Wednesday, July 31, 2019

Machine Learning

Journal of Machine Learning Research 18(2017)1-29 Submitted 6/14; Revised 10/sixteen; posted 1/17 Content Mining a New Technique in Data MiningUsman Ahmad Urfi [email  protected] UniversityMphil cs (1st) , F-17-3224Editor: Usman Ahmad Urfi Abstractstatistics mining is the gaining knowledge of revelation in databases and the gaol is to cut up examples and data from masses of facts. The essential term in facts mining is content mining. Content material fabric mining removes the pleasant facts pretty from content cloth. Real instance getting to know is carried out to first rate records. Excessive – satisfactory in content fabric mining characterizes the blends of significance, curiosity and intriguing awesome. Undertakings in content material cloth mining are content affiliation, content grouping, detail extraction and slant exam. Utilizations of ordinary dialect preparing and scientific strategies are very favored to convert content material into information for investigation. This study is ready the one of a kind techniques and calculations applied as a part of content material mining. Key phrases: data mining, text mining, gaining knowledge of disclosure Introductioncontent material fabric mining is to deal with found out information. Revealed records is unstructured, vague and control is tough. Content material digging is excellent technique for facts exchange. A non-conventional information restoration methodology is implemented as part of content material mining. For getting statistics from massive association of literary information which become finished through the content material mining. The figure1 is described with the method of content material mining. As of late, dialect exam may be shown improvement over the man or woman. The guide techniques had been costly and tedious method. To perform this purpose of content fabric mining, there are unique advances are sent. The enhancements are information extraction, outline, subject matter following, order and bunching. Mastering Discovery from text (KDT) [6] is one of the issues to deduce sure and unique thoughts .Natural Language Processing (NLP) [8, 13] strategies are carried out to find out the semantic circle of relatives participants between mind. Amazing diploma of content cloth statistics is accounted via the studying revelation. Data Discovery from textual content (KDT) is produced from herbal Language Processing (NLP), whole the strategies from gaining knowledge of management. Disclosure way is conveyed for the rest. KDT assumes a logically noteworthy detail in inclining applications, for instance, text expertise. §c 2017 Ishiguro, Sato and Ueda. License: CC-via four.0, see https://creativecommons.Org/licenses/by means of manner of/four.Zero/. Attribution necessities are furnished athttp://jmlr.Org/papers/v18/14-249.Html.HistoryThe content material cloth mining has numerous techniques to system the content material fabric. The principle structures are clarified proper here. 2.1 facts Extraction records extraction is an underlying boost for unstructured content breaking down [6]. Disentanglement of content material material is crafted by way of way of facts extraction. The crucial work is to apprehend expressions and reveals the relationship among them. It's far appropriate for the bulky length of content material cloth. It eliminates prepared statistics from unstructured information. The discern 2 clarifies the records extraction.ClusteringGrouping middle in the direction of the similitude measures around numerous questions and places, it has no predefined class marks. It isolate content material into one accumulating and further creates bunch of accumulating [4]. Phrases are disconnected rapidly and weights are alloted to each word. Rundown of commands are created through making use of bunching calculations in the wake of figuring likenesses.Eleganceaffiliation is to find the fundamental subject matter of archive via collectively with Meta and breaking down record. The take a look at of phrases and from that tally chooses the challenge be counted of the archive which turn out to be completed thru the characterization strategy. It has predefined elegance call. 3. LITERATURE SURVEY Yuefeng Li et al [13]: A text mining and characterization approach has been applied time period-based methodologies. The issues of polysemy and synonymy are one of the real troubles. There has been a hypothesis that example based strategies have to outflank remarkable evaluation with the term-primarily based completely ones in depicting consumer dispositions. A huge scale layout stays a difficult issue in content material mining. The cutting component term-based definitely techniques and the example based strategies in proposed display which performs productively. In this paintings fclustering calculation is carried out. Significance highlight disclosure in view of every high-quality and terrible criticism for content material mining models. Jian mama et al [4]: The creator centered inside the direction of the problem with the resource of arranging content material material critiques on proverbially, typically in English. On the factor while paintings with non-English dialect writings it activates the disallowance. Metaphysics based definitely content fabric mining approach has been utilized. Its efficient and effective to cluster check out guidelines typified with the English and chinese language writings utilising a SOM calculation. This technique may be prolonged to assist in searching through a superior in shape among suggestions and analysts. Chien-Liang Liu et al [2]: The paper reasoned that the information about the film rating relies upon on the effect of feeling grouping. The element based totally outlines are applied to provide consolidated depictions of motion picture audits. The author composed an inert semantic investigation (LSA) to installation object includes. It's miles an technique to decrease the extent of rundown from LSA. They account each exactness of supposition order and response time of a framework to plan the framework through the usage of using a bunching calculation. OpenNLP2 tool is applied for usage. Yue Hu et al [19]: PPSGen is every other framework which become proposed to asking for of the introduction slides been produced can be applied as drafts. It reasons them to set up the formal slides fasterly for the proprietor. PPSGen framework can perform slides with better nice advocated through the writer. The framework emerge as produced via using the Hierarchical agglomeration calculation. Apparatuses are a Microsoft electricity-component and OpenOffice. A two hundred combo of papers and slides are taken as assessments set from the internet exhibit for evaluation approach. PPSGen is further advanced to the benchmark strategies that had been obvious via manner of the patron keep in mind. Xiuzhen Zhang et al [10]: the trouble seemed with the resource of all of the notoriety framework is focused with the resource of the writer. However the notoriety scores are normally excessive for sellers. It's far a situation requiring wonderful exertion for promising customers to choose reliable dealers. Writer proposed CommTrust for agree with assessment thru enter feedback thru mining. A multidimensional do not forget show is applied for calculation work. Informational index are collected from ebay, amazon. In this approach applied a Lexical-LDA calculation. CommTrust can accurately address the exquisite notoriety problem and rank dealers are at ultimate by using way of demonstrating in reality thru the huge analyses on eBay and Amazon statistics. Dnyanesh G. Rajpathak et al [9]: The checking out errand is In-time enlargement of D-network via the locating of latest manifestations and sadness modes. Proposed method is to expand the blame finding metaphysics live with thoughts and connections each from time to time observed inside the blame evaluation area. The desired historical rarities and their situations from the unstructured restore verbatim content fabric were located with the aid of the philosophy. Actual information accumulated from the car place. Content material material mining calculations are carried out. To accumulate consequently the D-networks with the aid of manner of the unstructured restore verbatim facts that was mined finished through the metaphysics primarily based absolutely content fabric mining usual on the identical time as blame conclusion. A diagram and the chart examination calculations want to be produced for every D-community. JehoshuaEliashberg et al [11]: To discern the movies execution of a movement photograph on the crenulation factor, it is suitable really in the event that it holds the content material fabric and introduction charge. They extricate found out includes in three stages specifically kind and substance, semantics, and % of-phrases from contents using region statistics of screenwriting, enter given thru human, and regular dialect dealing with techniques. A chunk based totally totally technique is to survey film enterprise execution. Informational index are collected from 3 hundred movie taking snap shots contents. The proposed device predicts film organisation profits all of the extra exactly 29 percent is lessened mean squared mistake (MSE) contrasted with benchmark techniques. Donald E. Dark coloured et al [17]: Rail mishaps introduce photograph of a worthwhile nicely being factor for the transportation commercial employer in severa nations. The Federal Railroad administration desires the railways obfuscated in mishaps to post opinions. The record must be snuggled with default discipline sections and recollections. A mixture of structures is to clearly find mishap attributes that could train a advanced comprehension of the benefactor to the mischances. Wooded location calculation has been applied. Content material mining takes a gander at methods to extricate highlights from content cloth that exploits dialect characteristics specific to the rail delivery enterprise. Luà ­s Filipe da Cruz Nassif et al [6]: In criminological investigation that emerge as automated with a notable many statistics is commonly inspected. Unstructured content material material changed into determined in a big part of the facts acting breaking down way is fairly attempting out exposed with the aid of computer analysts. File bunching calculations for the examination of computer systems on medical workplace seized in police an examination which was advocated through the author. Collection of combo of parameters that activates incite of sixteen distinct calculations hold in thoughts for assessment. Good enough-implies, okay-medoids, unmarried, entire and average hyperlink, CSPA are the bunching calculation are implemented. Bunching calculations persuade to actuate agencies shaped by way of the usage of both big or unimportant file that is applied to decorate the master analyst's interest. Charu C. Aggarwal et al [5]: creator concentrated on using factor data for Mining textual content records. A effective bunching technique became completed by way of the use of the hooked up apportioning calculation with probabilistic fashions which modified into deliberate via the writer. Dataset utilized is CORA, DBLP-4-territory informational index and IMDB. Running time and type of organizations are applied as a parameter for breaking down cause. The results can apparent that the use of aspect-information can beautify the individual of content material bunching and order to control an amazing united states of america of skillability. 5. Diagrams 4.COMPARISONS ON awesome textual content MINING strategiestable number 1.26. Conclusioncontent material mining approach is preponderantly used for setting aside mode from unstructured facts . Records disclosure is primarily engaged at some stage in this assessment. The systems area social unit grouping, characterization, and cognition extraction and information instance become diagramed. The method of content cloth mining and the computing floor area unit further investigated. Throughout this paper absolutely excellent troubles area unit reviewed and their result vicinity unit talked regarding.Mining technique is dominantly implemented for putting aside mode from unstructured statistics . Records revelation is essentially related with amid this audit. The frameworks difficulty social unit amassing, portrayal, and comprehension extraction and records outline modified into graphed. The technique of substance mining and the processing floor place unit furthermore explored. Amid this paper very unexpected troubles area unit investigated and their final consequences zone unit talked concerning. References  R. Agrawal and R. Srikant. Quick calculations for mining affiliation policies. In court cases of the 20th global convention on Very big Databases (VLDB-ninety four), pages 487– 499, Santiago, Chile, Sept. 1994.R. Baeza-Yates and B. Ribeiro-Neto. Modern information Retrieval. ACM Press, big apple, 1999.S. Basu, R. J. Mooney, ok. V. Pasupuleti, and J. Ghosh. Assessing the oddity of content material mined rules utilising lexical information. In proceedings of the 7th ACM SIGKDD international assembly on understanding Discovery and statistics Mining (KDD-2001), pages 233– 239, San Francisco, CA, 2001.M. W. Berry, editorial supervisor. Strategies of the 1/three SIAM global conference on information Mining(SDM-2003) Workshop on textual content Mining, San Francisco, CA, might also 2003.M. E. Califf, editorial supervisor. Papers from the 16th country wide conference on artificial Intelligence (AAAI-ninety nine) Workshop on machine getting to know for statistics E xtraction, Orlando, FL, 1999. AAAI Press.

Tuesday, July 30, 2019

Procter & Gamble Resources, Capabilities and Competitive Advantage Essay

P&G – Procter & Gamble is a consumer product company founded and headquartered at Cincinnati, Ohio in 1837 by Mr. William Procter and Mr. James Gamble. It is now led by Mr. Alan.G.Lafley whom rejoins the company in 2010. P&G success was contributed to the heart of its business model – Innovation; and that is not just for newly invented product or service, it was for the goal of recreating needs for the improvement of consumers’ living. And it is a very long culture started where the roots started from the founders; whom are soap and candles makers. The first innovative product – Ivory; started in 1879, by James Norris Gamble who is the son of the founder and a trained chemist. Ivory at then was an inexpensive white soap equal to high-quality, imported Castile soap. It was introduced nationwide through a weekly newspaper. Today, P&G has its presence across 180 countries and a team of 121,000 employees. Its business operations spanned across various segments like Beauty, Grooming, Health Care, Fabric Care & Home Care and Baby Care & Family Care; it is the house to many of the world leading brands like Head & Shoulder, Gillette, Oral B, Fabrics, Pampers and many more. Touching more than 4 billion consumers worldwide every day, the company sales volume as of fiscal year ending June 30, 2013 was more than 80 billion in sales. The Strategy – Unique Value According to Michael Porter, He argued that organizations that focus solely on operation effectiveness is not enough, they will only be successful if they are able to provide a unique value that is sustainable for a long term. Organizations competing in operation effectiveness will only gauge their performance by benchmarking what others are doing; ultimately providing the same value throughout, which is of no value to the customer. Therefore, for an organization to be able to sustain for long term, an organization would require a competitive strategy by performing a different set of activities to deliver an unique value. According to Jay Barney, he also mentioned that an organization will have a competitive advantage against others if they adopt a value creating strategy not done by others yet. And that value will deem to be able to provide competitive advantage and are sustainable in the long term if they have the four attributes – Valuable, Rare, Non-Imitable and Non Substi tutable (V.R.I.N). Valuable would be that the  resource would be able to add value to the organization; Rare would be that the resource is not common within competitors; Non-imitable would be that the competitors are not able to copy them easily or able to produce the exact same set of resources; And lastly, non-substitutable would be that resources are not easily substitutable by equivalent resources that are valuable. Grant, R.M has a very similar theory to Jay Barney’s; he mentioned that for a resource or capability to establish competitive advantage, it must fit into two conditions: Scarcity and Relevance. Scarcity would refer to that it cannot be widely available, while relevance would refer to that it must be relevant to the key success factors in the market, assisting the firm in creating value for its customers or to survive competition. It is also dependant on their durability and whether are they easily imitable. From the above, we get to understand that a firm can only be successful, if they are able to provide a sustainable value that their rivals are not providing. As derived from the V.R.I.N table above, we can see that P&G competitive advantages would be their strong branding, accumulated understanding of consumer’s needs and innovative culture where it is not achievable by their rivals. Driven by an Innovative Culture In 2011, CEO of P&G – Mr. Robert McDonald mentioned that he is on a mission and that is to make P&G the most technologically enabled business in the world. And he get it all started by digitalizing operations everywhere which has eventually contributed to reduction of cost, time and effort, reaping better product yet higher profitability. Within manufacturing, employees can now use Ipads to download real time data for communication, the goal was to integrate their operational and financial system whereby cost of each product line will be displayed, allowing management to make effective market decision at real time. Within Logistics, there is a â€Å"Control Tower† and Distributor Connect† program that were with the intent to monitor all inbound or outbound activities within internal or external resources, it has since been able to effectively reduce deadhead moments. By bringing innovation into their supply chains to deliver better efficiency and lower cost, it is no surprise that P&G was ranked among the Top 5 in the award for  Gartner Supply Chain Top 25. With the effective supply chain, it has help to keep hiking costs at bay, where P&G can price their product competitively; which ultimately spells benefit for the consumers. For retailers, P&G has developed a sophisticated ordering application whereby retailers can now order via wired phone or wirelessly via a mobile app. With that all done digitally, they can now also upload existing shelf photos and receive best practices on product arrangement to maximize sales. In product development, molecules used for research have also been digitalized. When needed, it will be modeled to predict product effectiveness. Back at the roots of their research and development centre, it is inevitable that one would notice the promotion of innovative thinking within their culture. And this strategy is not only for their employees, P&G has also taken the step out to influence their partners. A program called Connect + Develop has been created to embrace open innovation. Not limiting only to their internal resources, P&G no taps onto the vast knowledge that the world can provide. Riding on this program for the past 10 years, it has brought the value that P&G can offer to the market up by 70%. Recognizing its success, it is now a key strategy that is employed throughout every business units. Some of the well known brands that are generated through this program are Olay Regenerist, Febreze and many more. All these processes are made possible because of the analytical thinking skills found within their employees which plays an important factor since it enabled them to come up with innovative ideas often co-related to analytical data collected. And these processes are not internally focuses; it controlled both the macro and micro environment factors that contribute to their success. With a very strong innovation culture, P&G today are currently at over 55,000 active patent filings globally and, as a subset of the active patent filings, about 41,000 granted patents globally. This makes P&G among the world’s largest holders of U.S. and global patents, puttin g it on a par with Intel, Lucent and Microsoft. Understanding and Reaching Out to Consumers like no others With technology, P&G brings their understanding of consumer’s behavior into the digital age. For the past years, P&G has been able to carry out a successful global rationalization. It is achieved through deep understanding of consumer needs. With digital channels on the rise, consumers are now bringing their feedback of a product or service to the digital space through blogging, tweeting and posting comments. P&G see this advantage and make the most out of it to understand a consumer’s behavior towards a product. But since the comments are all over the place, P&G developed â€Å"Consumer Pulse† which uses Bayesian analysis to scan through the universe of comments and categorizing them into individual product. These real time insights are then sent to respective in charge for real time reaction. They then carry out appropriate go to market strategy. And since the whole world is watching, it is an excellent opportunity for them to tap on the effect and go for the creation of a positive and strong branding. And with those, P&G are able to marry the best of what they have, which are the combination of customer behavior data and their top notch research development team – connecting â€Å"what’s needed† with â€Å"what’s possible†. With a establishment of more than 177 years now, P&G has been making a great deal of awareness in the market. Being one of the biggest media buyers, they have constantly been able to come up with message with an impact for their house brands. With all these activities that happen over the years, P&G has become a very strong and reputable branding among consumers which is a very rare intangible resource whereby new entrants or mediocre players in the industry will not be able to be on par within a short period. Surviv ing Competitions – Conclusion Although an organization’s competitive advantage is able to sustain the company in the long term, it is not forever. A new set of competitive advantage may be required if there are changes in the industry or within the organization structure. An evaluation tool like Porter’s five forces will help P&G understand the structure of its industry and see if it is strategically at a winning position against its long standing on par competitors like Unilever, Colgate Palmolive. If the forces are intense, the firm will not be able to earn attractive returns on investment. If the forces are benign, then it would be profitable. In consideration of the threats above, P&G can easily fence off new entrants with the branding that they established over the past 177 years and also its vast array of products by its own R&D. According to Grant R.M., the value of branding is in the confidence that it has instill in the customer, it is an intangible resources that customers are willing to pay a premium for over an unknown brand and branding is considered a very valuable resources as unlike technology, it is long-lived, unless tarnished. Although retailers can easily switch brands, and the threat is considered high. The retailer’s customers however are brand and product conscious; the retailers buying power are greatly affected by the demand of their customers. Further to this, P&G primed themselves for quality and effective product, this is highly credited to their innovative culture and accumulated understanding of their consumers, therefore although the threat of substitute is considered moderate in this industry, they are able to differentiate themselves with their quality, it is only considering to be a threat for cost conscious shoppers who are not looking at quality – which would be a minority group. Given P&G capacity in production today, suppliers bargaining power is considered a low threat for t hem. As the purchase of raw materials would normally be source globally and in bulk for economics of scope and scale, the negotiation power of P&G would be higher than their suppliers. Another theory to support on its success via its competitive advantage was Porter’s theory on generic competitive strategies. It is said that competitive advantages are classified into Low cost or differentiation, which are in relation to the industry structure. It is the ability of how an organization is able to cope with the five forces better than its rival. The two basic types of competitive advantage combined with its activities to achieve them lead to the three generic strategies – cost leadership, differentiation and focus. In this case, P&G are using Porter’s differentiation generic strategy. This strategy calls for the organization to selects the values that consumers perceive as important and position itself strategically to meet those needs. Although the key focus was to seek differentiation, its cost position was not ignored as P&G strive in operation effectiveness by technologically enabling its operation throughout its organization. P&G is currently in a winning position against its rival. Leveraging on its competitive advantage to provide the unique value to consumers, it has gained market share and the its leader position in sales volume (as supported by above bar chart) among its competitors. REFERENCES: (2009, March 16). Wal-Mart tries to cash in on Store brand boom . Portland, Oregon, United States: The Associated Press. Barney, J. (2004). Firm resources and Sustained Competitive Advantage. Strategy: Process Content Context: an international perspective, de Wit & Meyer , 285-292. Chui, M. (2011, November). Mckinsey & Company. Retrieved June 10, 2014, from Inside P&G’s Digital Revolution: http://www.mckinsey.com/insights/consumer_and_retail/inside_p_and_ampgs_digital_revolution Colgate-Palmolive Company. (n.d.). Online 2013 Annual Report. Retrieved June 24th, 2014, from Colgate-Palmolive Company.: http://investor.colgatepalmolive.com/annual.cfm E.Porter, M. (2008). The five competitive forces that shape strategy. Harvard Business Review , 78-93. Grant, R. (2005). Analyzing Resources and Capabilties. Comtemporary Strategic Analysis, Grant,R.M. , 130-185. Independent, I. (2014, June 24). Global power-player has come a long way from humble roots. Retrieved June 24, 2014, from In dependent.IE: http://www.independent.ie/business/personal-finance/latest-news/global-powerplayer-has-come-a-long-way-from-humble-roots-30321097.html Janessa Rivera. (2014). Gartner Announces Rankings of Its 2014 Supply Chain Top 25. Gartner Supply Chain Executive Conference. PHOENIX, AZ.: Gartner, Inc. Johnson, B. (2012, October 29). Procter & Gamble Co.’s Advertising Spending, 1987 to 2012. Retrieved June 10, 2014, from AdAge: http://adage.com/article/special-report-pg-at-175/procter-gamble-s-advertising-spending-1987-2012/237974/ Lafley, A. (2008, August 26). P&G’s Innovation Culture. Retrieved june 2014, 9, from strategy+business: http://www.strategy-business.com/article/08304?pg=0 M.E., P. (2004). Generic Competitive Strategies. Competitive Advantage, porter M.E , 11-25. P&G Annual Cash Flow. (2014, June 23). Retrieved June 23, 2014, from The Wall Street Journal: http://quotes.wsj.com/PG/financials/annual/cash-flow P&G.com Company. (n.d.). Retrieved June 9th, 2014, from P&G.com Home: http://www.pg.com/en_US/index.shtml Patentdocs. (n.d.). Retrieved June 9, 2014, from The Procter & Gamble Company Patent applications: http://www.faqs.org/patents/assignee/the-procter-gamble-company/ PG Science. (n.d.). Retrieved June 9, 2014, from The Magic behind the brand – PG Science: http://www.pgscience.com/home/home.html Porter, M. E. (1996). What

Monday, July 29, 2019

Audit planning Essay Example | Topics and Well Written Essays - 1250 words

Audit planning - Essay Example Audit Planning always required smooth and successful transition schedule and it must be carefully analysed.We will complete this audit in several simple stages; buy using these stages our aim will be to better monitor the audit process and provide recommendations for its improvement. Our key steps will be: 1. Establishing priority areas: Here we will identify the critical business processes that need to be audited, such as; bad debts, issue of pre paid expenses and payments owes by other businesses, and expenses that are occurred due to cancelling the balance of invoices not received in previous years. Here we will collect all the data required for audit and the costs involved doing this audit in such areas. Here our objective is to find how we can better control the costs and minimize the debts. 2. Monitoring and Continuous Audit Rules Here we will consider all the accounting and internal rules adapted by the company and how these rules applied to each area and are company following these rules and making sure none of them are being violated. Like which ISA is applied to the auditing area. 3. Configuring Audit Parameters Here auditor will consider several parameters like the cost benefits of error detection and these parameters can be audit and management follow-up activities, etc. Here auditors can perform stratification of audited data and divide them into sub-groups; this will allow them to monitor the activity far better. 4. Following Up Follow up is another parameter but its more focused it will allow us to look into errors and risks more deeply and will set the alarms and the data which is purely educational where no other source present than it will benefit the auditor to establish grounds and there is no source available for evaluation. 5. Communicating Results Now, it is time to discuss the results and outcomes with the concern persons or person. Make sure you present your data in easy to understand and friendly manner, support it with pictures and ch arts. Like in our scenario we will present the data to senior auditor and help them in the whole process. Requirement: Determine both areas of risk and areas of control (justify and explain. Identify weakness and potential risks) In modern world risks and weaknesses study is very essential for businesses and in almost every area of business. (Weiss, 2010) The one of the major weakness is that company has not owned any place they are working at a place which is taken from council and they are on lease. This can be a great threat as well if council asked them to release the place on short notice. Company’s expenses are very high and increased significantly as compare to last year. One other weakness is that company balance is very high and company work on credit and their bad debts are very high. Many receivables are cancelled too. The one of the major issues are that health department fines are also high. One of the major threats is that council can cancel the lease since high amounts of lease are not paid and due, health department fines are very high and mat be one reason council can cancel their permit. Requirement: Apply analytical procedures in order to compare accounts with most significant variations between periods (justify and explain why you consider having potential inherent risk) Analytical technique is always needed when auditor is measuring significant variations (Rittenberg, Johnstone and Gramling, 2009). In the year 2009 the balance for current assets were 6,819,248.36 where this were reduced to 6,135,435.45 almost the variance of -683,812.91 or almost decreased to -10.03. The assets decreased almost 10% which is very risky for the4 production and output of the company may affect, if it will continue in future too. In current assets similarly the raw material’s balance as compare to last year reduced and most affected area was receivables which is most risky because it will directly affect the liquidity and

Sunday, July 28, 2019

The Epistle to Philippians Essay Example | Topics and Well Written Essays - 750 words

The Epistle to Philippians - Essay Example First of all, it would be advantageous to see if there are lots of similarities between the above mentioned versions. One might argue that there are many parts of the text that are similar word for word: the very beginning, some parts in the end and many others. However, its interesting to note that there are two words, namely â€Å"true† and â€Å"pure†, that coincide in the list of what a Christian should think about, while others are not similar at all. Indeed, there are more differences in the two texts than similarities. For example, NIV says that Paul â€Å"pleads† two women to keep their faith strong, while NRSV uses the word â€Å"urges†. It is clear that the latter verb has far stronger meaning. Another difference is seen in the words that are used to modify the word â€Å"companion†: NIV’s â€Å"true† versus NRSV’s â€Å"loyal†. One would make no mistake arguing that the former word has some important connotatio ns. The next suitable example is the difference between the phrases â€Å"do not be anxious† (NIV) and â€Å"do not worry† (NRSV). From a psychological point of these two states of mind are different. Now it would be important to perform some exegetical analysis. In the very beginning, Paul greets the congregation warmly. Then he encourages them to stand firmly in their faith in Jesus Christ. Afterwards, he calls two names of the women who need extra support since they might be falling from grace; that is why the believers should unite together. The next statement urges the Christians to rejoice in God all the time. The Apostle says that God is near. That is why the believers should not worry about anything and pray to God all the time, presenting Him with their concerns. In this case the peace of God will come to them. In the end, Paul lists what Christians should think about: these are universally accepted positive values. Finally, he urges all the believers to put into practice their knowledge and enjoy their faith.  The passage from this book is related to the New Testament in that sense that it reflects the spreading of Christian Church and tries to reinforce the newly fou nd faith. It is also related to the Old Testament in that aspect that people should base their life firmly on their faith in God.

The Law of Trusts and Equitable Obligations Case Study

The Law of Trusts and Equitable Obligations - Case Study Example Whether or not the courts will find so in this instance is open to debate. As it is a presumption it is rebuttable by the donees showing that it was a gift, but the onus is on Wendy and Karen to show that it is a gift. (i)(a). Wendy will have to establish either that Martin intended to make a gift or that the presumption of advancement takes precedence over the presumption of a resulting trust. In order to establish that a gift was made the onus of proof is on Wendy. The court must go into the facts in order to determine whether there is sufficient evidence to rebut the presumption. Whilst Wendy is not married to Martin they do have a relationship which might indicate a moral obligation on Martin's part to provide for Wendy. This could give rise to the presumption of advancement, in which the assumption is that Martin intended Wendy to take both the legal and the beneficial interest of the shares. However in a series of cases quoted in Pearce and Stevens1 it is clear that there is no presumption of advancement between cohabiting couples. However in Pettitt v Pettitt [1970] AC 777 at paragraph 823 Lord Diplock reminds us that the presumption of resulting trust and advancement are: On the facts before us there is no reason to believe that Martin did not intend Wendy to own the shares outright. We are reminded that they shared a full life together and that Martin purchased shares for both Wendy and Karen at the same time. There is no indication that he did this for any other reason than for them to accrue benefits from the company - in the form of dividends - as the shares increased in value. It could be argued that based on conduct and the circumstances that Martin intended the shares as a gift. For example, Wendy may be able to show that Martin gave her the share certificates and that she was able to keep the dividends. However, based on the evidence before us the point is moot, and could go either way. (i)(b) There is a presumption of advancement between a father and his child, that is that a father would wish to provide financially for his child: Murless v Franklin [1818] 1 Swans 13. In such a case the child takes the property beneficially. Whilst Karen is not Martin's child they do have a relationship which might indicate a moral obligation on Martin's part to provide for Karen. In Bennet v Bennet [1879] 10 Ch D 474 Jessel MR said: as regards a child, a person not the father of the child may put himself in the position of an in loco parentis to the child, and so incur the obligation to make provision for the child The burden of proof will be on Martin to show that no gift was intended. For example if Martin could show that he retained the share certificates and/or that Karen paid the dividends to him (see Re Gooch [1890] 62 LT 384) this might be sufficient evidence to rebut the presumption, particularly if at the same time Martin had clearly stated that a gift was not intended. (ii) Martin's rights - if any - will be determined under a resulting or common intention constructive trust, or else proprietary estoppel - which does not require proof of common intention. Since Martin has made a direct contribution to the purchase price out of the profits of the business and by paying the mortgage this raises a

Saturday, July 27, 2019

Occupational Health and Safety Report Essay Example | Topics and Well Written Essays - 1250 words

Occupational Health and Safety Report - Essay Example This common reoccurrence in this department are heavily expensive in terms of revenue and employees on leave due to workplace injury. I personally think there should be a distinct appropriation sequestered for those types of emergencies. Workplace hazards are an issue within my department in which I must take care of. However, I feel there is lackluster effort on your part in aiding my cause. I pray this composition does not create strife or offend you in any sort but it is my every intention this may be read as a cordial admonishment. Work place hazard regulations have been drafted and implemented in the past few decades in Australia as well as other industrialized countries. The promulgations of such mandates are the byproduct of horrors and abuses of the industrial age. Thus, to prevent and limit the abuses and mistreatment of huge businesses and corporations for its faulty safety methods and little, if not any, precaution procedures, lawmakers has taken initiatives to protect those unable to stand against employers who usurp their less- fortunate employees. Also, labor unions grew to further protect workers hazards and wrongful dischargement. Such efforts to reform safety measures has transcended through the decades to protect workers from hazards the can affect the health of an employee. (www.ohs.annu.edu.au/ohs, 2002) In this composition, an analysis will be done of the regulations and legislations on occupational health and safety. A situation will be used a variable in which the occupational health and saf ety will have to be implemented. Here are the particulars: On Wednesday, October 24, 2007, our receptionist in the Administration Department of the East Coast Secretarial Service, Mary Smith, tripped over an extension cord en route away from her desk. Her misstep caused her to fall heavily on her knee which was a critical insult to her bone and joint. This trauma to her knee prompted edema accumulation. I instructed one of her colleagues who witnessed Mary misstep to accompany her to the hospital. The X-ray results revealed that a piece of the platella has been fractured off the main bone. The prognosis to insults to the body such as these prompts the immediate leave of absence. Hence on this precept, Mary Smith has been given two fortnights of leave and she will be given an extended leave of absence upon further analysis of her knee after her preliminary respite. Events such as these prompted me to address you my concerns about the status of this enterprise. The "lack of uniformity" (www.ohs.annu.edu.au/ohs, 2002) in the regulations can be an impediment toward adjusting to these laws, but I believe this gives us the opportunity to make amends on our own. The recommendations in the British Robens Report (1972) encourages enterprises like ours to use a self-regulation methodology that includes workers and management to improvise the Occupational Health and safety standards set down be the state. (www.ohs.annu.edu.au/ohs, 2002) In chapter 4, section 2, divisions 3 on the Occupational Health and Safety Act 2000 in regards to work premises, the prefect of the premises are obligated to protect employees from hazardous electrical equipment and appliances. (www.austii.edu.au, 2001) All appliances that places a potential threat to employees (i.e. fires, flaring, overheating) should to be turned off. Appliances that are open in workplace premises and can be a

Friday, July 26, 2019

Social responsibility in finance decision making Essay - 1

Social responsibility in finance decision making - Essay Example Further, Monsanto CSR initiatives, the influence they have had on stakeholders and company image, with recommendations provided for improvement of CSR at Monsanto. Monsanto failed to meet CSR needs in two instances that seriously affected the business and formed the platform for more CSR initiatives that have allowed the business to receive global recognition, win back the confidence of the consumers, and achieve success in environmental conservation. Monsanto is a leading seed company globally specializing in biotechnology and genetic manipulation of organisms for the development of cheaper and resistant food and crops. Monsanto inserts genes to existing plant genes as a measure of augmenting disease resistance and yields. The effect is the production of drought resistant, more productive, and disease resistant plants known as genetically modified organisms GMO. Monsanto has achieved global success in terms of the supply of Agent O, saccharin, vanilla flavouring, artificial sweeteners, petroleum, packaging Roundup herbicides, petroleum, and GMO seeds. Despite the success, Monsanto faced CSR issues that seriously affected the firm and realized the importance of CSR taking several initiatives in correcting the situation and making several gains in the end. Corporate social responsibility (CSR) at Monsanto was not at the forefront of the company’s operations in the past, as is the case in recent years. For example, there are instances where Monsanto inflicted harm on a number of stakeholders for the sake of the firm’s profits that was the main aim of the firm at the time. Monsanto was not very cognisant of the CSR it had on a number of stakeholders. Monsanto’s production of Agent Orange in 1970’s for the deforestation of Vietnamese jungles forms the case where the company neglected its CSR responsibilities in favour of profit making (Ferrel et al., 2013). Agent Orange, as it was later discovered, contained a carcinogenic

Thursday, July 25, 2019

MOD (Ministry of Defence) Essay Example | Topics and Well Written Essays - 1500 words

MOD (Ministry of Defence) - Essay Example Moreover, dedicated biometric solutions facilitate to provide smooth secret financial transactions as well as personal data privacy. It has been viewed in the case study that Biometric Identification Verification (BIV) System was the initial UK biometric access control system that was deployed and designed especially for the military users. This particular system was mainly designed in order to deliver a high availability as well as reliable security solution (Business Reporter, 2011). The perception of a role based authentication is typically regarded as a system in which the users possess certain major roles that are allotted to them. The roles can demonstrate the capabilities as well as the limits of making any significant change and access various areas in the technological process (Choukse & Singh, 2011). One of the leading edge approaches to role based authentication is that it is correlated with information security that significantly aids in lessening the complexities of secu rity administration. The other leading edge approach of role based authentication is that it determines the risk exposure from the employees who access efficient Information Technology (IT) system. However, the idea of role based authentication has been currently criticised due to certain problems that have risen in constructing an initial role arrangement as well as owing to its inflexibility in quickly transforming domains (Kuhn, Coyne, & Weil, 2010). Spring Security is regarded as one of the alternative solutions that can be applicable to the context of using biometric solutions. It is principally viewed to be a greatly customisable authentication and a strong access-control framework (Mularien, 2010). Moreover, another alternative that can be pertinent within the background of using biometric solutions is Apache Shiro. This particular alternative has been observed to be an easy as well as a powerful security framework that significantly deals with cryptography, authorisation, se ssion management and authorisation functions (The Apache Software Foundation, 2012). In relation to determine the distinction between the two aforementioned alternatives i.e. Apache Shiro and Spring Security to rule-based authentication mechanism, it has been observed that the aforesaid alternatives are quite easy to learn, manage as well as deploy as compared to role based authentication (The Apache Software Foundation, 2012). Question b Computer security is incessantly becoming a crucial concern for all. In this regard, biometric solutions are playing an imperative part in providing utmost security as well as authenticity by validating the individuality of a person through various media such as fingerprints, facial features and hand geometry among others. Similarly, in this connection, PALM biometrics also plays a decisive role in increasing security along with authenticity by a significant extent. It can be affirmed that this particular system i.e. PALM vein system of biometrics is viewed to be a modern progression in the systems of biometric security (Lee, 2012). PALM biometrics performs its operational functions quite differently as compared to other biometric systems. It generally takes the digitalised image of the veins of the users and evaluates it with the templates that have been stored in a particular

Wednesday, July 24, 2019

Write a research paper on Confucianism Proposal

Write a paper on Confucianism - Research Proposal Example In fact he almost always avoided being drawn into discussions dealing with God and the supernatural. His theories tried to steer clear from any involvement with any supernatural being. For instance, when one disciple queried him about the afterlife, he quickly retorted that because man does not yet fully understand the mortal world, it is very unlikely that he can contemplate on such concepts as heaven and god (The Analects). He did also express the notion that men do not need any god because men are capable of living a harmonious existence without any help from any supernatural being The Confucian Analects, which is a document comprising all his sayings and discourses, conversations and travels, is no Bible or Koran or any kind of scripture (Legge 2006, p. 1). There is nothing in it that makes reference to revealed teachings. It is neither a religious nor a political treatise but instead, it is just a record of his conversations with his disciples as well as narrations of Confucius’ deeds during particular occasions. In the Analects, nowhere did Confucius teach the people to believe in a higher being or power. If Confucianism is tinged with a patina of religion, it is because his zealous disciples and admirers deified him after his death. They constructed a temple in his honor and refurbished his tomb in Chu-fou (Kufow), Shantung province, his birthplace and made this a mecca for all educated Chinese. They replicated the Analects and distributed them all throughout China after his demise. They reprinted his Classic series i.e. Classic of Poetry, Classic of Historical Documents, Classic of Changes, Record of Rites and Classic of Spring and Autumn Annals, which are not religious books at all but mere literary collections cum history (Legge 2006, p. 1). Because of these publications, his teachings soon electrified citizens all over the country with his words of

Tuesday, July 23, 2019

Cell Theory Assignment Example | Topics and Well Written Essays - 2250 words

Cell Theory - Assignment Example The paper describes all the peculiarities of the cell theory. A cell organelle is the part of a cell that has a specific function. Organelles are usually located inside the cytoplasm of a living cell, and are typically enclosed in a membrane called plasma membrane. They are called "organelles" because their importance to a cell is analogous to the importance of organs of to a body. Both prokaryotes and eukaryotes have cell organelles; however, there are some important differences between the two. The organelles in prokaryotic cells are not organized or enclosed in plasma membranes. Major cell organelles include chloroplasts, endoplasmic reticulum, golgi apparatus, mitochondria, nucleus and vacuoles. Chloroplasts have double membranes as well as their own DNA, and perform photosynthesis. They are present in plants and some algae. Endoplasmic reticulum (ER) has a single membrane and is responsible for transport as well as synthesis of proteins. It is of two types – rough ER, who se surface appears to be rough because of the presence of ribosomes, and smooth ER, whose surface appears to be smooth. Golgi apparatus is also singe-membraned and is responsible for protein sorting and modification.... Both prokaryotes and eukaryotes have cell organelles; however, there are some important differences between the two. The organelles in prokaryotic cells are not organized or enclosed in plasma membranes. Major cell organelles include chloroplasts, endoplasmic reticulum, golgi apparatus, mitochondria, nucleus and vacuoles. Chloroplasts have double membranes as well as their own DNA, and perform photosynthesis. They are present in plants and some algae. Endoplasmic reticulum (ER) has a single membrane and is responsible for transport as well as synthesis of proteins. It is of two types – rough ER, whose surface appears to be rough because of the presence of ribosomes, and smooth ER, whose surface appears to be smooth. Golgi apparatus is also singe-membraned and is responsible for protein sorting and modification. The mitochondrion is also called as the powerhouse of the cell because it is responsible for energy production, and like chloroplasts, it also has a double membrane and its own DNA. The nucleus has both Deoxyribonucleic acid (DNA) and Ribonucleic acid (RNA) and is responsible for maintenance and proper distribution of DNA during cell division. Vacuoles function as storage reservoirs of the cell. Minor organelles of the cell include autophagosomes that collect material from the cytoplasm for degradation, centrioles that enable cell division, ribosomes that help in the production of proteins, lysosomes that are responsible for processing or breakdown of large molecules into simpler ones, nucleolus that produces ribosomes, and vesicles that function as material transporters in the cell. Many other organelles exist based on the type of organism.

Curriculum as Influenced by Society and Technology Essay Example for Free

Curriculum as Influenced by Society and Technology Essay The current trend of technology in the classroom can be traced back to the early1900s when schools and museums, as a complement to verbal instruction, began to use visuals aids including drawings, paintings, and slides. In the 1920s, as film became widely used, The National Academy of Visual Instruction was formed to help distinguish between films that were for entertainment or educational value. As technology progressed and the television was introduced, the educational system began to use instructional television. During the 1970s and 1980s the biggest influence in the classroom, to date, came in the form of computers. As the 1990s progressed, computers and multimedia equipment continued to become more affordable and they began to be used across the world. The trend of technology in the classroom currently consists of multiple categories including Multimedia, Internet and Networking, Computer-assisted instruction (CAI), Computer-managed instruction (CMI), and teacher training. As the current trend of technology in the classroom continues to be centered on the inclusion of computers and other mediums, it only awaits to incorporate the next big step in technology. The Ever-changing Technology Trend The abacus, the slate, the red pad of paper, it is amazing to view the ever-changing technology in education today. As a society, not only has our language and communication developed, but the way that language and communication are expressed has changed drastically. In Mathematics an abacus was used to solve problems, now a student can program a graphing calculator to solve problems for them. Some schools allow children to bring laptops into class with them, in other schools it is mandatory that all students have a laptop to bring to school. From having no computers in the classroom to having dozens of computers in the classroom has been an evolution of the educational system. Technology in the educational system consists of many mediums, and the history to the current educational system is quite fascinating. What remains to be seen is how the ever-changing, ever-evolving technology will impact the schools today, and how technology will affect our schools in the future. The view of a teacher as the possessor and transferor of information is shifting to a new paradigm in which the teacher is now a facilitator or a coach. These new teachers provide appropriate learning environments that engage students in collaborative activities that require communications and access to information that only technology can provide. Technology engages students, and as a result they spend more quality time on basic learning tasks than students who use a more traditional approach. Students who have the opportunity to use technology to acquire and organize information show a higher level of comprehension and a greater likelihood of using what they learn later in their lives (Impact, 2005). The integration of technology into the curriculum has been shown to decrease absenteeism, lower dropout rates, and motivate more students to continue on to college. This current trend of technology in the classroom consists of multiple categories including multimedia, Internet and networking, computer-assisted instruction (CAI), computer-managed instruction (CMI), and teacher training: Multimedia Interactive multimedia combines text, graphics, sound, animation, and video into a single learning environment. The hardware of multimedia can include: Macintosh computers, audio digitizers, CD ROM players, graphic scanners, and videodisc players. Since information is presented in visual and verbal modalities, individual learning styles of students are easily accommodated. It is not only a presentation tool for the teacher, becoming the basis for classroom lectures, discussions, and simulations, but it is also a reporting and reference tool for students in preparing class assignments. Example of use: There is an ongoing multimedia project that is part of the seventh grade science curriculum at the Baker Demonstration School at National-Louis University. Students choose a mammal to study at Lincoln Park Zoo in Chicago, IL. They then spend several sessions at the zoo observing this mammals physical characteristics, behavior, locomotion, and its zoo habitat. These observations become the raw data for constructing a multimedia presentation about their mammal. Internet and Networking There is a clear direction towards using the Internet to open education to students everywhere. The use of the Internet ranges from making course materials available on-line, to using the Internet as the communication tool for the course. With the vast capabilities of the Internet, computers are being networked for communication, research, and remote collaboration. Networks can help to break down communication barriers and connect students and teachers with the outside world. Access to a computer, a modem, and phone lines frees students and teachers from the physical limits and time constraints of the school environment. Networking also allows them to send electronic mail, participate in computer conferencing, and access information from remote sources. Example of use: Students studying the solar system can send questions directly to NASA scientists. Classes from different parts of the world could read the same book and share ideas and conclusions throughout the reading of the book. Another idea is for one class to write cliff hangers and have the other class finish the stories. In some cases, classes have done parallel science experiments or conducted surveys and then compared results with the other class. Computer-assisted instruction (CAI) and Computer-managed instruction (CMI) (CMI) is the use of the computer to maintain records associated with student performance. This usually includes, but is not limited to, the results of particular Computer-Aided Instruction (CAI) packages. As the student completes each lesson, the computer stores the progress, scores, records the results of all tests or quizzes completed, and it provides progress reports to the teacher. These reports, either individual or class-wide, may be used to rapidly identify unsatisfactory progress or weak areas (Harrison 1983). Example of use: An individualized curriculum could be written for each student allowing the teacher to more effectively utilize the limited class time available. These tools can help remediate students lacking in certain skills and allow students access to information presented in multimedia formats. Teacher Training Tremendous increase in technology-related in-service teacher training is taking place. Teachers are learning how to use electronic grade books and other teacher utilities to create puzzles, tests and quizzes, and other materials in order to assist them. Examples of training: After-school workshops conducted by the computer enrichment instructor and/or volunteers is one form of teacher training available, another is one-on-one tutoring carried out by volunteers or a computer enrichment instructor. Technology conferences attended by selected members of the faculty and teacher-to-teacher instruction utilizing those faculties with advanced technology skills also provides valuable teacher training. In addition to the technologies mentioned, the Education Coalition (TEC) considers the merger of computing, television, printing, and telecommunications as the most significant trend in education and technology. Bringing them together results in the whole having greater impact than each individual part (Lane Portway, ND). Technology is abundant in the classroom today in many forms such as computers, the internet, DVDs, CD-ROMs, etc. However, technology in the classroom â€Å"can be traced back to the early 1900s, when schools and museums began to include visuals such as drawings, paintings, slides, films, and models as a complement to verbal instruction† (Summary of Major Events in the Field, 2005). In the early1900s, still and video cameras were considered to be the technology of the future, the likes of which had never been seen before. It was hard to imagine, at this time in history, that they would be used on a daily basis in the home, let alone in the schools. Contrary to popular belief, the history of technology within education goes back a lot further than simply the introduction of computers and televisions into the classroom in the 1980s and 1990s. Throughout history, many people have had high hopes of how technology would affect education in the future. Thomas Edison said, books will soon be obsolete in the schools. Scholars will soon be instructed through the eye. It is possible to teach every branch of human knowledge with the motion picture. Our school system will be completely changed in ten years(Major Trends of the Decade, 2005). In the late 1800s and early 1900s, Thomas Edison was working on perfecting his invention, a kinetophone, which synchronized sound on a phonograph cylinder with pictures on a screen (Life of Thomas A. Edison, 2005). Edison dreamed that films would one day revolutionize education. â€Å"In 1911, he released a series of historical films about the American Revolution, becoming one of the first producers of films for classroom use† (Major Trends of the Decade, 2005). While his invention did not exactly revolutionize education, the modern version of inventions like the kinetophone is used on a regular basis in the classroom via television, video, and DVD. In the 1920s, film was seen as a progressive style of teaching, and was used in only a few select classrooms across America. To aid in the process of incorporating film into education, The National Academy of Visual Instruction was formed in order to help distinguish between films that were for entertainment and films that had educational value (Major Trends of the Decade, 2005). During this time, there was also an attempt to use radio broadcasts in the classroom; however, this trend died out within 15 years as there were often technical problems that could make teaching unpredictable. As film began to be used more often in classrooms across the world, the United States government had to prepare teachers for the advancement of technology in order to keep up with other advancing countries throughout the world. This was hard to do as many teachers worried about the fire hazards from film projectors and also feared that technology would one day replace them and they would no longer have jobs (Major Trends of the Decade). Classrooms would continue to experiment with this new technology for years to come, in hopes of keeping up with the changing times. In the 1950s and 1960s, the demand for instructional television reached its height due to a shortage of teachers and overcrowded classrooms. In 1959, the Midwest Program of Airborne Television Instruction (MPATI) was created and 34 courses were televised to 2,000 elementary and secondary schools in six states (Saettler, 1990). Students were able to watch and learn from their classrooms, and many schools that were unable to participate in the program tried to acquire it by borrowing from other schools across the nation. It was a big step forward for the educational system and later in 1990, Christopher Whittle created a more advanced version of this known as Channel One, a show that aired in almost 12,000 public and private middle and high schools nationwide, while reaching 7. 7 million students (Borja, 2005). Studies done on MPATI showed that teachers disliked the program and found it interrupted their classes, so it lost much of its attraction to schools. While teachers did come to understand the importance of bringing the world into their classroom, the same situation evolved later with the classroom interruptions and Channel One in the 1990s and it has steadily declined in its use in classrooms. The decade of 1960 saw the introduction of computers into the educational setting, although it was not in many schools as the costs to supply them was too great for most school systems. The development of computers would continue to grow in the ‘70s and ‘80s, when microcomputers became available; more convenient for schools and somewhat more affordable. These decades saw rapid advancement in the way of computers, television, and video recorders, making it hard for schools to keep up with the latest equipment. As the 1990s progressed, computers and multimedia equipment continued to become more affordable and were widely used in many classrooms spanning the globe. While in the past students were content and well supplied by having a set of crayons, pens, pencils, books, and a chalkboard, technology has quickly advanced over the years to a point in which no classroom or student is complete without sophisticated sets of computers, DVDs, scanners, and the Internet. Technology has had a great impact on education in recent years. The trend to modernize schools and increase the amount of technology in the classroom has become apparent with the passing of new educational legislation and an increase of electronic devices in classrooms. Studies by major universities have also been undertaken to look at the use of computers and other items in learning and the effect that they have on students. The impact of technology on schools has been both positive and negative. While educators embrace the idea and the opportunities that new technology provides students, the trend has caused an increase in costs for an already under-funded system. Keeping up with such advances will be increasingly more expensive as time goes by. This cost is worth paying; however, as the trend in the workplace has also been moving toward technology as well. Studies have been undertaken by universities and researchers to learn the impact and necessity of technology in schools. A research project at the University of Georgia focused not only on the United States, but on many other English speaking countries as well, including Australia, Canada, and Great Britain. This study focused on the incorporation of media and technology in schools and the impact to which it has had on students and learning. The researchers found that these tools â€Å"are effective in schools as phenomena to learn both from and with. † (Reeves, 1998, The Impact of Media and Technology in Schools) The results of this effort point towards the importance of technology in school, and make an argument for its continued and increased use. Legislators, voters, and school officials have also realized the benefits of giving students an education involving technology. In recent years, the number of computers and other devices in schools has increased drastically. According to a study done by the California Department of Education in 2004, there were 1,181,649 computers in classrooms across the state. At that time, this was approximately 1 computer to every 5. 3 students. (California Department of Education, 2004) The number of computers in classrooms is expected to increase yearly, although the data has not yet been released for 2005. As these electronics do not come to schools cheaply, unless through donation, the State of California, as well as other states across the Union, have passed legislation to assist schools in purchasing the items. An example of this is California’s SB 1863, which was a bill signed into law by Governor Davis in 2002. This act grants non-profit organizations, such as public schools and hospitals, the ability to purchase computers and telecommunications systems at a discounted price (Bowen, 2002, SB1863). With legislation such as this in place, it is easier for schools to afford the necessary items they need to keep up with changing technology. As computers and other items are introduced into classrooms across the nation, teachers are being forced to learn how to use the technology and software in order to incorporate it into their lessons. For some, learning to do this can be difficult, while for others it may be simple. The amount of time it takes to learn the information and skills needed cuts into personal lives, taking away from family events and other activities. These hours are often unpaid, and are done from the teacher’s own desire to better instruct students for the future. Educating oneself to use computers and other devices is also expensive. Computers and their components are quite costly. Many teachers have to afford to buy the computers themselves. Teacher salaries are not exceptionally high, and purchasing such items is not always feasible. According to the American Federation of Teachers: The average teacher salary in the 2003-04 school year was $46,597, a 2. 2 percent increase from the year before. This falls short of the rate of inflation for 2004, this was 2. 7 percent. When adjusted for inflation, the 2003-04 salary actually drops 0. 4 percent from 2002-03. (American Federation of Teachers, 2005, Teacher Salaries Lag Behind Inflation) Teachers are also placed in another predicament as workplace trends are requiring computer and technology skills be incorporated into everyday business. A teacher’s job is to prepare their students for the future. In order to accomplish this goal, educators must be able to instruct their pupils in the areas of technology. To do this, teachers must be educated themselves, and in such a fashion that the teachers are forced to purchase nearly unaffordable items out of their own salaries. Including technology into the classrooms is important. Teaching students to use these items is beneficial to them and their futures. However, getting the tools to all students is difficult as funding is limited. Underprivileged schools tend to be less likely to have the computers that they need as funding is simply not available for them. This contributes to the problem of the technological divide, in which students from lower income areas do not have the equipment or skills to keep up with students in better neighborhoods and situations. In 1998, the incorporation of technology in schools cost roughly 16 billion dollars (Reeves, 1998, The Impact of Media and Technology in Schools). This money comes mostly from federal funding, but according to the study at the University of Georgia, it will not be enough to keep up with future needs. Technology in the schools is important. The inclusion of computers and other media in education of students will have a drastic impact on their future. These items are expensive but needed. Legislators are passing actions that will allow for funding to be available to purchase these items and place them into classrooms. In order for teachers to keep up with advancements in education, they have to learn to use the technology themselves. This takes their time away for other activities which they participate in and it can be costly in itself. The monetary cost of the inclusion of this trend in education is the biggest impact to which the system faces. Affording to pay for such material is difficult, as funds are hard to obtain. So, where will classrooms be in 10 years, 20 years? The question becomes where will teachers be? There are many proponents for online and virtual classrooms where a school room is not required, but there are many who object to this because school is not only where a child goes to learn, but it is also where a child goes in order to learn how to function in society. Currently in California, a new program has been implemented into high schools, it is the virtual enterprise, which gives students the opportunity to learn about business. However â€Å"there are no textbooks in the virtual enterprise (VE) programs. The classrooms don’t have the average-looking furniture; the furniture generally consists of cubicles, office desks, computers, fax machines and telephones. The teacher is called the coordinator, and the daily instruction is conducted with direct input from appoint company officers† (Tekaat-Davey, 2006). This form of environment is giving children a look into a more corporate environment, and for those students interested in a corporate world it is a very interesting form of education, and it is giving students a heads-up into how the â€Å"real-world† functions. Often, it takes a lengthy period of time for schools to implement new technologies because of the money constraints, however â€Å"a unique component of VE is the fact that it is very cost effective for the respective sites† (Tekaat-Davey, 2006). Many businesses donate the computers and other supplies that are needed in order to make the virtual enterprise environment work. This is an innovative approach that is giving the teacher a different role, but it may take on force because it is so much more cost effective. It seems that the goal of the future is to show children how to integrate technology into their lives effectively. Another aspect of technology is how small it makes the world, everything is so much closer through computers now, and students are going to be taught how best to interact and learn about different cultures, but schools in the United States are also going to need to compete more thoroughly with technologies in schools worldwide. Currently, 90 percent of schools have Internet connectivity and more than 33 percent of teachers have Internet access in their classrooms (Gahala, 2001). So yes, technology availability is there, but how to use it effectively is going to be the constant battle between teachers and technology experts. This country has developed in technology gradually over the years, even though sometimes it seems like it has been overnight. The growth of technology has been an ever-adapting process, and it is constantly changing. â€Å"Technology is not transformative on its own. Evidence indicates that when used effectively, ‘technology applications can support higher-order thinking by engaging students in authentic, complex tasks within collaborative learning contexts’ (Means, Blando, Olson, Middleton, Morocco, Remz, Zorfass, 1993)† (Gahala, 2001). But, will technology change the role of a teacher is what concerns many teachers today, and the answer is possibly. â€Å"As students become more self-directed, teachers who are not accustomed to acting as facilitators or coaches may not understand how technology can be used as part of activities that are not teacher-directed. This situation may be an excellent opportunity for the teacher not only to learn from the student but also to model being an information seeker, lifelong learner, and risk taker† (Gahala, 2001). So, even though the process of education may change, the traditional principles still hold, teachers are there to be a guide and a facilitator for education and knowledge. It is a teacher’s responsibility to incorporate current technologies into the history of teaching in order to give students the best possible education they can receive. Technology use impacting student grades All four research questions considered how technology use (low/high) as defined by overall use, teacher use and student use in the classroom effected at-risk students classroom grades. Inferential statistics showed no significant affect on at-risk student grades for any of the independent variables—teacher use, student use or overall technology use. For all the independent variables of teacher use, student use and overall technology use, the 1st quarter grades are higher for high technology using teachers. But that trend did not continue into second quarter for any of the independent variables. Since low GPA is a criterion for being identified at-risk at the studied school, it is logical that these students had low grades. However, some of these students had no passing grades, which is equivalent to a GPA of zero. The grade point average mean for the 66 at-risk students is 1. 52 at the end of the school year 2000–2001. Any grade mean above a zero is an improvement for some of the identified at-risk students. A possible explanation for this decline in grades is a greater use of technology in the 1st quarter. The researcher informally observed that students are immersed in technology in many of the classes: Power Point slide shows, travel brochures, postcards and video interviews are being created for presentations. During the 2nd quarter the classrooms slowly returned to a more traditional style. Some teachers, in informal discussions with the researcher, said they are using drill and practice, word processing for writing, and Internet for research projects. Without the use of technology infused in the classroom teachers would never know that with more constructivist methods students could achieve at higher levels. From research on the ACOT classrooms, students use technology as a tool to collect, organize, and analyze data; to enhance presentations; to conduct simulations and to solve complex problems. One of the changes seen over this 10-year study is the change in the lower-achieving students; the ones teachers could not reach with the teacher-centered learning. These students began to respond positively given the alternate ways of expressing their knowledge, which not only raised their self-esteem but their status with the teachers and their peers. The at-risk students are likely to show improvement in academic achievement when technology is used in the classroom appropriately. The conditions needed for appropriate use of technology to improve education are: first, the successful use of technology requires teachers to face their beliefs about learning and the efficacy of different instructional activities. Second, teachers view technology as one possible tool that must be used in the curriculum and instruction framework with meaning. Third, teachers need to become risk takers, experiment with technology, help and share with peers. Fourth, technology can be a catalyst for change, but the process of integrating technology is a long-term challenge for the teachers. In closing on student grades and technology, from the ten-year study conducted by ACOT comes this statement: â€Å"teachers also discovered that students who did not do well in a typical setting frequently excelled when working with technology. Low achievers had a chance to experience success and began concentrating and applying themselves to their projects† (p. 95). This study supports the findings in the present study indicating that the technology should be incorporated into the curriculum in meaningful, student-centered methods. Conclusion The impact of technology in schools is somewhere between its the only way to make a positive change in schools to its a new fad. They see technology as a strong tool for positive change but it must be presented in the right ways. Steps must be taken for technology to make a difference. Leaders of the schools must include everyone at the beginning of the plan, not after technology arrives. Leadership in the school system must plan for technology. Hire a full time technology director, involve the school in the changes, and provide the services that are needed for technology to succeed in the schools. Teachers must change the way they teach. Classrooms must take on the student-centered learning methods. Teachers need to become facilitators. Students need to be allowed to use technology as a tool, which will enable them to collect, analyze, and create major projects. When schools are prepared for technology, the entire school benefits. The quality of the time for technology to be integrated into the curriculum is the key to student learning, not the quantity of time with technology. Technology is not the entire solution for keeping at-risk students in the classroom, but it is a start in the right direction. References Aitoro, J. R. (2005). No Child Left Behind. VAR Business, 21, 1-2. American Federation of Teachers, (2005) Teacher Salaries Lag Behind Inflation. Retrieved from http://www. aft. org/presscenter/releases/2005/100605. htm on December 15, 2006 Borja, R. R. (2005). Channel one struggling in shifting market, Education Week, 24(43), 3-14. Bowen, D. (2002). SB 1863. Retrieved from http://info. sen. ca. gov/cgi-bin/postquery? bill_number=sb_1863sess=0102house=Bsite=sen on December 15, 2006 California Department of Education, (2004). Number of Computers Used for Instruction. Retrieved from http://www. cde. ca. gov/re/pn/fb/yr04numbcomp. asp. on December 15, 2006 Gahala, J. (2001). Critical Issue: Promoting Technology Use in School. Retrieved from http://www. ncrel. org/sdrs/areas/issues/methods/technlgy/te200. htm. on December 15, 2006 Harrison , J. and M.. (October 1983). How computers can help the schools. Education Flip Side. 2(7) page 70. Impact of Technology on Student Achievement, The. Apple Education; K-12 Education. Retrieved from http://www. apple. com/education/research. on December 15, 2006 Lane, C. , Portway, P. (No Date). Trends. The Education Coalition. Life of Thomas A. Edison,The. Retrieved from http://memory. loc. gov/ammem/edhtml/edbio. html. on December 15, 2006 Miller, M. and Cruce, T.. A 20th Century Timeline: Classroom Use of Instructional Film, Radio, and Television, retrieved from http://www. arches. uga. edu/~mlmiller/timeline/timelineintro. html. on December 15, 2006 Reeves, Thomas C, (1998). The Impact of Media and Technology in Schools. Retrieved from http://www. athensacademy. org/instruct/media_tech/reeves0. html. on December 15, 2006 Saettler, Paul (1990). The Evolution of American Educational Technology. Englewood, CO: Libraries Unlimited.

Monday, July 22, 2019

Production Control Essay Example for Free

Production Control Essay Spreading Cutting Sorting/Bundling Sewing/Assembling Inspection Pressing/ Finishing Final Inspection Packing Despatch Design / Sketch: In the garment manufacturing the first step is designing the sketch for the dresses that have to be prepared. For this purpose the designer first draw several rough sketches in the sketch book. The designer does not go for details at this moment but he rather let his creativity flow on the paper and he draws many sketches. Later these sketches are analyzed by a panel of designers. They finally select few out of them. These few sketches are rendered in detail separately or in the form of a single collection. The designer also draws working drawings along with the sketch. Working drawings are flat drawing of the sketch and it help  pattern maker  in understanding the patterns involved in the construction.  ·Ã‚  Pattern Design: The pattern maker now develop first pattern for the designsin any one standard size. This is made by pattern drafting method and the purpose of making this pattern is to create the sample garment for test fit.  ·Ã‚  Sample Making: The first patterns are sent to the sewing unit for assembling them into garment. This is usually stitched on calico or muslin which is an inferior quality of fabric and it reduces cost. This sample is constructed to analyze the pattern fit and design too. After the sample garment is stitched it is reviewed by a panel of designers, pattern makers and sewing specialists. If any changes have to be made they are made at this time.  · Production Pattern: The pattern design is now taken for creating the production patterns. The production pattern is one which will be used for huge production of garments. The pattern maker makes the patterns on standard pattern making paper. These papers are made-up of various grades. The most important component, the tissue paper pattern, is made from the lightest and thinnest paper commercially available (it is not made at the pattern companies). It is called 7. 5 lb (3. 4 kg) basis paper, meaning that a ream of it (500 sheets) only weighs

Sunday, July 21, 2019

The role of tourism in the development of Nigeria

The role of tourism in the development of Nigeria In discussing this, earlier work conducted on similar research will be made will be made reference to. This include: a research carried out by (Oji-Chukuwka, 2013) entitled Economic development of Nigeria-The Role of Tourism. This study was carried out using structured questionnaire and based on the notion that the federal government has heavily depended on agriculture and crude oil as the main stay of the Nigerian economy. As such, the researcher decided to carry out a research to unravel how well or otherwise the Ebonyi State Tourism Board has contributed to the Nigerian economy through the promotion of its tourism-related activities. The following were the objectives of the study: 1. If the Nigerian tourism sector has met the objectives with which it was set up? 2. If Government’s interference in the activities of the Ebonyi State Tourism board affects its performance in the long-run 3. If Tourism has created equal job openings for all classes of people. In another study, carried out in 2006, Noà «lleOConnor examined how television induced tourism has influenced Ballykissangel’s Residential Community in the long run. Ballykissangel is the title of a BBC television drama that was shot in Ireland. It aired from 1996 to 2001 and had six episodes. OConnor, simply wanted to find out if and how the decision to shoot the series in the rural Irish suburb has affected the tourist inflow into the community. The purpose of the study, according to her, was to examine the influence of television induced tourism on asmall rural basedcommunityinIrelandandhowitcanactuallyinfluencetourist development to adestination. Specifically, the researcher sought to find out the role of the television series’ in developing an area for tourism related activities. The case study chosen therefore for this research was Avoca, a small village in County Wicklow, Ireland that was the setting for the filming ofthe BBCtelevision series Ballykissangel. The major data for the work were collected fromasystematic sample of residents of Avoca and through personal interviews. 2.4. Empirical Literature During the course of consulting other research works that are in line with my research, the different methodologies used proffered different findings and conclusions. These would be highlighted here as part of the empirical literature. The first study, (Oji, Chukwuka, 2013,) discovered that the lukewarm and inadequate funding of the Ebonyi State tourism board was the one of the banes confronting the development of tourism in the state. Also, findings of his study revealed that the government were the major beneficiaries of the tax revenues derived from civil servants, visitors’ expenditure and tourism attraction. On the other hand, OConnor, discovered that alarge number of tourists were attracted toAvoca as due to the fact that the then popular seriesBallykissangel was being shot in the locality. Today , tourism hasbecome Avoca’s most vitalindustry since the closure of its cooper mines. The residents have also realised that not only has this increased their earnings, it has attracted the international attention to the once quiet suburb. It has also created job opportunities for the locals whilst instilling a sense of pride for the natives of the community. With regards to the tourism promotion, this study revealed that Television is currently the most potent of all media used in promoting tourism activities. In view of this, more consideration should be given to television as a medium of advertising. This may be because Television combines motion, sound, and special visual effects. The product can be demonstrated and described on TV. It also offers wide geographic coverage and flexibility as to when the message can be presented (Arens, 1996). 2.5 .Other relevant literature 2.5 .1 The Nature of the Nigerian Tourism Industry Nigeria currently boasts of an array of beautiful landmarks, amazing water-bodies which include the beaches, rainforests in the southern part of the country ,monuments, sites and sound, down to the hustle and bustle which is prevalent in the cosmopolitan cities like Lagos, Abuja and Port-Harcourt. All these have become particularly conducive and attractive for holidaying. Besides the tourist attractions, the culture, norms, artefacts, food, language, mode of dressing which all differ from one part of Nigeria to the other, have all contributed in making the country extremely unique in many ways. On many occasions, international tourists are in awe of the unique selling points of Nigeria despite the attendant issues like corruption and high poverty index. However according to (Uche, 2003) many of these attractions are largely still untapped notwithstanding the fact that they are largely exploited. They are savoured by visitors either rich and in search of adventure, new terrains and exploits. One cannot help but mention some of these attractive tourist sites which Nigeria boasts of. They include the Yankari Games Reserve, Olumo Rock, Mabilla Plateau, Zuma Rock, Gashaka Games Reserve and of course the coastal beaches which are unique and enchanting. Tourism is relatively at an infancy stage in Nigeria. This is more so because of the running neglect of the abundant resources naturally endowed on the country rather than the lack of them. Nigeria’s rich cultural diversity and tourist attractions are inexhaustible. Apart from Cultural sites and reserves which serve as potential tourist attractions, African countries like Nigeria have abundant cultural festivals that are very rich in mythology and diversity which can also be harnessed to generate revenue as well as serve as a means of creating some feeling of shared love and brotherhood among the various ethnic groups in Nigeria. These festivals include the fishing and New Yam festivals celebrated in almost all the nooks and corners of the country at various seasons of the year. The uniqueness of Nigeria’s tourism potentials have been confirmed and recognized by UNESCO, which has singled out the Sukur Kingdom in Adamawa State as a world heritage site. Other unique sites also recognized include the Three Sisters’ Rock, Kamala Mountains, Obudu Cattle Ranch, Lokoja Confluence, Osun Oshogbo Shrine, Gurara Waterfalls, Ikogosi Warm water springs, Oguta Lake, Kwa Waterfalls, Bwasu Hot water spring, Mboi pond, ancient natural and man-made caves and a host of other sites. Many years after the advent of television in Nigeria as well as the proliferation of private television stations across the country very little has been done to promote the tourism sector, which is a neglected goldmine, (Da Silva, 1999). However, despite the rich number of tourist sites and attractions in Nigeria, there have been a lot of impediments to the growth of the sector. These impediments are numerous and include acute conditions of advanced fee fraud popularly called 419, underdevelopment and poverty as well as the growing level of insecurity-fuelled by the activities of the insurgent group, Boko Haram, which many potential Nigerian bound tourist’ many not like to be confronted with. A survey on tourist activities in different geographical areas of Africa shows that Nigeria is one of the least favourite destinations which by extension earn less income. However, in spite of the enormous tourism potentials in Nigeria, the investigation shows that tourisms contribution to economic development in Nigeria leaves much to be desired, (Ovat, 2003). Sensing the impediments to the growth of the tourism sector and realising the important role that tourism can play in the economic and national development of Nigeria, led to the establishment of the National Tourism Policy. (Da, Silva, 1999) says the national tourism policy prescribes various ways of promoting the development of tourism in Nigeria through the following ways: Increase the flow of foreign exchange through the promotion of international tourism Encourage even development of tourism based enterprises. Accelerate rural/urban integration Foster socio-cultural unity among the various groups in the country through the promotion of domestic tourism Promotion and encouragement of active private sector participation Preservation of our cultural heritage and historical monuments Massive and aggressive publicity campaign to facilitate the growth and development of tourism Simplify the issuance of visas to intending visitors. Re-orientation for all security agencies including customs and immigrations,( Da, Silva,1999) While all these promises are okay, revenue from tourism sector has not been encouraging. A careful study of tourism statistics and data reveals that Nigeria in particular is one of the least favourite destination in the world, this by extension results in a colossal loss of revenue with untold hardship and effect on Nigeria’s gross domestic products , (Uche, 2003). On the other hand strongly believes that the Nigerian coastal waters and beaches are dirty and therefore unattractive to tourist. The negative publicity launched by the international media against Nigeria has also affected the tourist traffic in the country with (Nnadozie, 2007) identifying some of the problems affecting tourism development in Nigeria as follows -Government’s nonchalant approach to the tourism industry -The scourge of political instability which encourages wastage and poor resource management -Lack of foresight on the part of the elite who control virtually every sector of the economy. -Inadequate enlightenment and improper coverage of the tourism sector by the mass-media. Nigeria also has key rivals in the tourism industry namely Ghana, The Gambia, South Africa, Egypt, Kenya, Morocco and Mauritania. These countries have a better and more developed tourism industries in terms of infrastructure, maintenance, security and enlightenment. Another impediment to the growth of tourism in Nigeria is the general belief and habit of excessively copying anything western, despite our rich cultural heritage and tourism potentials. It therefore becomes imperative therefore to blame our artists and media practitioners for failing to portray our rich cultural and tourism potentials to the outside world. They often love to portray the culture of the foreigner to the foreigner, they want to speak and dress like them. They want to belong to their kind of caucus, yet they are nothing near them. The end result however is that they have made themselves copy-cats, rather than portraying have their own culture, ( Adekeye, 2007). However in the words of (Nasco, 1986), in this day and age when no country including ours, can’t afford to solely depend on the fluctuating oil market as the primary source of revenue, tourism, my dear friends is indeed an alternative for the mobilization of the much needed foreign exchange and local revenue. The Nigerian Tourism Development Commission, NTDC, traces the advent of tourism in Nigeria back to 1472 with the first Portuguese mercantile mission-trade tourism. However, the first attempt at structuring Tourism in Nigeria came about in 1962 when a group of Nigerians with interest in and commitment to the promotion of tourism set up a body then known as Nigerian Tourism Association (NTA). Prior to the creation of the Department of Tourism in the former Federal Ministry of Trade and Tourism in January 1990, very little or no attention was paid to the development of the sector. However, following the approval for the establishment of the department, a federal bureau was also created to champion the promotion and development of tourism in Nigeria. In the last few years, the Nigerian government has put in a lot of effort aimed at reviving and improving the tourism sector. In an attempt to explore other aspects of the Nigerian economy, economy with an emphasis on the tourism sector, the federal government took some concrete steps at ensuring the development of the culture, travel and tourism industries. They comprised of inauguration of the Presidential Council on Tourism, Federal Ministry ofTourism and its Departments and Agencies with same at the States’ level and Local Tourism Committees which falls in line with the provisions of the National Tourism Policy (NTP) of2005, the Nigerian Tourism Development Corporation (NTDC) of 1992 and the Nigeria Tourism Development Master Plan of 2006. Back in January 2003, President Olusegun Obasanjo, approved the sum of $548 million as grant to the transport, culture and tourism ministries for tourism master plan projects Udeorah, (2004). Primarily, this amount was earmarked to develop transportation, infrastructure, tourist sites, mobilization and public enlightenment towards accelerated tourism development. It is however evident that there is need for the mass media albeit television, to complement government’s effort at tourism development and promotion. Nigeria, with its population and array of tourist attractions and sites is yet to tap into this goldmine as a result of the dearth of tourism programmes on TV stations. Today, the apathy towards tourism, confronts broadcast stations in the country despite the abundance of tourism contents which can be explored to any capacity. The urgency to nurture, promote and sustain the Nigerian tourism sector cannot be over emphasized and can therefore not be overlooked, (Udeorah, 2004) The Nigerian tourism sector is still at an infantile stage amidst the abundant natural human and natural resources. Also, the infrastructures currently in place at the tourist sites and locations in Nigeria are nothing to write home about and consequently not make Nigeria the envy of other nations in this regard. When compared to countries like The Gambia, South-Africa, France and Spain who already have advanced tourism industries, Nigeria does have a long way to go (Dantata, 2011). Speaking at the Nigerian Tourism Investors forum and exhibition in Abuja in May 2014, DirectorGeneral of the Nigerian Tourism Development Board, Sally Mbanefo, noted that tourism is Indeed a tool for national economic development. She said there are several international initiatives that have highlighted the potential of tourism to contribute to economic growth and poverty reduction, as well as to environmental protection, cultural preservation, and job creation .

Saturday, July 20, 2019

Penguin Evolution Essay -- essays research papers fc

  Ã‚  Ã‚  Ã‚  Ã‚  On our Earth, we are graced with many fantastic life forms. From those gliding through the heavenly skies, to those at the deepest depths of the oceans, there is a plethora of various species. A group of these, though, is like a diamond in the rough. While many people admire its beauty, they have yet to realize that it’s the love for them that is dwindling its population. Who are these magnificent creatures†¦none other then the penguins.   Ã‚  Ã‚  Ã‚  Ã‚  Just about everyone’s seen a penguin, whether it be on TV, in a magazine, or at a zoo. This is because of the fact that penguins are highly saturated in the media and various industries. Think of Penguin Books or the Pittsburgh Penguins. All the cartoons you’ve seen with penguins in them. Unfortunately, due to mounting and continuing problems, penguins are in danger of becoming extinct. There may be a day were penguins won’t be in any media, simply because there won’t be anymore. Though one may have heard of news supporting them, or funds helping them, this crackdown is seemingly not helping as much as it needs to.   Ã‚  Ã‚  Ã‚  Ã‚  In order for one to understand the danger possessed by penguins, a background of the species and evolution is necessary. The impact people have on penguins is mostly destructive, and the future possibilities are gloomy if things don’t change. The endangerment of penguins is being perpetuated by human actions and these actions must cease for penguins to stay alive.   Ã‚  Ã‚  Ã‚  Ã‚  Simply saying penguins are endangered is not suffice. There are many kinds of penguins, each having its own status of vulnerability and danger. Just like all other living things, penguins have a Scientific Classification. Theirs is as follows. The class they are in is the Aves. This class includes all birds. The Order they are in is called the Sphenisciformes, followed by the only Family under it, the Spheniscide. Both of these include all penguins, living and extinct. Moving down, the only point with variation is that of the species. Most scientists agree that there are seventeen species of penguins, with a select few recognizing eighteen instead. (del Hoyo, 1992). See Chart A   Ã‚  Ã‚  Ã‚  Ã‚  The largest penguin is the Emperor Penguin, standing four feet tall and one hundred pounds. The smallest is the aptly named Litt... ...  Ã‚  Ã‚  Ã‚  World Book Inc, 2000. Davis, Lloyd S. and John T Darby. Penguin Biology. San Diego: Academic Press,   Ã‚  Ã‚  Ã‚  Ã‚  Inc., 1990. del Hoyo, Josep, Andrew Elliott and Jordi Sargatal. Handbook of the Birds of the World.   Ã‚  Ã‚  Ã‚  Ã‚  Vol 1, Ostrich to Ducks. Barcelona: Lynx Edicions, 1992. Dr. Dr. h.c. Grzimk, Bernhard. â€Å"The Penguins.† Animal Life Encyclopedia. Volume 7,   Ã‚  Ã‚  Ã‚  Ã‚  Birds I. New York: Van Nostrand Reinhold Company, 1968. Marchant, S. and P.J. Higgins. Handbook of Australian, New Zealand and   Ã‚  Ã‚  Ã‚  Ã‚  Antarctic   Ã‚  Ã‚  Ã‚  Ã‚  Birds. Melbourne: Oxford University Press, 1990. Name Unknown. â€Å"Nature. The World of Penguins.†   Ã‚  Ã‚  Ã‚  Ã‚  http://www.pbs.org/wnet/nature/penguins/resources.html Pasquier, Roger. â€Å"Penguin.† Encyclopedia Americana. Volume 21. Connecticut:   Ã‚  Ã‚  Ã‚  Ã‚  Grolier Inc, 1998. Simpson, George Gaylord. Penguins: Past and Present, Here and There. New Haven,   Ã‚  Ã‚  Ã‚  Ã‚  Connecticut: Yale University Press, 1976. Sparks, John and Tony Soper. Penguins. New York: Facts on File Publications, 1987.