-few operation False reject rate (FRR) False reject rate (FRR) is another type of error of biometrics system. It is the rate at which a valid user is rejected from the system. Consider a finger print recognition system; unfortunately, the conditions under which the original sample was collected can never be exactly duplicated when the user submits subsequence biometrics information to be compared. False reject rate may occur due to following variations. Rotation and Translation because of different positioning of the finger on the finger print device. Downward pressure on the surface of the input device which changes the scale of input device. Non-permanent or semi-permanent distortions like skin disease, scars, sweat, etc To over come FRR it is essential that all biometrics base authentication systems have a threshold value in order to allow for minor differences. With out threshold value FRR occurs and valid users will be probably rejected by system. If the threshold value is too high FAR occur [9]. It is there for necessary to find a proper threshold value. Organisational environments As stated it is important to consider the organisational environment when selecting biometrics base authentication system. Users with wet, dirty or dry hand have experienced problems with finger and palm recognition system. People using gloves generally cant use these systems. Face recognition system cant be easily be used in medical environments where hood and masks are used by users. Cost The direct cost of the system (hardware and software) is the initial considerations. Due to the improvement of features and functionality the over all cost of biometrics system reduces. It not only reduces fraud and eliminating problems associated with stolen or forgotten passwords but also reduces the help desk role. Summary The subject of this chapter is biometrics, which is defined as a method of verifying an individuals identity based on measurement of the individuals physical feature(s) or repeatable action(s) where those features and/or actions are both unique to that individual and measurable. A biometrics system which consists of enrolment mode and authentication mode, unique physiological characteristics or behavioural mannerisms are examined in biometrics verification for an individuals identity. All biometric systems essentially operate in a similar way in a four-stage process that is automated and computerized which are Capture, Extraction, Comparison and Match/non-match. Biometrics system one-to-one is based on one to one matching and authentication principles and is mainly used for verification purposes, while biometrics system one to many works on the principles of one-to-many recognition and is used for identification. Multimodal biometrics base identification system is used to over come the limitation of the signal identifier biometrics base identification system in which different biometrics base identification system such as face recognition, finger print verification and vice verification, is integrated and worked as a single biometrics base identification system. Methodologies of Biometrics Authentication An overview As stated, different biometric systems are use in different organisations according to their requirements. The most common biometrics system in use today includes fingerprint recognition, iris recognition, and voice recognition and face recognition systems. There are also other biometric systems available like retina recognition, vein pattern recognition, signature and DNA matching systems. These systems are not as widely used yet for various reasons. These biometrics systems can be integrated into any application that requires security, access control and identification or verification of people. With biometric security we can dispense with the key, the password and the PIN code; the access-enabler is a person, not something person know or something in his /her possession. Biometrics systems secured resources are based on who a person is. Biometrics systems also minimise the risk that is associated with less advanced technologies while at the same time offering a higher level of security and convenience. Fingerprint Recognition System Fingerprints are one of the human physiological characteristics that do not change throughout someones life. Even identical twins have different fingerprint patterns. The chance of identical twins to have the same fingerprint is less than one in a billion. Fingerprint recognition is generally considered the most practical system for its reliability, non-intrusive interfaces, and cost-effectiveness. In recent years, fingerprints have rallied significant support as the biometric technology that will probably be most widely used in the future. In addition to general security and access control applications, fingerprint verifiers are installed at different organisations such as, defence/military organisations health care, banking and finance, application services providers, immigration, law enforcement etc. The fingerprints strength is its acceptance, convenience and reliability. It takes little time and effort for somebody using a fingerprint identification device to have his or her fingerprint scanned. Studies have also found that using fingerprints as an identification source is the least intrusive of all biometric techniques. [15] Verification of fingerprints is also fast and reliable. Users experience fewer errors in matching when they use fingerprints versus many other biometric methods. In addition, a fingerprint identification device can require very little space on a desktop or in a machine. Several companies have produced capture units smaller than a deck of cards. One of the biggest fears of fingerprint technology is the theft of fingerprints. Skeptics point out that latent or residual prints left on the glass of a fingerprint scanner may be copied. However, a good fingerprint identification device only detects live fingers and will not acknowledge fingerprint copies. [12] Main Feature of Finger print verification system Analysis of minutia points i.e. finger image ridge (verification) endings, bifurcations or branches made by ridges. One of the most commercially successful biometric technologies. Important for applications where it is necessary to verify the identity of those who gain access. How fingerprint recognition system works In biometrics systems fingerprint recognition system is the fastest verification /identification (One-to-One / One-to-Many) system as shown in figure 3, 4, 5. Like other biometrics recognition systems it performs fingerprint recognition with the help of specialised hardware. This specialised hardware is supported by the conventional computer hardware and special software. All biometrics systems operate in two modes, enrolment mode and authentication mode (as discussed in the previous chapter). A sample of the fingerprint of a live person is provided to the system which is then converted into mathematical code (Template) and stored for the enrolee into the database. In the first step of the authentication process, a fingerprint impression is provided to the system. The system takes a digital image (input image figure 3:1:1 below) using different techniques including scanner, optical, and ultrasound or semiconductor chip technologies. The digital image of the fingerprint includes several unique features in terms of ridge bifurcations and ridge endings, collectively referred to as minutiae. [22] In the next step the system uses an automatic feature extraction algorithm to locate these features in the fingerprint image, as shown in Figure 3:1:2. Each of these features is commonly represented by its location (x, y, and z) and the ridge direction at that location; however the feature extraction stage may miss some minutiae and may generate spurious minutiae due to sensor noise and other variability in the imaging process. The elasticity of the human skin also affects the feature extraction process. [33] In the final stage, a final decision of match and non match is made on the bases of similarity between the two sets of features after compensating for the rotation, conversion and dimension. This similarity is often expressed as a score. A decision threshold is first selected. If the score is below the threshold, the fingerprints are determined not to match; if the score is above the threshold, a correct match is declared an authentication is granted to the person. Iris and Retina Recognition System Biometrics which analyse the intricate and unique characteristics of the eye can be divided into two different fields, Iris and Retina. Iris and retinal scans both deal with the human eye. They are done in an extremely different way as compared to other biometrics technology. Iris Recogniton System Iris recognition biometrics base authentication systems have unique characteristics and features of the human iris used to verify the identity of an individual. The iris is the area of the eye where the pigmented or colour circle, usually brown or blue, rings the dark pupil of the eye. It consists of over 400 unique distinguishing characteristics that can be quantified and used for an individual identity. However, only about 260 of those characteristics are captured in a live iris identification process [25]. Iris are composed before birth and, except in the event of an injury to the eyeball, remain unchanged throughout an individuals lifetime. Eyeglasses and contact lenses present no problems to the quality of the image and the iris recognition /scan systems test for a live eye by checking for the normal continuous fluctuation in the pupil size. As Iris patterns are extremely complex and unique they carry an astonishing amount of information. The fact that an individuals right and l eft eye are different and that patterns are easy to capture, it establishes iris recognition

Monday, August 19, 2019

My Teaching Philosophy Statement :: Education Teachers Essays

My Teaching Philosophy Statement If asked at age 18 if I wanted to become a teacher, I would have answered with an emphatic, â€Å"No.† However, in the past few years my opinions have changed drastically. Growing up with two educators in my household, I decided that I was going to be the different one. I had seen first-hand all the after-school hours required not only to grade papers, but also to organize and create a learning environment that was challenging and stimulating. I would opt for a different career that was less demanding physically, emotionally, and more financially beneficial. Besides, I had made up my mind that I wasn’t going to â€Å"squander† all of my hard-earned money on the many labs that my Dad prepared or the props that my Mother used to â€Å"hook† students in to learning. I wanted to be extremely affluent, and at the time, to me, teaching was not going to fill my financial cup. When first entering college, I changed my major numerous times; bound and determined not to follow the teaching path. However, while in for my spring break from college on year, my focus changed when I visited my mother’s kindergarten classroom. This excursion was unlike any of my previous ones. I noticed how much fun her students were having, and how eager they were to learn. These children were so considerate and innocent, and when I left them that day every single one of them hugged me as I was on my way out the door. This innocent gesture made me relish the sweetness of their spontaneity and uninhibited gratitude for any affection or attention that I gave them. I visited my mother’s classroom every day that week; I helped children with their journals, assisted with phonemics awareness, and played with them outside at recess. When I left that final day it hit me: this is it. This is what I want to do for the rest of my life. In that one week, I had fallen in love with that kindergarten class, and the profession that I had adamantly fought against for years was the one that I could not wait to be a part of.

Sunday, August 18, 2019

Child Labor Essay -- Work Children Research Papers

Child Labor The next time when you are out on your shopping trip, chances you may have support a business that exploits children. It is very disturbing and heartbreaking to learn many children are chained to looms for 12 hours a day because families need to have their child bringing home a small amount of moneys. Child labor has always been a difficult subject to address, the topic have become much more complicated and prolific. Child Labor is not an isolated problem. The phenomenon of child labor is an effect of economic discrimination. In different parts of the world, at different stages of histories, laboring of child has been a part of economic life. More than 200 million children worldwide, some are as young as 4 and 5 years old, are slaves to the production line. These unfortunate children manufacture shoes, matches, clothing, rugs and countless other products that are flooding the American market and driving hard-working Americans out of jobs. These children worked long hours, were frequently beaten, and were paid a pittance. In 1979, a study shows more than 50 million children below the age of 16 were considered child labor (United Nation labors agency data). In 1998, according to the Campaign for Labor rights that is a NGO and United Nation Labor Agency, 250 million children around the world are working in farms, factories, and household. Some human rights experts indicate that there are as many as 400 million children under the age of 15 are performing forced labor either part or full-time under unsafe work environment. Based upon the needs of the situation, there are specific areas of the world where the practice of child labor is taking place. According to the journal written by Basu, Ashagrie gat... ...beneficiaries. The hopes of hundreds of millions are a stake; thinking things through is not just good intellectual practice, it is a moral duty because child labor is a human rights issue. By encouraging more child labor in an immoral way, we are not only taking away those innocent years from them but also the rights to be educated and the rights to be free. What is more of human rights than growing up as a free person, attending school without being held in bondage? Bibliography http://www.american.edu/TED/nike.htm http://www.hrw.org/children/labor.htm http://www.saigon.com/~nike/childlabor.html http://japan.usembassy.gov/e/p/tp-2003011a6.html â€Å"Child Labor: Cause, Consequence and Cure with remarks on International Labor Standards†- www.jstor.org http://econ.cudenver.edu/beckman/econ4410/basu.pdf http://slate.msn.com/id/1918

Saturday, August 17, 2019

Zerg vs. Protoss :: essays research papers

Zerg V. Protoss   Ã‚  Ã‚  Ã‚  Ã‚  On planet Char, controlled by the mind controlling warp weapon, the Zergs, a fierce alien race, were at war with the Terren, a human like race. The Zerg were being pushed off their own planet. So Kerrigan, the leader of Zerg, devised a brilliant plan. She was going to genetically engineer a new breed to help destroy the Terren. They would combine part of them and the Terran to create the Protoss, a new alien race. Their plan is a success and their Protoss is powerful enough to push back the Terren. When Terren hears of the new breed, Protoss, they quickly challenges the Zergs to a battle in order to win over the Protoss. During the battle of Gloopinbopper, Zerg pushes on, with the help of the new creation Protoss. After days of battling and heavy losses they easily overruns the Terren and out numbers them ninety-eight thousand seven hundred and thirty four to thirty-seven thousand four hundred and fifty two. The Zerg’s final push to reconquer their home planet and retake the mind controlling warp weapon is once again a success. After the long and strenuous battle the Protoss begin to realize the sheer strength they possess within themselves. They decide that they are tired of being treated as pure slaves and begin to devise a plan to overthrow the Zergs and take over of the mind controlling warp weapon. After months of planning they finally have a devious idea on how to take over. But w hile still in the planning stages the Zerg realizes what they are planning and attack. The Protoss are caught off guard and have no choice but to retreat to the deserted planet of Pigglywigglywump. The Terren hear of what is going on between the Protoss and the Zerg. So they decide to use what little troops they have left to try to take over the weak Zerg and buy the Protoss time. With the time the Protoss gain they build a crystal powered mega bomb that is capable of destroying anything and everything around it, with the exception of the Protoss. In the meantime the Zerg have destroyed the Terran and are planning to continue their attack on the Protoss.

Unilever Org Structure

?Unilever has undergone various organizational structure changes since its inception. It initially started with a decentralized structure from 1950- 1980. Decentralization gave the company an advantage as they had the flexibility to change according to local consumer demand. They appointed managers who were local to that place so that the company had a good understanding of local market. The local managers were responsible for everything from marketing, sales and distribution.But Decentralization led Unilever to not have any common corporate culture or vision. It also led them to duplication of products, resulting in high costs. Moreover, they had less focus on globalization and couldn’t create global brands. In 1990 the company changed its structure based on business groups. The company became more centralized. They streamlined their operations so that they could get the products onto the market quickly. This structure too failed as they were no coordination between head offi ce, regional and national groups.The decisions were made by regional heads and local managers had no power to change them to suit to local markets. Finding a right balance between centralization and decentralization was their major problem. In 1999, Unilever decided to adopt a â€Å"Path to Growth Strategy†. They realized that they had a broad range of products and never had any focus on ones in which they were one among the top in market. So they switched to a structure based on global product divisions. Unilever was split into two separate global units namely Food and HPC headed by two executive directors.But they still had problems as the company had 2 separate chairmens in different countries which led them to operate as separate entities (Unilever NV and Unilever PLC. ). In 2005 as part of â€Å"one Unilever† Programme they scrapped this management structure by naming Patrick Cescau as single chief executive of Unilever. The company started to operate with matrix structure with multiple lines of authority based on product, regional and functional divisions. The company currently has 4 product divisions namely Foods, Personal Care, Home care and Refreshments headed by 4 different people.They have got 8 leads based on regional splits heading North America, Europe, North Asia, South East Asia and Australasia, South Asia, Latin America, Africa (Central Africa and South Africa) and Russia/North Africa and Middle East. In terms of functional division there is a finance, marketing, R&D and HR departments. This simplified management structure has given all the Unilever top managements greater accountability and better leadership. It has helped them to eliminate duplication, take faster decisions, target on specific products and capture the global and local market. Unilever Org Structure Unilever has undergone various organizational structure changes since its inception. It initially started with a decentralized structure from 1950- 1980. Decentralization gave the company an advantage as they had the flexibility to change according to local consumer demand. They appointed managers who were local to that place so that the company had a good understanding of local market. The local managers were responsible for everything from marketing, sales and distribution.But Decentralization led Unilever to not have any common corporate culture or vision. It also led them to duplication of products, resulting in high costs. Moreover, they had less focus on globalization and couldn’t create global brands. In 1990 the company changed its structure based on business groups. The company became more centralized. They streamlined their operations so that they could get the products onto the market quickly. This structure too failed as they were no coordination between head offic e, regional and national groups.The decisions were made by regional heads and local managers had no power to change them to suit to local markets. Finding a right balance between centralization and decentralization was their major problem. In 1999, Unilever decided to adopt a â€Å"Path to Growth Strategy†. They realized that they had a broad range of products and never had any focus on ones in which they were one among the top in market. So they switched to a structure based on global product divisions. Unilever was split into two separate global units namely Food and HPC headed by two executive directors.But they still had problems as the company had 2 separate chairmens in different countries which led them to operate as separate entities (Unilever NV and Unilever PLC. ). In 2005 as part of â€Å"one Unilever† Programme they scrapped this management structure by naming Patrick Cescau as single chief executive of Unilever. The company started to operate with matrix s tructure with multiple lines of authority based on product, regional and functional divisions. The company currently has 4 product divisions namely Foods, Personal Care, Home care and Refreshments headed by 4 different people.They have got 8 leads based on regional splits heading North America, Europe, North Asia, South East Asia and Australasia, South Asia, Latin America, Africa (Central Africa and South Africa) and Russia/North Africa and Middle East. In terms of functional division there is a finance, marketing, R&D and HR departments. This simplified management structure has given all the Unilever top managements greater accountability and better leadership. It has helped them to eliminate duplication, take faster decisions, target on specific products and capture the global and local market.

Friday, August 16, 2019

Financial statement analysis Essay

Financial statement analysis is a process which examines past and current financial data for the purpose of evaluating performance and projecting future risks and potential of a company. Financial statement analysis is used by various people and companies for different reasons, e.g. investors, creditors, lending officers, managers, employees and many other parties who rely on financial data for making economic decisions about a company. The objective of this David Jones financial statement analysis is to identify the company’s performance issues, to provide suggestions and recommendations by employing the Ratio Analysis method and analysing Profitability, Efficiency, Short and Long term Solvency, and by using Market Based Ratios. The following report outlines the financial performance of David Jones Limited based on the FY2011 & FY2012 Annual Reports. The key measures used to assess company performance are Profitability, Efficiency, Short & Long-term Solvency and Market-Based Ratios. David Jones has performed well in a few areas which include having solid cash flows, low debt, a strong balance sheet and assets in prime locations; however there is definite room for improvement with regards to sales performance, and it needs to address the high cost of sales and sluggish inventory in order to turn around company profitability and performance. We have studied your 2011 and 2012 financial reports and statements and can see that your company’s sales performance has been declining year on year. Sales revenue for FY2012 was down -4.8% when compared to FY2011, and FY2011 sales were down -4.45% vs. FY2010. Your chairman and management have blamed this on the depressed consumer sentiment and increased global competition as a result of the strong Australian currency. â€Å"The uncertainty of Europe and USA and volatility in global equity market have contributed to a general feeling of uncertainty, the strong Australian dollar also contributed to price deflation and encouraged spending offshore.† (page 2, Annual Report) Profitability In FY2012, all measures of profitability were considerably down on last year. Gross Profit was down from $767m to $670m, and the Gross Profit margin (GP %) was down 160bp to 37.5% (-4.2% on FY2011: 39.1%). The poor GP % has been the result of discounting in a competitive environment and dealing with excess inventory on hand at the commencement of FY2012 (page 5, Annual Report). When compared to your main competitor Myer (Market Capitalization 1.59b1 Vs. DJS 1.477b2), there is a large variance between the Gross Profit Margins of the two companies (Myer GP % FY2012: 49.3%3, +160bp from previous year, DJs-FY2012: 37.47% -160bp). This can be attributed to Myer’s much lower Cost of Goods Sold (COGS) (Myer 56% Vs. DJs 62.5% in FY2012). Myer has a competitive advantage in the marketplace with a larger network of stores and greater buying power. Their larger volume of purchases may mean they are able to obtain lower cost prices with suppliers. However, there are a few key areas you have identified in your Future Strategic Direction plan which we feel will assist in lowering your COGS and result in a better GP % rate. Firstly, signing exclusive brands to your portfolio will ensure product differentiation to customers and better control over supplier trading terms and prices. Secondly, the Cost Price Harmonisation that you are engaging in with suppliers (page 3, Annual Report) is key to maintaining your GP % and ensuring that your COGS do not rise and prices do not become uncompetitive with international retailers. Thirdly, discontinuing lower margin categories and moving towards a greater product mix of higher margin categories (page 4, Annual Report) will increase your GP % in the long run and ensure you maximize the profit outcome from the inventory you carry. For example, introducing more private label house brands could be one strategy in which to increase the proportion of higher margin products in your portfolio. The Net Profit Margin in FY2012 dropped drastically compared to FY2011 (-36.9%, $101 vs. $168 million), with sales revenue dropping -4.8% ($1.867b vs. $1.962b). It was however, on par with Myer at 5.4%. The main factor contributing to the big fall in net profit were the high operating expenses over FY2012. Depreciation expenses were up by +13.23%, leasing expenses were up by +6.1%, advertising and marketing had gone up +19%, administration expenses were up by +29.4%, and finance costs were up +40%. Excess inventory during the clearance period also resulted in heavier discounting and contributed to the fall in net profit. Whilst your company has noted Cost of Doing Business (CODB) Reductions as one of the points in your Future Strategic Direction Plan, there are many other areas that can be addressed to ease operating costs. For example, a reduction in the size of all or some of your retail stores will result in savings in store costs such as leasing, staff, utilities, and so on. This could be implemented in conjunction with the Omni Channel Retailing strategy as highlighted as the first point in your Future Strategic Direction Plan (page 3, Annual Report), as customers move away from traditional bricks and mortar shops and increasingly to online shopping destinations. The excellent growth rate in HY2013 of your online store4 highlights the opportunities in the online channel and the change in customer shopping behaviour. With regards to the Asset Turnover ratio, your company performed slightly better than Myer Holdings in FY2012 (1.5 Vs 1.34, Refer to Appendix B). Internally, there was an 8% drop that was due to sluggish sales performance (1.5 Vs. 1.63, Refer to Appendix A). Since your Net Profit Margin dropped dramatically in FY2012, the Return on Assets (ROA) followed suit and decreased by -41% (from 13.96 to 8.23, refer to Appendix A); not a good result in asset management performance. Your company’s property portfolio consists of 4 buildings valued at $612 million (page 5, Annual Report). All of these buildings are in the prime locations, with two in the Sydney CBD and two in the Melbourne CBD. The rental income is assumed to be in the vicinity of $39 million per annum (page 5, Annual Report). If a reduced size store was considered, a potential income of $10-15 million could be generated per annum, increasing the net profit percentage by 9-14% (Net Profit FY2012 – $101,103,000). Your company’s re-development consideration is a long-term process and we believe it will be successful in generating positive ROA with the appropriate planning. Improving the Gross Profit margin while maintaining current overheads will result in a positive increase in the Net Profit margin position and enhance the overall performance of the company. Efficiency Efficiency is more meaningful when compared to peers in the same industry and can assist in identifying businesses that are better managed relative to others. By comparing your figures with Myer, your company performed better in Inventory Turnover (89 days vs 96 days, Appendix A & Appendix B), which means you have a better stockturn and are generating revenue from your inventory in a shorter period of time. However, 89 days is still a fairly high measure as it means you are sitting on stock for an average of 3 months before it is sold through. To improve your inventory turnover, you could consider dropping your bestselling items more frequently to stores, but with smaller quantities each time. This will ensure that the stores which are selling through the stock quickest remain in stock at all times, without a large amount of unsold stock building up in the slower performing stores and affecting your inventory turnover. It also means you will be generating sales and cash more quickly from your stock investment. Myer performed slightly better on â€Å"Average Days Sales Uncollected† (DJS: 3.5 days vs. Myer: 2.5 days, Appendix A & B). To improve this measure for example, you could encourage more online sales to generate faster turnover into cash than store card sales which are monthly billings. Internally, FY2012 performed slightly better than FY2011 in Average Days Sales Uncollected (FY2012: 3.5 vs. FY2011: 4 days) but worse in Inventory Turnover (FY2012: 89 vs. FY2011: 87 days). The differences were negligible. Short-Term Solvency David Jones has a good ability to meet its short-term financial obligations, with a Current Ratio of 1.05 in FY2012 (Appendix A) outperforming Myer at 0.88 (Appendix B). However, since the Quick Ratio is not high at 14.4% (Appendix A), short-term liquidity could be an issue. When compared with Myer at 11% (Appendix B), David Jones has performed better. The Current Ratio performed better in FY2011 than FY2012 by 14.6% (Appendix A). The main reason for this is the 15.1% increase in Current Liability ($306 million Vs. $266 million), with the $40 million difference due to an increase in Account Payables. There is no change in the Quick Ratio from FY2011 to FY2012 (14.4%), i.e. on the low side and short-term liquidity can be an issue, should not allow it to be deteriorate. The â€Å"Cash & Cash Equivalents† and â€Å"Receivables† figures totaled $36.935 million which represented around 14% of â€Å"Payables† in the 2012 Annual Report. In order to achieve a better short-term liquidity position, a more efficient ordering & inventory control system should be implemented. Less inventory on hand equates to more cash and liquidity. Excess inventory can jeopardize a company’s liquidity, in addition to causing stock problems and markdowns at the end of a season as was evidenced in FY2012. Long-Term Solvency You company performed much better than Myer Holdings in the area of Long-Term Solvency. Your company has demonstrated consistency in this area and long-term solvency should not be an immediate issue with your organization. The Debt to Equity ratio showed that there was an increase of 11% in FY2012 compared with FY2011 (Refer to Appendix A), i.e. the liability has gone up relative to shareholders’ equity. The main contribution to the increase is due to the +22.3% ($265m Vs. $216m) increase in the Payables account. It is important to ensure that this trend does not continue and that debt does not continue to rise when compared to equity levels. With strong non-current assets of $917 million & total assets in excess of $1.24 billion, the Debt to Total Assets ratio is healthy, with FY2011 at 35% and FY2012 at 37% (Refer to Appendix A) respectively. The extra 2% was due to the liability increase and it was the fallout of excess inventory as discussed in the short-term solvency section. Market-based Ratios To calculate the Price/Earnings (P/E) Ratio, we used the share price on 16/5/2013 ($2.80). This equates to a PE ratio of 14.43, with the Earnings yield ratio at 6.93% and the Dividend yield ratio at 6.25% (dividend was 17.5c). Myer Holdings’ dividend yield was around 7% (dividend of 19c with share price at $2.70). The market-based ratio is higher than your main competitor (Myer PE ratio is 11.8)5. However the Price/Earnings ratio indicates that today’s share price of the company is on the low side as it is below 15. The majority of analysts believe that the company is performing below par and do not recommend buying or holding David Jones shares at the moment. Eva Brocklehurst of FNArean.com is quoted as saying in March 2013, † David Jones (DJS) is transforming. For brokers it’s not a moment too soon, as department stores have been plagued by a soft consumer environment and a need to respond to new trends in shopping. In its first half results the company has flagged progress with its strategic plan, reducing costs and expanding margins. Earnings were ahead of expectations for the half but sales growth was not. What pleased was the increased margin. What concerns brokers? Most importantly, a lack of sales momentum. There’s no Buy rating on the FNArena database. Two brokers have downgraded ratings to Sell in the wake of the results. There are five Sell ratings. There was one upgrade to Hold, and there are three Hold ratings. The consensus target price is $2.73, suggesting 11.5% downside to the last traded share price. A dividend yield of 5.5% is reflected in consensus earnings forecasts for FY13.†6 Performance Issues As highlighted above, your declining sales performance is the biggest concern for shareholders and needs to be addressed immediately. Whilst earnings were ahead of expectations, this was managed by cost reductions and a move towards increased margins. An improvement in sales in conjunction with the efforts you’re undertaking to reduce expenses and the cost of doing business will result in an improvement in the bottom line and signal confidence in the company and a turnaround for investors. David Jones has been labelled as an up-market department store. Australia’s $12 billion fashion retail industry is forecast to grow by only 0.5% in FY2012 with only an average 1.2% annualised growth expected for the next 5 years, according to analysis group IBISWorld. Furthermore, IBISWorld says shoppers are now more likely to buy low to mid-range priced clothing which has contributed to the declining value of retail sales. In general, the outlook is not too positive for the industry.7 Greater differentiation is required between David Jones and Myer in order to attract and retain customers. Mark Ritson, Associate Professor of Marketing at Melbourne Business School commented, â€Å"David Jones and Myer are just two sides of same boring coin.† He says, â€Å"I still believe to this day that most people coming out of either David Jones or Myer on Bourke Street don’t know which one they just come out of.†7 Some of the issues have been addressed by your company’s Future Strategic Direction Plan, for example, a move towards Omni Channel Retailing, building a â€Å"Home of Brands† strategy which differentiates David Jones from Myer, and cost improvements including GP margin improvements, CODB reductions and Cost Price Harmonisation with suppliers (pages 3-6, Annual Report). Conclusion A thorough review of your company’s FY2011 and FY2012 Financial Report & Statements has indicated that David Jones has a strong balance sheet, solid cash flows, low debt, and assets in prime locations. David Jones has performed on par, or better than Myer in the areas of Net Profit Margin, Asset Turnover, Inventory Turnover, and Short & Long-term Solvency. However, the company’s declining sales performance is the biggest area of concern. Almost all measures of profitability were worse than Myer and have been falling when compared to David Jones’ own performance in prior years. We believe that further differentiation from Myer, cost reductions & margin improvements, harmonization of prices to become more competitive with international competitors, better inventory management & a reduction in excessive stock, reduced retail floor space, and the move towards Omni-Channel Retailing will enhance the value of your company and result in better performance for all stakeholders. We hope this report has provided insightful recommendations into improving the performance of your company. This report has been generated for your company’s own reference and not for any other purposes. Other companies or individuals should not use or rely on any material contained within this report without the consent of our office.