Thursday, October 31, 2019

The high salaries paid to CEOs are not justified. To what extent do Essay - 1

The high salaries paid to CEOs are not justified. To what extent do you agree with this statement - Essay Example To the contrary junior employees’ salaries have stagnated or dropped and where they are raised the increment in percentage is insignificant compared to the CEOs increment in percentage within the same period. The paper will aim to consider the various facets surrounding the issue and the evidences under each. The CEOs salaries are not necessarily the true reflection of their performance or skills and therefore not justified to be that high. Companies that have awarded hefty pay packages to their CEOs have not been necessarily the highest performers in the business. To some extents these companies’ performance has been dwindling over time. This phenomenon therefore has raised genuine concerns over the unreasonable salaries the CEOs take home. An example of this kind of a scenario is Eisner of Disney who pocketed 38 million US Dollars in 2004 (Stanford GSB, 2005). This was way above the average in the entertainment industry at the time. This amount was awarded not considering that under his 6 years tenure till then, the company’s performance was actually on the decline during half of that period. The CEOs pay when compared to that of the junior staff members has risen to a staggering 400 percent from around 90 percent a decade ago (Frydman 2008). Looking at these figures and disparity one cannot help but question the trend. The obvious conclusion a lay man would lay to this scenario is that the high pay is hooked to performance and level of skill that the new manager has. In looking at this assumption it is in almost all cases that other factors other than skills and performance contribute to the huge salaries. It has been seen that in big companies where the chance of having pay not related to performance, the CEOs end up getting more than their counterparts in the small firms. This situation is usually worse in cases where the pay has been in form of stocks and where the firm has a large shareholder. In this latter scenario there is a high likelihood

Tuesday, October 29, 2019

Homosexual Love Essay Example | Topics and Well Written Essays - 2500 words

Homosexual Love - Essay Example Of 70 groups, homosexuality was accounted for to be no attendant or extraordinary in recurrence in 41, and present or not exceptional in 29. In societies impacted by Abrahamic religions, the law and the congregation secured homosexuality as a transgression against heavenly law or a wrongdoing against nature. The judgment of butt-centric sex between guys, then again, originates before Christian conviction. It was incessant in old Greece; "unnatural" might be followed once more to Plato.clarification needed This is clearly the most widely recognized sexual introduction on the planet, because of science. (You can just get posterity if a male and female have intercourse) and likely because of religious and social components (it’s a wrongdoing in a few spots to not be hetero, and numerous religions denounce homosexuality/androgyny) Notwithstanding, simply on the grounds that it’s the most well-known, and "socially/organically/religiously" correct, doesnt fundamentally mean homosexuality and cross-sexuality arent right or "abnormal". Everybody ought to have the decision and right to be what he or she needs to be, including his or her sexual decision. It is in nobody spot to judge or censure individuals in light of their sexuality. Much the same as it is inappropriate to judge individuals dependent upon his/her race, sex or socio-financial class. Numerous recorded figures, including Socrates, Lord Byron, Edward II, and Hadrian, have had terms, for example, gay or promiscuous connected to them; a few researchers, for example, Michel Foucault, have viewed this as taking a chance with the chronologically erroneous presentation of a contemporary social develop of sexuality remote to their times, however others challenge this. An ongoing theme of constructionist contention is that nobody in classical times or the Middle Ages accomplished homosexuality as a selective, changeless, or characterizing mode of sexuality. John Boswell has

Sunday, October 27, 2019

Gender differences when attending a mirror tracing task

Gender differences when attending a mirror tracing task The purpose of this study was to test the hypotheses of speed and accuracy when practicing Mirror Tracing between men and women as well as the difference between genders with skill transferring when completing this task. The sample consisted of 243, 170 females and 73 males online and on campus university students who participated in the Mirror Tracing task for one week. Results indicated that as predicted, men were more accurate and faster than women when attending to the Mirror Tracing task. They also scored higher on skill transferring than women. It was concluded that men score higher on spatial tasks than women do, however the differences in spatial skills between men and women can be credited to learning. Each hemisphere of the brain specialise in different tasks, the left hemisphere is mostly responsible for linguistic functions while the right hemisphere is mainly responsible for complex visuo spatial analysis (OBoyle, Hoff Gill, 1995). The Mirror Tracing task has been studied for many years and is considered to be a study of trial and error (Ketterlinus, Sep31, Vol. 2 Issue 3, p200). Mirror Tracing has been used to study the differences between men and women, however as indicated by), the difference in spatial ability with genders can be attributed to learning (Halpern, 2000 Kimura, 1999). On average, females perform not as well as males in spatial abilities Spence et al. (2009), mirror tracing has become a very important and popular study to use when determining differences in abilities. Each spatial task focuses on different aspects of it, some focus on problem solving skills where others focus on mental orientation Spence et al. (2009). Mirror Tracing focuses on repetitive motions as participants are required to draw the same shape or shapes over a period of time by only looking in the mirror at it. Mirror Tracing has its limitations as it focus is mainly on a limited amount of shapes which with time and practice either gender can perform well. However it does measure the speed and accuracy of how the each gender (OBoyle, Hoff Gill, 1995). Past studies, such as O Boyle, Hoff Gill (1995), have come to a conclusion that males have excelled in spatial tasks more than females and determined that males are able to attend to this task with more accuracy than females. In this study the aim is to determine whether speed and accuracy differs between genders and to measure the differences in skill transferability of participants of different genders. It was predicted that males will be faster and more accurate when practising mirror tracing compared to females. It was also hypothesised that males will have a higher score with regards to skill transferability in terms of speed compared to females. Method Participants The sample consisted of 243, 170 females and 73 males online and on campus University students. The mean ages was 21.85 (SD = 5.8). All participants participated in the Mirror Tracing task for one week. Materials Mirror tracing skills transferability of this skill in males and females was determined using a Mirror Tracing exercise. Each participant was provided with instructions on how to complete the Mirror Tracing exercise and experimental material with star and face shapes in it. Each participant had to use a mirror, pen or pencil, cardboard or similar to block the view and a clock or stopwatch. Finally each participant was also provided a summary of results sheet to note down their individual results. To accurately score and record the results, participants had to count how many times they touched the line and count that as one error, each time they went over the line was counted as two errors and any breaks in the line were counted as one error. Procedure Before filling out the summary of results sheet, all participants were informed of the following: the purpose of the study, nature of the study, anonymity and provided with information of how to do the Mirror Tracing task. Participants completed the task either online or on a paper copy and returned it to the tutor. The experimental material used was star and face shapes to measure speed, accuracy and skill transferability between men and women. Each participant had to trace one star and one face with each hand on day 1. For the next five days each participant had to trace four star using each hand and on day 7 trace a final face and star with each hand. To complete this task, the participants had to place the sheet with the shape on it on a table with a mirror in front of it still being able to see their hand in it. They then had to hold the cardboard above the shape, check and record the time and start tracing it. This had to be done with both hands. The participants had to record the time it took them to complete the activity on the Summary of Results sheet and return it to the tutor once completed. Results There was very little mean difference in the mirror tracing exercise for day 2 day 6 between men and women in regards to speed and errors, however the results indicate that men tend to be quicker and more accurate than women in this spatial task. The results indicate that as predicted, men were slightly quicker and accurate than women when attempting the mirror tracing exercise as indicated in Table 1 and 2 below. Initially on day 2, women were quicker at the exercise than men and for both participants, the speed did increased and errors decreased as the days went on, however the results for males are somewhat higher than females. The Standard Deviation for both is also very similar as indicated in Table 1 and 2 below. Table 1 Means and Standard Deviation of the Mirror Tracing Task Day 2 Day 6 for speed between men and women Report Gender practice2_time practice3_time practice4_time practice5_time F Mean 112.8293 100.7399 91.6370 84.5834 N 167 167 167 167 Std. Deviation 75.29216 64.04660 58.79142 49.88509 M Mean 130.1631 107.9093 100.1247 86.8376 N 72 71 72 71 Std. Deviation 82.41461 76.36392 82.37136 54.71729 Total Mean 118.0512 102.8787 94.1940 85.2558 N 239 238 239 238 Std. Deviation 77.74119 67.86959 66.70926 51.26775 Notes: F = Females; M = Males Table 2 Means and Standard Deviation of the Mirror Tracing Task Day 2 Day 6 for accuracy between men and women Report Gender practice2_errors practice3_errors practice4_errors practice5_errors F Mean 30.4850 24.7425 20.7844 18.1138 N 167 167 167 167 Std. Deviation 19.70134 15.14626 14.24574 13.26624 M Mean 29.0833 25.1408 22.0000 20.2394 N 72 71 72 71 Std. Deviation 21.73512 19.37546 17.47916 15.56137 Total Mean 30.0628 24.8613 21.1506 18.7479 N 239 238 239 238 Std. Deviation 20.29945 16.48019 15.26442 13.99079 Notes: F = Females; M = Males The results for males for skill transferability in terms of speed when drawing the star shape were longer on day 1 however became shorter on day 7 compared to the females results. When drawing the face shape, males only have a slight difference in speed compared to women. The Standard Deviation and mean does not appear to have much of a difference in both results for both genders. The Tables below will demonstrate the results for both genders and both shapes. The results indicate that males score higher than females for skill transferability in terms of speed. Table 1 Means and Standard Deviation of the Mirror Tracing Task Day 1 Day 7 for speed between men and women Star Shape Report Gender Star_day1_time F Mean 155.9722 N 168 Std. Deviation 80.94931 M Mean 183.7635 N 72 Std. Deviation 94.60747 Total Mean 164.3096 N 240 Std. Deviation 86.02650 Notes: F = Females; M = Males Table 2 Means and Standard Deviation of the Mirror Tracing Task Day 1 Day 7 for speed between men and women Face Shape Report Gender day1_eyes_time DAY7_EYES_TIME day1_beard_time DAY7_BEARD_TIME day1_lips_time F Mean 68.9262 44.2241 50.1544 34.7455 39.1005 N 170 169 169 168 170 Std. Deviation 69.00433 33.65402 50.52303 35.44573 60.49047 M Mean 73.8775 43.9458 51.7029 32.9751 37.2300 N 72 72 73 73 72 Std. Deviation 38.01924 20.52175 28.36886 20.76469 24.18248 Total Mean 70.3993 44.1410 50.6215 34.2092 38.5440 N 242 241 242 241 242 Std. Deviation 61.40059 30.28893 44.94811 31.69008 52.33488 Notes: F = Females; M = Males Discussion The results of the study support both of the hypotheses for speed, accuracy and skill transferability between men and women. There are slight differences that are noticeable in mean and Standard Deviation in both men and women. The accuracy has improved over time for both genders however there was not a noticeable difference between them. Both genders also improved on their speed over the course of this task, however males did become faster than women when completing this task. As per Spence et al. (2009), the differences in spatial abilities between genders can be credited to learning. As identified by Voyer, Voyer and Bryden (1995), men tend to do better in performing some spatial tasks compared to women Spence et al. (2009), and according to this study men did perform better than women. Women tend to do better than men in tests of perceptual speed (Kimura 1992), verbal fluency and precision motor control, while males excel on some spatial tasks (OBoyle, Hoff Gill, 1995). The aim of this study was to determine whether speed and accuracy differs between genders and whether the difference in skill transferability of participants is different between genders. The results indicate that there is a difference in speed and accuracy between men and women when attending to spatial tasks. Men also tend to be able to score higher on skill transferability compared to women. These findings support the findings of O Boyle, Hoff and Gill (1995). There were some issues identified with this study that may have affected the results. The data was collected after a week with no guarantee that the off campus students have not falsified their results. There is no way of tracking who actually did the task accurately and who made up their results. Another issue that was identified was that the results were due on a certain date and were then extended, however the submission area was not changed and all results were to be sent to the Tutor. Some students were late with their submissions and the results were released late, which minimised the time other students got to write up the report. Overall, the results supported both hypotheses which indicated that men would generally be faster and more accurate than women when attending to the Mirror Tracing task as well as score higher on the skill transferability with spatial tasks. The aims of this report were also met as it has demonstrated the differences in gender with regards to speed and accuracy as well as the differences with skill transferability in genders.

Friday, October 25, 2019

Essay On Evolution -- essays research papers

Essay on Evolution   Ã‚  Ã‚  Ã‚  Ã‚  There are many mechanisms that lead to evolutionary change. One of the most important mechanism in evolution is natural selection which is the differential success in the reproduction of different phenotypes resulting from the interaction of organisms with their environment. Natural selection occurs when a environment makes a individual adapt to that certain environment by variations that arise by mutation and genetic recombination. Also it favors certain traits in a individual than other traits so that these favored traits will be presented in the next generation. Another mechanism of evolution is genetic drift. Genetic drift is a random change in a small gene pool due to sampling errors in propagation of alleles or chance. Genetic drift depends greatly on the size of the gene pool. If the gene pool is large, the better it will represent the gene pool of the previous generation. If it is small, its gene pool may not be accurately represented in the next generation due to sampling error. Genetic drift usually occurs in small populations that contain less than 100 individuals, but in large populations drift may have no significant effect on the population. Another mechanism is gene flow which is when a population may gain or lose alleles by the migration of fertile individuals between populations. This may cause the allele frequencies in a gene pool to change and allow the organism to evolve. The most obvious mechanism would ...

Thursday, October 24, 2019

A Medium of Spirituality?

In most cases of media-oriented or group worship traditions, there are many different factors to consider such as the rhetorical methods and its implications and the mode in which these worship practices are addressed in the different traditions. Thus, the formation of such religious and worship practices come into context with the prevailing method of communications, especially in our modern context – the media.There are numerous facets of media and communications today that even spirituality attempts to plant itself on these kind of communicative phenomena. As such, a specific worship experience, perhaps commonly prevalent today, is through the television. These religious shows are mostly based on the reading and interpretation of passages from the bible through some authoritative assumptions and conclusions.In his book, A History of Christian Spirituality, Urban Holmes categorizes the different modes of spirituality and worship traditions through a combination of four quadr ants of a ‘circle of sensibility.’ The north polar end of the diagram is categorized as the rational or cognitive pole.The south polar of the same line is the emotional or affective side. The east and west is categorized as kataphatic (for speech) and apophatic (against speech), respectively. Thus, through the combination of these four different areas, we may find some mode of spirituality categorized as kataphatic-cognitive, apophatic-affective, among others. As such, the different traditions of worship are categorized whether it appeals to the emotions, the intellect, or the preference for written/oral traditions or not.An example of these different modes of spirituality or worship is through television shows that provide an interpretation of the scripture.These bible-oriented interpretative shows are then categorized, according to Holmes, on the speculative-kataphatic or cognitive-kataphatic. Since most readings require interpretation during these sessions, then most spirituality expressed in these is through a interpretative method coupled with some consideration with an intellectual understanding. Also, the methods in which these lectures are addressed are also taken into consideration since varying methods of rhetorical delivery may also affect such theological understanding.For example, a bible show that presents an argument on the goodness of God then meticulously chooses passages from the bible to support the argument (intellectual), and the interpreter then presents his or her own views regarding the subject matter. There are of course a number of speech methods that ultimately affect the interpretation of the viewers themselves as it appeals to an emotional construct of the person.The method of inquiry through interpretation may be too diverse to explain whether such interpretations affect the intellectual or emotional aspect. In terms of spirituality, these newer methods of theological proclamation then posit two problems: first is the authenticity of the spirituality produced conveyed through a non-personal approach (e.g. television instead of live or ‘practical’ worship practices). Second is the affectivity of such methods compared to a more personal understanding of theological ideologies. We must first then consider the authenticity of such spirituality in the given circumstance.Through television, the information conveyed by the scripture(s) becomes somehow stratified through a selective process of theological topics instead of a diverse and explorative manner of topic discussion. These shows are not wholly aimed for the purpose of elevating spiritual consciousness but rather, just like any other television program, are much more concerned on viewer ratings and the advantages to other competitions similar to that of the program.Thus, authenticity of the spirituality espoused in these shows is in question. Can these shows provide the same level of spirituality as that of a normative worship pract ice? In some way, the affectivity of these may cause some further theological discussion involving the scriptural context that appeals the intellect. However, it cannot be said that these shows are a main tenet of producing spirituality in such a way that these kinds of discussions are carefully structured in order to gain more viewers instead of gaining more theological understanding.

Wednesday, October 23, 2019

Acknowledgement

Chapter 1 The Problem and its Background Introduction The term RFID refers to Radio Frequency Identification, a technology which uses radio waves to automatically identify items or people. Most commonly this involves the use of an RFID tag and a reader device. In general terms, Radio Frequency Identification systems consist of an RFID tag (typically many tags) and an interrogator or reader. The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator.The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Stud y Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification.The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information.On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library use rs of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the StudyGenerally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the sy stem’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration.This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers.Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system.The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual ParadigmBelow is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy – is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management – is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records.Database – is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System – is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification – is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign LiteratureHolloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information.Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies.They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system.Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the proj ect that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and improve the current way of identifying students at Tarlac State University.The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes.Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of a rrival and departure within the school premises. B. Related Studies Foreign StudiesA study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard.His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services m ade a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study.Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students.This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that th e researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie TheaterCharging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems & improve charging operations of the system implied on improvement in the efficiency, reliability & accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of.In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers.This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations.It often uses visual aids such as graphs and ch arts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. SamplingThe researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered.Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture.If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be cond ucted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System.After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft .Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024Ãâ€"768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed SystemUser and Needs of the Study Proposed system is the T anauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization.Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books a re all able to be achieved. The library can adopt RFID technology aim of improving the self-service.Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 ImplementationProgram Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had an y wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike.The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface.C. Hard Disk – wherein the system is stored and the soft co py of the documentation is saved. D. Ballpen & Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives.Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the rese archers put a login form on the system to ensure that no one can access or view, only the end user can use it.Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1.Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. P roviding back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and RecommendationSummary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind.Modified waterfall was the research model used by the researchers which helped them in the distribution of the tas ks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. ConclusionThrough months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: †¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month.They can now finally be assured regarding the accuracy and reliability of the data generated. †¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. †¢ The system was able to track whom librarian is accountable for the loss of a returned material. †¢ The system was able to help them in reminding the students regarding their unreturned materials. RecommendationsFor the future researchers to improve, the researchers suggest the following: †¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed †¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button †¢ Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..