Sunday, April 19, 2020
Monitoring System free essay sample
Introduction Desmark Motor Monitoring System is a system made to help the retailer in recording the customers information in a fastest way and to make the process easier. Desmark Motor Monitoring System will tally each inputted information given from the customer and will show the list of all motorcylce products only. This system is just use when theres a client who wants to purchase an item and to view its record. The system is also used only by the retailer or the admin of Desmark Motor Monitoring System for better security. This study aims to develop a System for the said establishment. A Monitoring system is a method of monitoring the availability of the product and the client who purchased the product. It provides the client As Desmark continues to expand, it has evolved and continues to exert more effort to provide customers with life-building technology for their satisfaction. Experiments obtained by Desmark Monitoring System using complex road scenes are reported, which demonstrate the validity of the method in terms of robustness, accuracy, and time responses. We will write a custom essay sample on Monitoring System or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Experiments obtained by Desmark Monitoring System using complex road scenes are reported, which demonstrate the validity of the method in terms of robustness, accuracy, and time responses. 1. 2 Statement of the Problem Due to the absence of the Honda Desmark Motor Monitoring System the following problems were observed: Possibility of redundant files. Cataloging searching is time consuming. Prone to record losses. 1. 3 Objective of the Study The proponent aims to develop a Product Monitoring System. These are the following solutions in regards to the problems. Reduction of redundant records/information. To make the searching easy and fast. To lessen record losses. 1. 4 Scope and Delimitation of the Study This study will provide Desmark with a better way of managing the availability of the product. The information can be accessed only by an authorized personnel or staffs security issues are also addressed. And will focus on the motorcycle product and customer will not include payment transactions. 1. 5 Significance of the Study This study benefits the following: Client, With the help of this study, customer will be able to access this transaction anytime anywhere within the specific country where you registered only. And it may help also to make the work easier and faster. School, The study will help the address the upcoming concern regarding the common problems in monitoring system. CEIT Faculty Members. The study will help the teachers understand the benefits of a health monitoring system. Researchers, The study will help the researchers address the problem about monitoring system in an easier and convenient manner. It will also guide them and enhance their skills and capabilities in handling monitoring techniques. Future Researchers, The study will help and guide them in improving future researches in handling monitoring system prior to the demands of the client. Definition of Terms The following definitions are to clear up and focus on the term as they pertain to this study. Technology. The systematic scientific study of technique. The application of science to the solution of practical problems. Automation. The process of getting work performed without any human effort except that of instructing one or more machines what to do and when to do it. Entertainment. To engage a person or audience by providing amusing or interesting material. Monitoring system. Supervision of activities in progress system to ensure they are on-course and on-schedule in meeting the objectives and performance targets. Monitoring techniques. Mechanisms the team use to monitor changes. REFERENCES [1] Chestnutt, J. ; Carnegie Mellon Univ. , Pittsburgh ; Michel, P. ; Kuffner, J. ; Kanade, T. http://www. cuecent. com/includes/pdfs/IVMS_brochure. pdf [2] Honda, H. ; Aptina Japan, Tokyo, Japan ; Osawa, S. ; Shoda, M. http://www. google. com. ph/? gfe_rd=crei=y8sVU776KszA8gflt4GgBQ#q [3] Wako Res. Center, Honda RD Co. Ltd. , Saitama, Japan http://en. wikipedia. org/wiki/Honda [4] Hirose, M. ; Haikawa, Y. ; Takenaka, T. http://www. hondaph. com/about http://www. papercamp. com/group/scope-and-limitations-in-monitoring-system/page-270 Chapter 2 Review of Related Literature and Studies This chapter presents the overview of the related literature and the studies, which serve as the background information relevant to the problem of the studies. 2. 1 Related Literature 2. 2 Related Studies Youve probably seen your chart at your doctors office. In fact, you may have charts at several doctors offices. If youve been in the hospital, you have a chart there, too. These charts are your medical records. They may be on paper or electronic. To keep track of all this information, its a good idea to keep your own personal health record. What kind of information would you put in a personal health record? You could start with Your name, birth date, blood type, and emergency contact information Date of last physical Dates and results of tests and screenings Major illnesses and surgeries, with dates A list of your medicines and supplements, the dosages, and how long youve taken them Any allergies Any chronic diseases Any history of illnesses in your family CHAPTER 3 RESEARCH METHODOLOGY This chapter explains the different phases that are used to carry out fully in developing the system. Such phases are the analysis modelling, system design, system requirements and Gantt chart. 3. 1 Analysis Modelling In Analysis Modelling stages gives out the details on the context diagram which show the flow of developing the Monitoring system. Context Diagram The context diagram contains the process that generalizes the function of the entire system in relationship to external entities. 3. 2 System Design On this stage, the researcher gives details on the development of the ââ¬Å"Honda Desmark Motor Monitoring Systemâ⬠, and how its been design. The latterââ¬â¢s used various diagram that illustrate the flow and the different application of the system. Data Flow Diagram The Data Flow Diagram shows the main processes within the ââ¬Å"Honda Desmark Motor Monitoring System. â⬠Entity Relationship Diagram The entity relationship diagram enables the project team to identify data objects and their relationship using a graphical notation. During the making of analysis model, the project team initially an Entity Relationship Diagram for the Monitoring System. Gantt Chart 3. 3 Data Dictionary The data dictionary contains the field name, domain, with the parameters of attributes,constraints and the description of attributes. Table login Name Domain Constraints Description username String Not null Admin Username Password String Not null Admin Password Table Register Name Domain Constraints Description Username String Null Employee Username Password String Null Employee Password Confirm Password String Null Employee Confirm Password Gender String Null Employee Gender First Name String Null Employee First Name Last Name String Null Employee Last Name Address String Null Employee Address Employee Number String Null Employee Number Contact Number String Null Employee Number Employee Account Name Domain Constraints Description First Name String Null Employee First Name Last Name String Null Employee Last Name Employee Number Integer Null Employee Employee Number Contact Number String Null Employee Contact Number Gender String Null Employee Gender Customer Account Name Domain Constraints Description First Name String Null Customersââ¬â¢ First Name Last Name String Null Customersââ¬â¢ Last Name Motor Brand String Null Customersââ¬â¢ Motor Brand Motor Number Integer Null Customersââ¬â¢ Motor Number Gender String Null Customersââ¬â¢ Gender Customer Number Integer Null Customersââ¬â¢ Number Address String Null Customersââ¬â¢ Address Home Number Integer Null Customersââ¬â¢ Home Number Phone Number Integer Null Customersââ¬â¢ Phone Number Stock Monitoring Name Domain Constraints Description Model Name String Not Null Brand Model Name Model Number Integer Not Null Brand Model Number Quality String Not Null Brand Quality Price Interger Not Null Brand Price Availability String Not Null Brand Availability Credit App 1 Name Domain Constraints Description First Name String Null Credit App_ First Name Last Name String Null Credit App_ Last Name Middle Name String Null Credit App_ Middle Name Sex String Null Credit App_ Sex Citizenship String Null Credit App_ Citizenship Birthday String Null Credit App_ Birthday Civil Status String Null Credit App_ Civil Status Tin String Null Credit App_ Tin Date Issued Date Null Credit App_ Date Issued Place Issued String Null Credit App_ Place Issued Address String Null Credit App_ Address Length of Stay String Null Credit App_ Length of Stay Home Phone Number Integer Null Credit App_ HomePhone Number Office Phone Number Integer Null Credit App_ OfficePhone Number Mobile Phone Number Integer Null CreditApp_ MobilePhone Number Email Address String Null Credit App_ Email Address Name of Spouse String Null Credit App_ Name of Spouse Age Interger Null Credit App_ Age Credit App 2 Name Domain Constraints Description Name String Null Credit App_ Name Home Address String Null Credit App_ Home Address Residence String Not Null Credit App_ Residence Civil Status String Not Null Credit App_ Civil Status Sex String Not Null Credit App_ Sex Home Phone Number Integer Null Credit App_ Relation w/ Applicant String Null Credit App_ Relation w/ Applicant Birthday String Null Credit App_ Birthday Tin String Null Credit App_ Tin Mobile Phone Number Interger Null Credit App_MobilePhone Number Present Employer String Null Credit App_ Present Employer Date Hired String Null Credit App_ Date Hired Position String Null Credit App_ Position Employerââ¬â¢s Address String Null Credit App_ Employerââ¬â¢s Address Employment Status String Not Null Credit App_ Employment Status Credit App 3 Name Domain Constraints Description Brand String Not Null Credit App_ Brand Model String Null Credit App_ Model Color String Null Credit App_ Color LCP String Null Credit App_ LCP Downpayment Interger Null Credit App_ Downpayment 1 Month String Null Credit App_ 1 Month 3 Months String Null Credit App_ 3 Months 6 Months String Null Credit App_6 Months 12 Months String Null Credit App_ 12 Months 18 months String Null Credit App_18 months 24 Months String Null Credit App_24 Months 30 Motnhs String Null Credit App_ 30 Motnhs Remarks String Null Credit App_ Remarks Approve String Null Credit App_ Approve Approve w/ Condition String Null Credit App_ Approve w/ Condition Disapproved String Null Credit App_ Disapproved 3. 4 System Requirements This show the various hardware and software requirements. Hardware Requirements Some possible hardware components to be used for the developing the system Laptop Rating 2. 9 Windows Experience Index Processor:Intel(R)Atom(TM)CPU N550 @1. 50GHz RAM: 1:00GB System Type: 32-bit operating system Optical Mouse Software Requirements The following are the software requirements to be used in the study: Programming Language: MS Visual Basic 6. 0 Database: My SQL Microsoft Word Microsoft Access Monitoring system free essay sample ABSTRACT Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. RFID technology which is a matured technology that has been widely deployed by various organizations as part of their automation systems. In this study, an RFID based system has been built in order to produce a time-attendance management system. This system consists of two main parts which include: the hardware and the software. The hardware consists of the motor unit and the RFID reader. The RFID reader, which is a low-frequency reader (125 kHz), is connected to the host computer via a serial to USB converter cable. The Time-Attendance System GUI was developed using visual basic. Net. The Time-Attendance Management System provides the functionalities of the overall system such as displaying live ID tags transactions, registering ID, deleting ID, recording attendance and other minor functions. We will write a custom essay sample on Monitoring system or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This interface was installed in the host computer. Keywords: Radio-frequency identification, RFID technology, radio waves INTRODUCTION Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. Radio frequency identification (RFID) is a matured technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal, or person. RFID chips contain a radio transmitter that emits a coded identification number when queried by a reader device. Some RFID tags can be read from several meters away and beyond the line of sight of the reader. The application of bulk reading enables an almost-parallel reading of tags. This small type is incorporated in consumer products, and even implanted in pets, for identification. The tags information is stored electronically. The RFID tag includes a small RF transmitter which transmits an encoded radio signal to interrogate the tag, and receiver which receives the message and responds with its identification information. Some RFID tags do not use a battery. Instead, the tag uses the radio energy transmitted by the reader as its energy source. The RFID system design includes a method of discriminating several tags that might be within the range of the RFID reader. RFID can be used in many applications. A tag can be affixed to any object and used to track and manage inventory, assets, people, etc. For example, it can be affixed to cars, computer equipment, books, mobile phones, etc. The Healthcare industry has used RFID to reduce counting, looking for things and auditing items. Many financial institutions use RFID to track key assets and automate compliance. Also with recent advances in social media RFID is being used to tie the physical world Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 168 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 with the virtual world. RFID in Social Media first came to light in 2010 with Facebooks annual conference. RFID is a superior and more efficient way of identifying objects than manual system or use of bar code systems that have been in use since the 1970s. Furthermore, passive RFID tags (those without a battery) can be read if passed within close enough proximity to an RFID reader. It is not necessary to show the tag to the reader device, as with a bar code. In other words it does not require line of sight to see an RFID tag, the tag can be read inside a case, carton, box or other container, and unlike barcodes RFID tags can be read hundreds at a time. Bar codes can only be read one at a time. Radio frequency identification (RFID) is a matured technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal, or person. They are grouped under the automatic identification (Auto-ID) technologies. RFID tags are not an improved bar code as the proponents of the technology would like you to believe. An RFID system consists of three components which include: an antenna, a transceiver and a transponder (the tag). The antenna and the transceiver are often incorporated into one reader. The antenna uses radio frequency waves to transmit a signal that activates the transponder. When activated, the tag transmits data back to the antenna. The RFID can read the tag using Radio Frequency, meaning that the RFID reader can be read from a distance, right through your clothes, wallet, bags etc. An RFID tag consists of unique ID for each tag. The RFID technology has been in existence since the early 1920s. This technology has been used in libraries, museums, race timing, toll collection and contactless payment, tracking of persons and animals etc. The RFID attendance system is an automatic embedded system used in taking attendance of registered persons in a particular organization. The RFID attendance system offers an organization, the efficiency and convenience associated with RFID technology at a low cost. This method is fast as well as simple. Each employee uses an RFID card and the reader records the data when the employee enters or exits. RFID devices and software must be supported by a sophisticated software architecture that enables the collection and distribution of location based information in near real time. A complete picture of the RFID attendance system combines the RFID Tags and readers with access to global standardized database, ensuring real time access to up-to-date information on the card. The card contains a unique identification number called an electronic product code (EPC). Nowadays, there are lots of companies around the world and some of them consist of workers up to 10 thousand or more. To handle a large number of workers may be a problem especially to get the attendance of the workers. The manual process means that whenever a worker comes to work, he goes to sign at the time officerââ¬â¢s table. This manual process has some flaws because in a case where a worker bribes the time officer or is familiar with him, the time officer may tamper with the attendance records. This would be a big problem in the company and might affect the productivity and management of the company. The suitable solution for this problem is by designing a system that will record attendance automatically. In this project, RFID system is used to record the numbers of employeesââ¬â¢ attendance automatically. The ID cards of the employees is embedded with RFID tag which is read by a reader. This RFID system is interfaced to a database through a computer. This method is more effective to prevent problem encountered when getting attendance manually. Below is the block diagram of an RFID attendance system. Related Works The use of Radio-frequency identification (RFID) technology in automated electronic environment and for tracking objects has been widely researched upon by researchers and deployed by various organizations as part of their automation systems. References [21] and [7] provide examples of a real RFID contact less data link deployments that utilize RFID technology for object tracking and automated data collection solution. RFID is a technology that uses radio waves to transfer data from Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 169 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object In 1945, Leon Theremin invented an espionage tool (for spy activities) for the Soviet Union which retransmitted incident radio waves with audio frequency information. Sound waves vibrated a diaphragm which slightly altered the shape of the resonator, which modulated the reflected radio frequency even though this device was covert listening device, not an identification device or tag, it is considered to be a predecessor of radio frequency identification (RFID) technology because it was likewise passive, being energized and activated by waves from an outside source. Similar technologies such as the IFF (identification friend and foe) transponder developed in the United Kingdom, was routinely used by the allies in the World War 2 to identify aircrafts as friend or foe. Transponders are still used by most powered aircrafts to this day. Mario . W. Cardullo was the first to have received the United States patent for an active RFID tag with re-writable memory on January 23, 1973 [4]. In that same year, Charles Walton, a California entrepreneur, received a patent for a passive transponder used to unlock a door without a key. A card with an embedded transponder communicates a reader near a door, when the reader detects a valid identification number stored within the tag, the reader unlocks the door. Walton licensed the technology to Schalge lock of San Francisco, a lock maker and other companies [1]. Time and attendance systems are a major part of todayââ¬â¢s human resource systems, take organization towards better human resource practice, systems and excellence. The implementation of time and attendance system has a lot of advantages for the manager. The kind of system that is implemented depends upon what the organization is trying to achieve by implementing the system. There are different types of automatic attendance systems; each type of system is suited to different needs and requirements [9]. Some of the most common types include; biometric attendance system, magnetic stripe attendance system, barcode attendance system, and RFID attendance system. Barcode Attendance System The barcode system is a common type of time and attendance system through which the efficiency of measuring and tracking employeesââ¬â¢ time could be increased to a great degree. With the automation through barcode technology, the errors previously made in the manual payroll or attendances are eliminated. As a result, the system provides high levels of accuracy and reliability in tracking of employee attendance. In addition, the costs associated with the installation of the system are not too much relative to the cost of payroll or attendance errors. The implementation of the barcode system is easy. Every employee is issued a badge/card in which there is a barcode. In order to check into or out of the company, the badge/card is swapped on the time clock, and the data is captured by the clock. This data from the clock can be downloaded by the manager or the administrator and then used for updating and maintaining time and attendance records. The Universal Product Code (UPC) is a unique 12-digit number assigned to retail merchandise that identifies a product and the vendor. The Universal Product Code (UPC) on a product typically appears adjacent to its barcode, the machine-readable representation of the Universal Product Code (UPC). The UPC for a particular product is always the same. The first six digits is the vendor unique identification number. All the products that the vendor sells will have the same first six digits in their UPCs. The next five digits identify the product. The last digit is called the check digit. This is used to verify that the UPC for that specific product is correct. Each time that UPC is read, typically by a scanner reading the barcode, a calculation is done. And, if the check digit is different compared from the one that is calculated, then the computer knows that there is something wrong with the UPC. Figure 1 is a pictorial diagram of a barcode with its universal product code (UPC) [11]. Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 170 ISSN-L: 2223-9553 ISSN: 2223-9944 9553, Academic Research International Vol. 2, No. 2, March 2012 Fig. 1 picture of a barcode Biometric Attendance System This is the study of measurable biological characteristics. In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. There are several types of biometric identification schemes which include:-face fingerprints, ecked. include: face retina, hand geometry, vein, voice etc. The computer uses any of these biometric identification schemes to determine who you are, and based your identity authorize your different levels of access authorize [12]. Under this system, there is time and attendance software that is paired with a time clock for employees which uses biometric technology for authentication purposes. When these systems are in use, the employees can use their finger prints for clocking in and clocking out. This method has the great benefit that the entire process is easy as well as quick. Other advantages include elimination of the cost previously incurred in getting the employees cards. In the other systems that uses card other (magnetic stripe and barcode systems), there is an ongoing expense associated with the damage, misplacement and stealing of cards and the continuous need for their restoration and maintenance. Magnetic Stripe Attendance System In the magnetic stripe attendance system, data is encoded in the magnetic stripe of the employee card. When the card, is swiped through the employee time clock, the information in the cardââ¬â¢s magnetic stripe is recorded by the time clock. This system also reads one card at a time and also requires contact reads with the reader. Figure 2 is a pictorial diagram of a card embedded with magnetic strip. Fig. 2 picture of a magnetic stripe card Radio Frequency Identification (RFID) A radio-frequency identification system comprises hardware shown in figure 3a 3b, known as frequency interrogators or readers and tags, also known as labels, as well as RFID software or RFID tags , middleware. RFID tags are of two major types, which include Active Tag and Passive Tag. and Fig. 3a RFID tag Copyright à © 2012 SAVAP International www. savap. org. pk Fig. 3b RFID card and reader www. journals. savap. org. pk 171 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 RFID tags can be either passive, active or battery assisted passive. Passive RFID does not use a battery, while an active has an on-board battery that always broadcasts or beacons its signal. A battery assisted passive has a small battery on board that is activated when in the presence of a RFID reader. Most RFID tags contain at least two parts: one is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions; the other is an antenna for receiving and transmitting the signal. Depending on mobility, RFID readers are classified into two different types: fixed RFID and mobile RFID. If the reader reads tags in a stationary position, it is called fixed RFID. These fixed readers are set up specific interrogation zones and create a bubble of RF energy that can be tightly controlled if the physics is well engineered. This allows a very definitive reading area for when tags go in and out of the interrogation zone. On the other hand, if the reader is mobile when the reader reads tags, it is called mobile RFID. An Electrical Engineering student of the University of Malaysia; Mohd Firdaus Bin Mahyidin designed RFID technology studentsââ¬â¢ attendance system 2008 [10], which only takes attendance of students and stores the information in the database. The block diagram of his project is shown figure 4. However, this system does not the incorporate a door unit which allows access to only registered users. Fig. 4: RFID Technology Students attendance system. Comparing Barcode with RFID is done on table 1. Table 1: comparisons between Barcode and RFID 1 2 3 4 5 6 7 Barcode Rely on the user to make contact to the reader, hence cannot be read from a distance In Barcode, only one card read at a time is allowed. Embedded information cannot be updated, hence the restriction of the repeated overwriting if the embedded election information for each card It does not allow for the increase technologies like surveillance cameras to be activated with an employee being in the vicinity. RFID Do not require contact with reader, hence can be read from a distance. Multiple read at a time is permitted Embedded information can be updated; this allows the repeated over-writing if embedded electronic information for each card. RFID has increased technologies like surveillance cameras to be activated in conjunction with an employee being in their vicinity. It is slower and requires time of sight to RFID is faster and does not require line of function. sight. It has lower data storage transponder. It has higher data storage. This transponder is bogus, and cannot be The transponder is miniaturized, and can be incorporated in small items. incorporate in other items. For example in 2009 researchers successfully glued RFID micro-transponder to live ants [1] Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 172 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 Radio Frequency Identification (RFID) Attendance System RFID READER GRAPHICAL USER INTERFACE (GUI) DATABASE MICROCONTROLL COMPUTER ER DOOR UNIT POWER SUPPLY UNIT Fig. 5 Block diagram of an RFID attendance system with door unit The RFID attendance system offers the organization, the efficiency and convenience associated with RFID technology at a low cost. Each employee uses an RFID card and the reader records the data when the employee enters or exits. Operations RFID devices and software are supported by a sophisticated software architecture that enables the collection and distribution of location based information in near real time. A complete picture of the RFID attendance system combines the RFID Tags and readers with access to global standardized database, ensuring real time access to up-to-date information on the card. The card contains a unique identification number called an electronic product code (EPC). The RFID tag can be read from a distance and the embedded electronic information for each card can be over written repeatedly. This increases technologies like surveillance cameras to be activated in conjunction with an employee being in their vicinity. The RFID attendance system is faster, and does not require line of sight. The RFID system has higher data storage. In the RFID systems, the transponders are also easy to conceal or incorporate in other items. For example in 2009, researchers successfully glued RFID micro transponder to live ants in order to study their behavior [1]. Furthermore, multiple RFID cards can be read all at the same time. Information about the employeesââ¬â¢ access and attendance can be stored on the database. RFID Frequency band Frequency refers to the size of the radio waves used to communicate between the RFID systemââ¬â¢s components. It can be assumed that higher frequency resulting faster data transfer rate and longer reading distance. However as frequency increases, the sensitivity to environmental factor also increases. RFID system currently operates at Low Frequency, High Frequency and Ultra High Frequency. Generally a lower frequency means a lower read range and slower data read rate, but increased capabilities for reading near or on metal or liquid surfaces. The frequency chart is shown in table 2 [18]. Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 173 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 Table 2: RFID Frequency Table Frequency band Description Operating range Application benefits Drawbacks Access control, animal tracking point of sale application, product authentication, vehicle immobilizer etc Smartcards library books, airline baggage etc Works well around water and metal products Short range slower rate Low cost of tag High read rate when compared to low frequency 125KHz to 134KHz Low frequency Less 0. 5m to 1. 5ft than read and read 13. 56M Hz High frequency Less 1m to 3ft than 860MHz To 930MHz Ultra high frequency (UHF) 3m to 9ft Parking lot access, electronic toll collection etc EPC standard built around this frequency Does not work well with high water or metal content 2. 4GHz microwave 1m to 3ft Airline baggage, electronic toll collection Most expensive Fastest rate read Miniaturization RFIDs are easy to conceal or incorporate in other items. For example, in 2009 researchers at Bristol University successfully glued RFID micro-transponders to live ants in order to study their behavior [6]. This trend towards increasingly miniaturized RFIDs is likely to continue as technology advances. Hitachi holds the record for the smallest RFID chip, at 0. 05mm x 0. 05mm. This is 1/64th the size of the previous record holder, the mu-chips. Manufacture is enabled by using the silicon-on-insulator (SOI) process. These dust-sized chips can store 38-digit numbers using 128-bits read only memory (ROM) [7]. A major challenge is the attachment of the antennas, thus limiting read range to only millimeters. The Radio Frequency Identification (RFID) Application Areas In 2010 three key factors drove a significant increase in RFID usage. They include; decreased cost of equipment and tags, increased performance to a reliability of 99. 9% and a stable international standard around UHF passive tag. The areas of significant use are financial services for Information Technology asset tracking and healthcare with more than 60% of the top medical device companies using passive UHF RFID in 2010. RFID is becoming increasingly prevalent as the price of the technology decreases [7]. Therefore, the current uses include: Electronic Vehicle Registration With security of cars being a major concern in many countries, RFID technology is being leveraged by government for Vehicle Registration [21] [13]. This helps detect stolen cars and in their retrieval [14] [18]. Payment by Mobile Phones Since summer 2009, two credit card companies have been working with Dallas, Texas-based Device Fidelity to develop specialized microSD cards. When inserted into a mobile phone, the microSD card can be both a passive tag and an RFID reader [19]. After inserting the microSD, a users phone can be linked to bank accounts and used in mobile payment. Diaryqueen in conjunction with Vivotech has Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 174 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 also begun using RFIDs on mobile phones as part of their new loyalty and rewards program. Patrons can ask to receive an RFID tag to place on their phone. After activation, the phone can receive promotions and coupons, which can be read by Vivotechs devices [16]. Similarly,Nokias 2008 device, the 6212, also has RFID capabilities. Credit card information can be stored, and bank accounts can be directly accessed using the enabled handset. The phone, if used as a vector for mobile payment, has added security in that users would be required to enter a passcode or PIN before payment is authorized [16]. Transportation Payments Governments use RFID applications for traffic management, while automotive companies use various RFID tracking solutions for product management. Car-Sharing The Zipcar car-sharing service uses RFID cards for locking and unlocking cars and for member identification [20]. Toll Roads The tags, which are usually the active type, are read remotely as vehicles pass through the booths, and tag information is used to debit the toll amount from a prepaid account. The system helps to speed traffic through toll plazas as it records the date, time, and billing data for the RFID vehicle tag. This has been introduced in some places in Nigeria. Public Transit (bus, rail, subway) In South Korea, t-money cards can be used to pay for public transit. It can also be used in most convenience stores and vending machines in subways as cash. 90% of cabs in Seoul accept card payment, including most major credit cards and the T-money card. T-money replaced UPASS, first introduced for transport payments in 1996 using MIFARE technology [15]. Also, in Hong Kong, mass transit is paid for almost exclusively through the use of an RFID technology, called the octopus card. This has also been used in various other countries like Canada, Russia etc [15]. Asset Management and Retail Sales RFID combined with mobile computing and Web technologies provide a way for organizations to identify and manage their assets. It was initially introduced to major retail by Craig Patterson, Knoxville, TN. Mobile computers, with integrated RFID readers, can now deliver a complete set of tools that eliminate paperwork, give proof of identification and attendance. Web based management tools allow organizations to monitor their assets and make management decisions from anywhere in the world. Web based applications now mean that third parties, such as manufacturers and contractors can be granted access to update asset data, including for example, inspection history and transfer documentation online ensuring that the end user always has accurate, real-time data. Organizations are already using RFID tags combined with a mobile asset management solution to record and monitor the location of their assets, their current status, and whether they have been maintained. RFID is being adopted for item-level retail uses. Aside from efficiency and product availability gains, the system offers a superior form of electronic article surveillance (EAS) and a superior self checkout process for consumers. The financial services technology consortium (FSTC) set a technical standard for tagging Information Technology assets [21] and other industries have used that standard as a guideline. For instance the US State Department is now tagging IT assets with passive RFID using ISO/IEC 18000-6 standard [8]. Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 175 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 Schools and Universities School authorities in the Japanese city of Osaka are now chipping childrens clothing, back packs, and student IDs in a primary school. Similarly, Whitcliffe Mount School in cleckheaton England uses RFID to track pupils and staff in and out of the building via a specially designed card. In the Philippines, some schools already use RFID in IDs for borrowing books and also gates in those particular schools have RFID ID scanners for buying items at a school shop and canteen, library and also to sign in and sign out for student and teachers attendance [8]. Human Implants Implantable RFID chips designed for animal tagging are now being used in human beings. An early experiment with RFID implants was conducted by British professor of cybernetics Kevin Warwick, who implanted a chip in his arm in 1998. In 2004 Conrad chase offered implanted chips in his night clubs in Barcelona and Rotterdam to identify their VIP customers, who in turn use it to pay for drinks. In 2004, the Mexican Attorney Generals office implanted 18 of its staff members with the verichip to control access to a secure data room [15]. Fig. 6a Hand with the planned location of the RFID chip Fig. 6b The hand just after the operation to insert the RFID tag was completed. The yellow is from the iodine disinfection before inserting the chip APPLICATIONS OF RFID TECHNOLOGY IN NIGERIA The RFID technology has been suggested to be applied in various sectors in Nigeria to reduce corruption. These sectors include; the monitoring of crude oil, tracking the movement of money, drug agencies and monitoring containers entering the country. Other proposed applications include: the cloning of documents such as certificate of occupancy, bills of lading and university certificates etc. An RFID technology company in Nigeria started providing anti-money laundering (AML) solutions to banks. The technology tracks the movement of money and alerts the Nigerian Financial Intelligence Unit of any suspicious activities. The company is providing the service to five major Nigerian banks. This technology has been used by NAFDAC to reduce the importation and distribution of counterfeit drugs 2008 [17]. SYSTEM DESIGN AND IMPLEMETATION METHODOLOGY The method/approach used in achieving this project design include; the designing of a hardware unit consisting of a motor interfaced with a designed database and graphical user interface(GUI) that will be responsible for taking and storing the data received from the reader. And the software development Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 176 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 unit consisting the Microsoft visual studio, Microsoft . Net framework and Microsoft access. This is done by comparing the information received from the RFID reader to the information stored in the database. The Hardware The hardware architecture consists of the UME4100 RFID tag, the SEEED 125 KHz RFID reader, the ATMEL AT89S52 microcontroller, the computer, the door unit, the power supply unit, the universal serial bus (USB), USB to serial converter, the RS-232 interface, the universal asynchronous receiver transmitter (UART) and the serial data transmission. The RFID reader in figure 7 uses low frequency band, and practically, the reading distance between the tag and the reader is about 7cm. The output of this reader is transmitted serially, and data is transmitted at 9600 baud rates. However, this reader has been chosen because it has a DB9 female header, which can be used to connect to the serial port of personal computer, and it can display the unique ID of the tag in Window operating system. Its applications includes Pet Toys and Access Control System Fig. 7 The SEEED RFID reader [2] (module and antenna) The figure 8 shows the RFID tags used in this paper. These RFID tags are passive tags thus it has no internal power supply. These tags activated by radio frequency transmitted by the reader. The reading distance is about 7 cm. When the RFID reader receives the data from the tag, the data then will be compared with the data in the database to identify the holder of the tag. Fig. 8 The UEM4100 RFID tag This design consists of the RS-232 circuit, the motor circuit and the microcontroller. The RFID reader sends signals to the RS-232 circuit which interfaces with the serial port. The microcontroller is programmed to receive signals from the RS-232 circuit and sends signals to control the motor circuit which controls the direction of movement of the door. The crystal oscillator generates pulses that enable the microcontroller to execute instructions. The microcontroller codes are written with assembly language. The motor unit controls the movement of the door. The microcontroller sends signals to the transistor which acts as a switching device. These transistors allow current flow into the relay. The RS-232 converts the transistor-transistor logic data to enables communication with the serial port. The Software The software development unit consisting: the Microsoft visual studio, Microsoft . Net framework and Microsoft access [3]. Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 177 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 Microsoft Access Database: There are two databases designed using Microsoft Access 2007. The databases named ââ¬Å"regDBâ⬠and ââ¬Å"attendanceâ⬠. The ââ¬Å"regDBâ⬠database stores information of registered users. This information is used by the administration to identify and manipulating attendance information.
Sunday, March 15, 2020
The Impact of Humans on the Biological Diversity of Natural Ecosystems Essays
The Impact of Humans on the Biological Diversity of Natural Ecosystems Essays The Impact of Humans on the Biological Diversity of Natural Ecosystems Essay The Impact of Humans on the Biological Diversity of Natural Ecosystems Essay The Impact of Humans on the Biological Diversity of Natural Ecosystems Introduction Since humans have come into existence they have always been a cause of change of whatever natural areas they inhabit along with the living organisms of those natural areas. The different types of organisms such as plants, animals, and microorganisms that inhabit these areas are known as biological diversity or biodiversity. (USEPA 2010 ) Biological diversity can be affected by many different things, climate change, and area being two specific things. Humans fit into a strange niche of biological diversity. While we have a part of biodiversity and in ecosystems, the human race has spread much farther than any other breed or type of organism except for bacteria. (Diaz 2006) Humans have spread into so many other ecosystems that are not meant to be inhabited by humans and through technology, industrialization, and evolutionary changes have changed these natural ecosystems. As the population size of the human race increases the biological diversity of natural ecosystems seems to decrease. Humans have made an effect on several types of different systems aquatic, forest, and landscape conservations, changing permanently the biodiversity of these natural ecosystems in some form or fashion. White 2 Deforestation Deforestation is one major issue that has been caused by human population growth. Deforestation is the loss of forest due to the act of trees being overcut. This becomes such a big issue due to a problem known as soil erosion that occurs when deforestation happens. Soil erosion is the loss of the protective top layers of soil which take away from the ability of the soil to soak up and hold water. Stock and Rochen 2000) Beyond hurting the air quality that humans need soil erosion and deforestation becomes an issue that affects humans especially when it comes to agriculture. To have successful agricultural profit soil that has water holding properties is necessary. To yield a useful crop the top layers of soil are necessary which when deforestation is used to clear farm land are lost which keeps farmers from producing a good crop. Deforestation also causes many homes for different organisms to be lost endangerment and in extreme cases because the organisms natural habitat and food sources have been lost, extinction. Extinction becomes more likely when the majority of deforestation occurs in tropical regions for agriculture, paper from the trees, or industrialization these regions have numerous undiscovered organisms plant, animal, and microorganisms. Biological diversity and human welfare becomes compromised due to the ever extending reach and spread of the human population. Erosion Erosion by definition is the wearing down of something by grinding away, such as the wear on the Earth due to wind and water. Erosion is a naturally occurring process but yet still dangerous and aided by humans and the spreading population of humans, wearing away at the Earth, there is lost biological diversity of different plants and animals, because, the natural White 3 ecosystem and habitat has been eroded away. When erosion happens plants are lost and a lot the times made to be extinct. Which slowly but surely causes there to be a less diverse population of different plant species. And when plants disappear the animals will to in search of food causing a geographic migration of different animal populations and species. Rivers have been channelized to facilitate boat traffic, prevent flooding, and allow farming along their banksâ⬠(Audesirk 2008). As humans take from the environment we remove key nutrients and sediments from rivers and land, helping along the erosion process. Aquatic Systems As humans water is a necessary part of our diet in order to live. While we spread throughout the globe not on ly do we tamper with the balance of biodiversity of land ecosystems we also tamper with the biodiversity of aquatic systems too. As the populations of humans grow industrialization grows too, and is it known many companies do not dispose of the byproducts and waste of their companies properly; so waste, such as chemicals and other trash and debris are tossed into rivers. Eventually all rivers lead and empty out into oceans which means said chemicals are dumped into the ocean. These chemicals, waste, and debris float freely into the human population water supply and into the animals of aquatic systems water supply and habitats. These animals are exposed to the companiesââ¬â¢ byproducts and they affect the life span, and habitat quality of the animals. Yet again human population growth can cause extinction of species, populations, communities, etc. due to the lack of regard or concern of how the biodiversity of natural ecosystems affects all species in the long run. White 4 Landscape Conservation Though humans have made a huge impact on the biodiversity of many and most ecosystems; it is recognized that for as much damage has been caused there should be some type of effort to improve and try to restore the biodiversity in some ecosystems. So was created the National Landscape Conservation System in 1969 ( CSA 2009). The mission of this system is to ââ¬Å"conserve, protect, and restore these nationally significant landscapes that have outstanding cultural, ecological, and scientific values for the benefit of current and future generationsâ⬠. (CSA 2009 ) However this system of land conservation is solely interested can only benefit Western/American land. The goal is to protect the USAââ¬â¢s most prized beautiful lands from being lost to the human populationsââ¬â¢ impact on biological diversity of ecosystems. Though this system makes a good effort on protecting Western lands, there is still the matter of all the lands and waters around the world that could use protecting and preserving from humans in order for future generations to receive the full benefits that can be offered from the different ecosystems. Discussion A well educated member of society should have an understanding of this issue in order to understand the affect humans are having on our planets. As biological diversity decreases throughout the worlds natural ecosystems resources that could help the human population are continuously lost on a daily basis. Biological diversity can be related to agriculture that is highly affected when biodiversity is lost. And what the government does with land and regulations put White 5 on certain lands and waters. Biodiversity and the lack there of are major social issues that can relate back to all humans. Because as we decrease biodiversity with the spread of our population we affect our living standards as well, and those of many animals and other organisms. Science an provide all of the background information, statistics, and experimentation in the world but science cannot fix the decreasing of biodiversity when the problem is the spread of the human population into other ecosystems. Science cannot ââ¬Å"cureâ⬠or fix population growth. While science can make one more aware it cannot fix the actual situation. Conclusion Humans hav e a major impact on the biological diversity of natural ecosystems and as time has gone on, the issue has become more apparent and prominent. Biological diversity is important in regards to humans because without it valuable information, beneficial plants and animals are lost. When erosion and deforestation occur animals and plants lose their natural habitats and are forced to migrate and some species become extinct. Erosion and deforestation also make land useless for agriculture meaning that the land after being cleared yields no purpose or goods for the human population. The aquatic systems suffer when humans show no regard to the fact that other creatures most coincide with the human population. Though companies have gotten better with what is done with their waste more is still able to be done to prevent a further decrease of biological diversity. Humans recognize now as the Earth loses more and more biological diverse ecosystems that something must be done to at least attempt to preserve the different plants, animals, and microorganisms that live in different biologically diverse natural White 6 ecosystems. Thus the National Landscape Conservation System and several other organizations were created in hopes of bringing awareness to the growing issue of the loss of biodiversity throughout the planet. Human population has a major impact on biological diversity in natural resources. Though the population tries to prevent any more damage from being done the fact is that humans have had a major negative impact on the biodiversity of natural ecosystems through the spread of the population, industrialization and negligence for the surrounding area shared by humans with other ecosystems. White 7 United States Environmental Protection Agency. Ecosystems and Biodiversity . Washington, DC: United States Government, 2010. Web. 10 Nov 2010. epa. gov/climatechange/effects/eco. html Stock, Jocelyn, and Andy Rochen. The Choice: Dooms Day or Arbor Day. Deforestation. University of Michigan, 01/21/2000. Web. 10 Nov 2010. umich. edu/~gs265/society/deforestation. htm Audesirk, Teresa, Audesirk, Gerald, and Byers, Bruce E. Biology Life on Earth. Eighth Edition. Upper Saddle River. Prentice Hall. 2008. Print. Diaz, Sandra. Why is Biodiversity Essential for Human Life?. Sep. 2006: n. pag. Web. 10 Nov 2010. http://news. softpedia. com/news/Why-Is-Biodiversity-Essential-for-Human-Life-34980. shtml The National Landscape Conservation System. The Conservation System Alliance. N. p. , January 29 2009. Web. 10 Nov 2010. conservationsystem. org/conservationsystem
Thursday, February 27, 2020
Consider the problem of global warming in todays society, and suggest Essay
Consider the problem of global warming in todays society, and suggest solutions for the prevention of continued global warming - Essay Example throughout its history and most of the changes have been due to the changing orbital pattern of the earth and changes in the amount of solar energy received by the earth. However the present increase in global warming occurring within the earth is also a result of increased population growth, urbanization and other human activities. All these have caused a net increase in the amount of greenhouse gases which is believed to the major causative factor for the increased warming in the earth (National Aeronautics and Space Administration, n.d). While these changes have necessitated the implementation of suitable policy changes, the global economic crisis and other special interests have nearly halted the progress towards framing such a policy. Devising such a plan, would involve the combined efforts of both governmental and non-governmental organizations for their inputs about possible calamities and in specifying the resources required in the wake of such a crisis. Urbanization and population growth: A principle contributing factor for the rise in greenhouse gases is man-made activities through urbanization and the rapid rise in population growth. Urbanization has had a profound effect on the environment worldwide as it has caused changes to the land, water and atmosphere. The number of people living in urban areas has tripled over the years and studies estimate that more than half the worldââ¬â¢s population will reside in urban areas in the next few years (Torrey, 2004). One of the major contributing factors for the rise in urbanization is the population growth which has shown an exponential increase over the past 50 years (Little Flower, 2006; World Population Growth, 2004). This increase as well as migration of the world population will have an effect on the natural environmental resources owing to the increased consumption of food, energy, water and land. It has increased the air, water and noise pollution levels and other phenomena suc h as global warming which is
Tuesday, February 11, 2020
International Marketing final term paper on any brand from 'Interbrand
International Marketing final on any brand from 'Interbrand top 100 brands'. Walmart cannot be chosen - Term Paper Example This has hugely contributed to success of the company. McDonaldââ¬â¢s first international venture was in Canada and then it had proceeded into the European and Asian markets. In all these places, the company has successfully positioned itself as a major player in food retail (Bonanno and Constance, 2008). The purpose of this paper is twofold. The first section will focus on marketing strategy that has been adopted by McDonaldââ¬â¢s while venturing into foreign markets so as to comprehend whether it has used standardization or adaptation policies. The second part of the paper focuses on Internationalization process theory that had been adopted by McDonaldââ¬â¢s in its foreign ventures. It has been observed that when multinational companies venture to foreign markets, they either use globalization strategies or localization strategies to promote their products. When a company pursues globalization strategy, it promotes standardized products in all places of operation. Multinationals, following this strategy, use standardized products, prices and distribution channels and promotional campaigns. Companies tend to adopt this marketing mix because standardized products are easier to brand and label. Most importantly, it helps to reduce operational cost of the company. Internationalization marketing strategies, on the other hand, are related to customization of marketing strategies for different locations in which the company operates. The rationale behind adopting this strategy is that cultural, national and regional preferences of the target market are incorporated in the marketing strategy so as to maximize probability of product acceptance (Vignali, 2001). Taylor (1 991) had pointed out that in order for a company to attain competitive advantage, both globalization and internationalization strategies must be employed. A large number of organizations have adopted ââ¬Å"Think
Friday, January 31, 2020
Ethics and Islam Essay Example for Free
Ethics and Islam Essay The interpretation of secular vs. religious ethics is always interesting, when we try to understand which of the two deserve our support. Obviously, both ethical philosophies have the right to exist among us, but the provisions of the religious ethics in Said Nursiââ¬â¢s vision are not only unique, but are sometimes surprising, and are sometimes unacceptable to those, who keep to secular ethical traditions. Said Nursi insists on ethics having religious foundations. His ethical vision is based on the assumption that religion is the source of reliable ethical knowledge. ââ¬Å"For Nursi, the ultimate source of all ethical reflection is the Qurââ¬â¢anâ⬠(Markham 69). In this situation it is possible to suggest that Qurââ¬â¢an should be simple and understandable to the common people, so that they should be able to follow its provisions. The assumption is rather debatable: on the one hand, there seems to be nothing negative or threatening in the fact that Said Nursi keeps to religious foundations of ethics. On the other hand, I may suggest that those who refuse to accept the life of the prophet Muhammad as the source of ethical knowledge, risk facing opposition from religious ethicsââ¬â¢ supporters. This ethics loses its relevance as soon as it is faced with the fact that there are possible other sources of ethics in other cultures of the world. Moreover, and I would agree with Markham, in that there is no guarantee that being obedient to Qurââ¬â¢an means seeing its wisdom; in case we do not understand the provisions to which we should keep in our ethics, it loses its relevance and meaning. The strong side of religious ethics in Said Nursiââ¬â¢s words is in accepting violence as weakness in trying to resolve various disputes. ââ¬Å"Nursi is committed to handling disagreement with peaceful means not because he shared a western skepticism about the truth of religion, but because of the truth of religionâ⬠(Markham 72). Secular ethics would easily reject these religious attitudes. While Nursi tries to justify the strength of religion, he obviously forgets that this strength is relevant only within the limited religious circles. Secularism exists and cannot be denied. For those who consider themselves being secular the strength of religion is closely connected with the power of metaphysical phenomenon. In the absence of the latter, the power of the former becomes debatable. Thus, religious foundations of ethics can be applied within the limited space of extremely religious eastern countries, which keep to Islamic religion. Especially interesting is Nursiââ¬â¢s ideas about personal ethics and social equality. His interpretation of a person in illness is rather curious, though is also natural within the eastern religious framework. ââ¬Å"O ill person who lacks patience! Be patient, indeed, offer thanks! Your illness may transform each of the minutes of your life into the equivalent of an hourââ¬â¢s worshipâ⬠(Makrham 74). The question is whether patience is equal to inactivity. Recognizing the religious value of pain and suffering is what Nursi tried to convey in his ethical teaching (Markham 75) but this also risks confusing ethics with religion, without creating any distinct border between them. Social ethics in Nursiââ¬â¢s vision tends to support equality through rejecting interest and recognizing the importance of redistribution. In these terms, Nursi seems to reject the pluralism of social status in the society. Moreover, rejection of interest is closer to rejecting secularism, than to supporting religious foundations of ethics. Conclusion The whole ethical theory created by Nursi deserves attention but seems to be founded on the grounds, which do not justify the strength of religion but better protect it from the intervention of the external knowledge. In this light religious ethics seems even more vulnerable, than Nursi tried to represent it. Works cited Markham, I. ââ¬Å"Secular or Religious Foundations for Ethics: A Case Study of Bediuzzaman Said Nursiâ⬠. In I. Markham I. Ozdemir, Globalization, Ethics and Islam, Ashgate Publishing, 2005, pp. 65-78.
Thursday, January 23, 2020
Proctor & Gamble Essay -- Business Management Analysis Essays
Proctor & Gamble à à à à à Founded in 1837, Procter & Gamble is the #1 U.S. makers of household products and a recognized leader in the development, manufacturing, and marketing of a broad range of products including Crest toothpaste, Tide laundry detergent, Ivory soap, Pampers diapers, and Dawn liquid detergent. Procter & Gamble has operations in over 70 countries and employs over 100,000 people worldwide and markets to nearly five billion customers in over 140 countries. à à à à à Procter & Gamble?s purpose or mission statement states exactly why Procter & Gamble is so driven in providing quality products and services to consumers all over the world. Procter & Gamble?s purpose is as follows: ?We will provide branded products and services of superior quality and value that improve the lives of the world?s consumers. As a result, consumers will reward us with leadership sales, profit and value creation, allowing our people, our shareholders, and the communities in which we live and work to prosper www.pg.com/jobs/company_culture/purpose.jhtml.? Procter & Gamble?s company culture, think globally, act globally, focuses on a variety of core values: leadership, ownership, integrity, passion for winning, and trust. Procter & Gamble works well with the national cultures of Italy and Japan because Procter & Gamble thrives on diversity. Everyone at Procter & Gamble is united through Procter & Gamble?s values and goals. Procter & Gamble is such a giant in the household industry. The company sees diversity as advantage. Procter & Gamble?s diversity covers a broad range of characteristics, such as race, sex, personal, religion, cultural heritage, etc. Within the company, Procter & Gamble creates an advantage from their differences. Outside Procter & Gamble, the company is very sensitive to other national cultures because of their unique culture found within. Every company has its own unique culture. Most organizations don?t deliberately try and create a culture. The culture of an organization is created unconsciously, based on the values of top management. Procter & Gamble?s principles are derived from the company?s Purpose and Values. The core principles of the company are: ?à à à à à We Show Respect for All Individuals ?à à à à à The Interests of the Company and the Individual are Inseparable ?à à à à à We are Strategically Focused in Our Work ?à à à à à Innovation is th... ...octer & Gamble needs to institute changes that will help them become faster. A better public corporate image of Procter & Gamble could also raise awareness that Procter & Gamble is home to many household products, even those environmentally safe. The recent Dawn commercial is a great example. Dawn is used to clean off oil spill animal victims. The general public is not aware of many of the products Procter & Gamble market and produce. Better advertising would be beneficial. Procter & Gamble uses their diversity successfully as a global company. The people that work for them are their greatest asset. Procter & Gamble believes tat it is important to develop and support a diverse workplace. Now the company needs to broaden its corporate culture outside of the United States more than it has in the past for continues future success. References 1). www.cyborlink.com/besite/hofstede.htm 2). www.geert-hofstede.com/hofstede_italy.shtml 3). www.geert-hofstede.com/hofstede_japan.shtml 4) www.geert-hofestede.com/hofstede_united_states.shtml 5). www.pg.com/jobs/company_culture/core-values.jhtml 6). www.pg.com/jobs/company_culture/purpose.jhtml 7). www.uvt.nl/web/iric/hofstede.htm
Wednesday, January 15, 2020
International Organization Based on the Assumption of Liberalism and Realism
Different theories explain why international organizations are createdWhich are basically a response to problems of incomplete information, transaction costs, and other barriers to efficiency and welfare improvement for their members. But different questions like; do international organizations really do what their creators intend them to do?Do they really support member states in achieving their basic interests mutually? These critical questions and others of their likes can be analyzed to some extent by several theories proposed by different scholars in the field of international relations.Such theories are liberal, realism and constructivism but the concern of this work is on realism and liberal theory. International organization is a union or association of States, or of enterprises or of other national entities set up across national boundaries.Examples are Of States, are the United Nations (UN) and the European Union (EU) of enterprises: Transnational Corporations (TNCs); inclu de The Coca-Cola Company, Sony, McDonalds, Toyota, etc. Of other national entities; are like Amnesty International; International Olympic Committee, World Organization of the Scout Movement, and the International Committee of the Red Cross.Around 30000 such organizations are active in about 300 countries and territory over the world. International organizations progressed after the Second World War, the gulf between the international politics and formal organizational arrangement which began to open in ways that were not easy to reconcile. This organization seemed to strengthen in dealing with rising problems such as the extension of property right, environment protection and formal supernatural authority. The international organization was the answer on solving collective problems.Public interestRefers to the net benefits derived for, and procedural rigor employed on behalf of, all society in relation to any action, decision or policy. Public may include the widest possible scope o f society, example of individuals and groups sharing a market place for goods and services (included those provided by government), as those seeking sustainable living standard and environment quality for themselves and future generations. Interests are all things valued by individual and society such as economic freedom, political power access to government property right.Those things we seek to acquire and control are interest like ideas we aspire to and protections that are harmful. Realism theory views that world politics is driven by competitive self-interest; they believe that decisive dynamic among countries is a struggle for power in an effort by each to preserve or, preferably, improve its military security and economic welfare in competition with other countries.As an approach to international politics, realism can be traced to such ancient practitioners and thinkers as Sun Tzu (544-496 B. C) the Chinese general and the author of The Art of War; Thucydides (460-399 B.C), a Greek historian and author of The History of the Peloponnesian War, and more recently statesmen such as Otto von Bismarck (1815-1898) the Iron Chancellor who engineered the unification of Germany under Prussian control. (Rourke 2012b; p20)Liberal theoryStates are not simply ââ¬Ëblack boxesââ¬â¢ seeking to survive and prosper in an anarchic system. They are configurations of individual and group interests who then project interests into the international system through a particular kind of government. Survival may very well remain a key goal. But commercial interests or ideological beliefs may also be important.The conventional wisdom is that states create and delegate to IOs because they provide essential functions. They provide public goods, collect information, establish credible commitments, monitor agreements, and generally help states overcome problems associated with collective action and enhance individual and collective welfare.Notable philosopher advocating liberalis m including Thomas Hill Green, John Rawls, John Lock, Adam Smith, John Stuart Mill. Emanuel Kant, Jean Jacque Rousseau and the former USA presidents Woodrow Wilson and Franklin Roosevelt.It is true saying that international organizations based on the assumption that ââ¬Ëââ¬â¢government aims at public interestââ¬â¢Ã¢â¬â¢, this is because international organizations sees that the government at a large extent is the best solution for solving public problems and a representation of public interest at the same time. This connotation can be analyzed through the use of liberal and realism theories as follows. Realism theory as the first theory of international organization is used to prove right the above quotation as they assume that, survival is the principal goal of every State. Realists hold states to be the main actors.It means that state control each and everything. Even if domestic interests, strategic culture, or commitment to a set of national ideals would dictate more benevolent or co-operative international goals, the anarchy of the international system requires that States constantly ensure that all states posses some military capacity, and they have sufficient power to defend themselves and advance their material interests necessary for survival. Survival of the state is important for every individual for example United States normally employs military power for the survival and to defend her national interests (Gulf war and Iraq war).à (Wolfrum,2011)Realists believe in the anarchic structure of the international system as the most important determinant of state behavior. Realists believe that the international system exists in a state of anarchy a term that implies not chaos or absence of structure and rules, but rather the lack of a central government that can enforce rules. Therefore order for the state to maintain public interest, a state makes use of the economic prosperity and military might to make decisions that are of much importanc e to the public.States will also act as best as they can in order to maximize their likelihood of the public and continuing to exist. (Ibid) Realists hold states to be rational actors. This means that given the goal of survival, States will act as best they can in order to maximize their likelihood of continuing to exist. Thus States may create international law and international institutions, and may enforce the rules they codify. However, it is not the rules themselves that determine why a State acts a particular way, but instead the underlying material interests and power relations.A countryââ¬â¢s foreign policy may reflect broad national objectives and the strategies governments use to guide their actions in the international arena. Also a government extends the domestic interests to the international environment through the use of foreign policy that will guide the interaction of the state with other international actors like the international organizations. For example the foreign policy of Tanzania is aimed at developing the country through economic diplomacy, regional cooperation and multilateral relations.(ibid)Realism assume that all state posses military capacity and no any other state knows about neighbor intend precisely, thus the world is uncertain and dangerous, the only purpose of state is to defend the interest of the state, enable state to survive while promoting public interest against foreign invasion and occupation. Through government organs like judiciary, legislature and executive enforce laws to ensure achievement of public interest, where people have surrender their authority to the government to protect their liberty, life and property.People may ensure their safety through government from internal and external invasion or threats. (ibid) Liberal theory on the other hand is another theory of international relation which tries to explain the truth of international organization on the assumption that government aims at public interes t. This theory analyzes how government aims at providing public interest in several ways using its key assumptions as follows. Liberalism believes on democratic stability theory which rests on the observation that no two democratic states have ever gone to war with one another, and that democratic states rarely strike first.Liberals argue that democracies identify with one another because of their shared norms and values like the United States doesnââ¬â¢t want to take Canada partly because each country believes that citizens have the right to choose their own government and consequently believe that conquering another country and enslaving its citizen is wrong. Moreover democracies are not dominated by the military and lie in the hands of an individual or a small group; leaders are accountable to their people, who are often reluctant to see their children go to war.A variety of issues can dominate the international agenda. Unlike realist, liberals believe that national security d oes not always have to be of paramount importance economic, environmental issues, and human rights can all become the most important goal of a nation. Also in liberalism the ideas was international and they depend each other to solve certain problems for example the problems of hunger is not to Africa only but it is global while they provide deferent aids to African.Also the problem of economic crises is the western countries problems but shacked till African due to lose aids and loans. The state acts in the liberal of law, and not acts outside the law. Liberals contend that people and the countries that represent them are capable of finding mutual interests and cooperation to achieve them at least in part by working through International organizations and according to International law. On the other hand liberals do not dismiss power as a factor, but they add morality, ideology, emotions (such as the friendship and mutual identity) and habit of cooperation.Jean Jacques Rousseau (17 12-1718), he argued that in social contract (1762), that human had to join together in civil societies because they found it easier to improve their existence through cooperation than competitive self reliance. So in contemporary liberals in where each government aims at public interests they apply this notion to global society and argue that people and their countries can better their existence by joining together to build a cooperation and peaceful global society.In policy prescriptions liberals urges on creating norms of justice and peace, promoting and strengthening International Organizations in achieving peopleââ¬â¢s interests. Both classical and neo Liberals like Jean Jacques Rousseau and Wilson Woodrow on nature of politics, principles and cooperation as standards of international standards argue that people are not inherently political predators and are capable of achieving less conflictive relations either through current government structures or new models of governmen t.And on principle emphasis is on states to formulate their foreign policy according to cooperative and ethical standards to improve social, economic and political needs of each member country; they are not forced into organizations but according to their willingness and global challenges they face in providing publicââ¬â¢s social, political and economic needs, thus different states join organizations like UN, AU and EU which enables member states in achieving such interests.à (Rourke 2005a, pp 17-22)Liberal international relation theory believes that government represents some segments of domestic society, whose interest are reflected in state policy. Consistent with the view that society, understood as an aggregate of autonomous individual and voluntary groups, is prior to the state. Liberal theories of politics accord a central place to the domestic institution that link state and society. Liberals analyze such institutions primarily as mechanisms for the representation of s ocial interests.The state is assumed to be representative to some set of social groups, although not all governments represents the entire population. For liberals, the principal agent relationship between the population and the state is thus a central issue. (Moravcsik,2010)In recommending the quotation that international organization based on the assumption that government aims at public interests; in realism point of view states act as main actor on the insurance of public interest within international system, still on its loneliness seem to fail on defending public interest fulfillment a hundredà percent due to series of challenges, threats or obstacles that fade upon state survive on maintaining public interest.Example hunger, issue of security, outbreak of diseases, as well as economic recession problem that is common to third world countries. Therefore state regardless of its potentiality role on public interest it must cooperate with non state actor be it international org anization like UN or be it regional organization like NGOs, civil society for maximum public interest achievement.Under liberal perspective state seems to be with great role in public interest since it cooperate with another actors on making the availability of conducive environment for public interest attainment within their respective boundary. Although most of this cooperation is not two way traffic in such a way that only one which is powerful side benefit from this cooperation either bilateral or multilateral.Example north-south, Therefore cooperation is inevitable for proper prosperity of public but should be win-win or two way traffic cooperation. Therefore principal actors of the world politics remains nation-states, though they are not the only actors. The international system consists of nation-states, international organizations, and private actors, thousands of international organizations were established during the post-World War II era.The increasing number of internat ional organizations is parallel to the increasing levels of economic, political, social and cultural transactions between individuals, societies and states in todayââ¬â¢s world which are significant in their respective fields reflecting preferences of states albeit non-state actors challenges and even weakens weaker states favor preferences of stronger states.
Subscribe to:
Posts (Atom)