Monday, December 30, 2019

Analysis Of The Book The Evolution Of Grant - 1266 Words

Johnny Croley English 1102 Dr. Harrison 7 April 2015 The Evolution of Grant As illustrated in A Lesson Before Dying, African Americans in the South went on with their lives normally, indicating that racial relations were not negatively impacted by the oppression and treatment of Black Americans. The narrations in the novel are in the context of Cajun Community as seen through the eyes of the author in the late 1940s. The main characters in the novel are Grant and Jefferson. Author Jefferson is not involved in the shoot-out, he is tried by a court and sentenced. Grant went to study in the university, and he has returned to the community, ready to teach in a local school. He is not decided whether he should live in the small community†¦show more content†¦His teacher, Matthew Antoine, was instrumental in imparting his students with the attitude that would impact them both in the long-term and short-term. Grant, being one of his students, is also exemplified by the attitude. From an analytical perspective, the students were quite inexperienced, and t hey could believe everything that Matthew told them. In fact, his students could not question his assertion that black people are characterized by high levels of lowliness. It is amazing to learn that the teacher did not treat his black students in a fair manner. In fact, he only aimed at making them aware of their inferior social status. As a result of the teachings, Grant s childhood and adulthood are exemplified by pessimism and hopeless in society. He is not aware that his racial perceptions to bring anticipated changes in his community and beyond by be started by him. Jefferson could be described as the person who has helped Grant to have another perspective in regards to different people in society. He does not give an appealing response to Grant in the cell during his first visit. However, as his visits increase in the future, they both realize that they get along very well. Although he has been selfish, he, for the first time, displays some sympathy for his friend. By askin g the wrongly convicted young person many questions and giving him a chance to respond in any manner, the author shows that fundamental changes are occurring in Grant, unlike to the

Sunday, December 22, 2019

Nursing Sensitive Indicators Are Defined By The American...

Nursing-sensitive indicators are defined by the American Nursing Association (ANA) as â€Å"indicators that reflect the structure, process and outcomes of nursing care† (ANA, 2014). These indicators help define how nursing care is given by measuring the amount of nursing staff, skill level of the nursing staff, and the education level of nursing staff. These indicators depict the quality of care provided to patients and the outcomes of the care provided. Careful tracking of these indicators provides evidence for keeping current practices or for implementing new policy and procedures. A formal set of indicators measuring the impact nursing interventions have on patient care was not implemented until 1998 (Montalvo, I. (2007). With the establishment of the National Database of Nursing Quality Indicators (NDNQI), hospitals and other care settings are able to assess how nursing interventions impact patient outcomes, quality of care, and the overall work environment in health ca re facilities. Nursing-sensitive indicators are a quality improvement measure used to determine how the quality of nursing care is evaluated in hospitals and other healthcare facilities. Nurse sensitive indicators allow healthcare facilities to evaluate how the care they are providing is following evidence-based practices and how they can improve their practices to achieve better patient outcomes. The American Nurses Association is promoting these indicators as the definitive standards for patient careShow MoreRelatedNursing Sensitive Indicators Essay1262 Words   |  6 PagesTASK 1 RTT1 TASK 1 A. Discuss how an understanding of nursing-sensitive indicators could assist the nurses in this case in identifying issues that may interfere with patient care. Nursing-sensitive indicators are determinations used to delineate the excellence of nursing interventions and positive patient outcomes. This is not a new concept. In the 1800’s, Florence Nightingale, a promoter of outcomes, revealed such indicators when she revealed her statistical findings of soldier’s mortalityRead MoreNursing Sensitive Indicators Essay1792 Words   |  8 PagesWestern Governor’s University RTT Task 1 Nursing-sensitive indicators can be an important tool in identifying patient care issues that could potentially arise during a hospital stay. By analyzing the data on specific nursing-sensitive indicators, the quality of patient care can be optimized and patient satisfaction can be improved. The American Nurses Association (ANA) and the National Database of Nursing Quality Indicators (NDNQI) are two sources of information and guidelines forRead Moreorganizational systems Task 1 Essay985 Words   |  4 PagesGovernors University Nursing-sensitive indicators are defined by the American Nurses Association as indicators that â€Å"reflect the structure, process and outcomes of nursing care. The structure of nursing care is indicated by the supply of nursing staff, the skill level of the nursing staff, and the education/certification of nursing staff† (ANA, 2015). These indicators are outcomes that increase the quality and safety in patient care. Some indicators are patient falls, surgical complicationsRead MoreThe Impact Of Nursing Care On Health Care Quality1453 Words   |  6 Pages The Impact of Nursing Care on Health Care Quality Tasha N. Herndon Duquesne University GPNG 525 Organizational and Clinical Leadership in Nursing and Healthcare Carolyn Griffin October 31, 2015 The Impact of Nursing Care on Health Care quality Nurses are the primary caregivers in all health care settings. Nursing care is an essential part of patient care and delivered in many diverse settings. The quantity of nurses and their vital role in caregiving are compelling motives for determiningRead MoreRtt Task !2909 Words   |  12 PagesQuality Leadership RTT Task 1 Nursing-sensitive Indicators Nursing- sensitive indicators are defined as those outcomes that improve in the presence of greater quantity(higher staffing ratios) or quality(educational levels and competence of nursing staff) of nursing care (www.nursingworld.org). These nursing-sensitive measures help healthcare organizations to analyze the quality and quantity of nursing care services. (www.americansentinel.edu )Nursing sensitive-indicators (NSIs) are characterized byRead MoreThe Level of Competence of Novice Registered Nurses3330 Words   |  14 PagesINTRODUCTION Background of the Study For any newly licensed registered nurse about to embark on her nursing career, the concept of competence is of great personal and professional significance. Questions abound regarding what it means to be a competent nurse and how competence is measured. Nursing competency is defined by the National Council for State Boards of Nursing (NCSBN) as the â€Å"application of knowledge, interpersonal decision-making and psychomotor skills expected for the practice roleRead MoreObesity Is A Growing Epidemic Among Men And Women2250 Words   |  9 Pagessame period. In 2012, more than one third of children were overweight or obese. A rigorous and thorough approach was used in conducting a literature review on obesity in healthcare using electronic databases including PubMed, Cumulative Index of Nursing and Allied Health Literature (CINAHL), and Google Scholar. A minimum of five peer-reviewed articles within the last five years was used in obtaining information on the topic. There is no specific consensus definition in regards to childhood obesityRead MoreMr. Wilsons Symptoms With Bipolar Affective Disorder1703 Words   |  7 Pagesproblem causing another problem for Mr. Wilson. To start with this case study, Mr. Wilson presents a recurrent bipolar depression, for his welfares, the recovery model will be beneficial to manage Mr. Wilson’s clinical management within advanced nursing care. The three relevant symptom clusters are associated with the patient’s life experiences. The principle of recovery model (RM) is that each individual consumer is perceived as unique and personal especially, the model emphases on what the individualRead MoreChristian Leadership Paper. Our Healthcare System Is In4065 Words   |  17 Pagestreating and curing illness through advanced technology, medications, and procedures has resulted in a loss of emphasis on compassion and caring among healthcare professionals. Now more than ever, the profession of nursing is in need of leaders who embody the fundamental values of nursing which are largely underpinned by theological philosophies. This paper begins with a personal reflection of leadership through a participative leadership perspective. Next, ethical and legal dilemmas, interprofessionalRead MoreThe Importance Of Patient Safety And Preventative Care3017 Words   |  13 PagesAcross the world patient safety is a major concern when discussing nursing care and health care systems. It is the nurse’s responsibility to a dvocate for every one of their patients as well as protect the rights and safety of each patient. This is such an important topic because the care and well-being of the patient should be the nurse’s main concern. While caring for each patient the nurse should practice good safety techniques to help prevent further illness or distress to the patient. In this

Friday, December 13, 2019

Wavelets are mathematical functions Free Essays

string(170) " generate a information construction that containssegments of assorted lengths, normally make fulling and transforming it into a different informations vector of length\." Abstraction Ripples are mathematical maps that cut up informations into different frequence constituents, and so analyze each constituent with a declaration matched to its graduated table. They have advantages over traditional Fourier methods in analysing physical state of affairss where the signal contains discontinuities and crisp spikes. Ripples were developed independently in the Fieldss of mathematics, quantum natural philosophies, electrical technology, and seismal geology. We will write a custom essay sample on Wavelets are mathematical functions or any similar topic only for you Order Now Interchanges between these Fieldss during the last 10 old ages have led to many new ripple applications such as image compaction, turbulency, human vision, radio detection and ranging, and temblor anticipation. This paper introduces ripples to the interested proficient individual outside of the digital signal processing field. I describe the history of ripples get downing with Fourier, compare ripple transforms with Fourier transforms, province belongingss and other particular facets of ripples, and Coating with some interesting applications such as image compaction, musical tones, and de-noising noisy informations. 1. Introduction A ripple is a wave-like oscillation with amplitude that starts out at zero, additions, and so decreases back to nothing. It can typically be visualized as a â€Å" brief oscillation † like one might see recorded Seismograph Or bosom proctor. Generally, ripples are purposefully crafted to hold specific belongingss that make them utile for signal processing. Ripples can be combined, utilizing a â€Å" displacement, multiply and amount † technique called whirl, with parts of an unknown signal to pull out information from the unknown signal. Wavelets provide an alternate attack to traditional signal processing techniques such as Fourier analysis for interrupting a signal up into its component parts. The drive drift behind ripple analysis is their belongings of being localised in clip ( infinite ) every bit good as graduated table ( frequence ) . This provides a time-scale map of a signal, enabling the extraction of characteristics that vary in clip. This makes wavelets an ideal tool for analyzing signals of a transient or non-stationary nature. 2. History The development of ripples can be linked to several separate trains of idea, get downing with Haar ‘s work in the early twentieth century. Noteworthy parts to wavelet theory can be attributed to Zweig ‘s find of the uninterrupted ripple transform in 1975 ( originally called the cochlear transform and discovered while analyzing the reaction of the ear to sound ) , Pierre Goupillaud, Grossmann and Morlet ‘s preparation of what is now known as the CWT ( 1982 ) , Jan-Olov Str A ; ouml ; mberg ‘s early work on distinct ripples ( 1983 ) , Daubechies ‘ extraneous ripples with compact support ( 1988 ) , Mallat ‘s multiresolution model ( 1989 ) , Nathalie Delprat ‘s time-frequency reading of the CWT ( 1991 ) , Newland ‘s Harmonic ripple transform ( 1993 ) and many others since. First ripple ( Haar ripple ) by Alfred Haar ( 1909 ) Since the 1970s: George Zweig, Jean Morlet, Alex Grossmann Since the 1980s: Yves Meyer, St A ; eacute ; phane Mallat, Ingrid Daubechies, Ronald Coifman, Victor Wickerhauser 3. WAVELET THEORY Wavelet theory is applicable to several topics. All ripple transforms may be considered signifiers of time-frequency representation for continuous-time ( parallel ) signals and so are related to harmonic analysis. Almost all practically utile distinct ripple transforms use discrete-time filter Bankss. These filter Bankss are called the ripple and scaling coefficients in ripples nomenclature. These filter Bankss may incorporate either finite impulse response ( FIR ) or infinite impulse response ( IIR ) filters. The ripples organizing a uninterrupted ripple transform ( CWT ) are capable to the uncertainness rule of Fourier analysis respective trying theory: Given a signal with some event in it, one can non delegate at the same time an exact clip and frequence response graduated table to that event. The merchandise of the uncertainnesss of clip and frequence response graduated table has a lower edge. Therefore, in the scale gm of a uninterrupted ripple transform of this signal, such an event marks an full part in the time-scale plane, alternatively of merely one point. Besides, distinct ripple bases may be considered in the context of other signifiers of the uncertainness rule. Wavelet transforms are loosely divided into three categories: uninterrupted, distinct and multiresolution-based. Above shown diagram shows all CWT ( Continuous Wavelet ) , DWT ( Discrete Wavelet ) . These all varies with the clip and degree and all graphs obtained are above shown. 4. WAVELET TRANSFORMS There are a big figure of ripple transforms each suited for different applications. For a full list see list of wavelet-related transforms but the common 1s are listed below: Continuous ripple transform ( CWT ) Discrete ripple transform ( DWT ) Fast ripple transform ( FWT ) Raising strategy Wavelet package decomposition ( WPD ) Stationary ripple transform ( SWT ) 5. WAVELET PACKETS The ripple transform is really a subset of a far more various transform, the ripple package transform. Wavelet packages are peculiar additive combinations of ripples. They form bases which retain many of the perpendicularity, smoothness, and localisation belongingss of their parent ripples. The coefficients in the additive combinations are computed by a recursive algorithm doing each freshly computed ripple package coefficient sequence the root of its ain analysis tree. 6. WAVELETS IN MATLAB Wavelet Toolbox package extends the MATLAB proficient calculating environment with graphical tools and command-line maps for developing wavelet-based algorithms for the analysis, synthesis, denoising, and compaction of signals and images. Wavelet analysis provides more precise information about signal informations than other signal analysis techniques, such as Fourier. The Wavelet Toolbox supports the synergistic geographic expedition of ripple belongingss and applications. It is utile for address and sound processing, image and picture processing, biomedical imagination, and 1-D and 2-D applications in communications and geophysical sciences. 7. WAVELETS VS FOURIER TRANSFORM Each and every thing in this universe comparable to it has some similarities and unsimilarities with that same is the instance with the ripples and Fourier transform. Ripples can be compared with the Fourier transform on the footing of their similarities and unsimilarities which are explained as follows. Assorted sorts of similarities and unsimilarities of ripples and Fourier transform are as follows. 7.1 SIMILARITIES BETWEEN FOURIER AND WAVELET TRANSFORMS The fast Fourier transform ( FFT ) and the distinct ripple transform ( DWT ) are both additive operations that generate a information construction that containssegments of assorted lengths, normally make fulling and transforming it into a different informations vector of length. You read "Wavelets are mathematical functions" in category "Essay examples" The mathematical belongingss of the matrices involved in the transforms are similar as good. The reverse transform matrix for both the FFT and the DWT is the transpose of the original. As a consequence, both transforms can be viewed as a rotary motion in map infinite to a different sphere. For the FFT, this new sphere contains footing maps that are sines and cosines. For the ripple transform, this new sphere contains more complicated footing maps called ripples, female parent ripples, or analysing ripples. Both transforms have another similarity. The basic maps are localized in frequence, doing mathematical tools such as power spectra ( how much power is contained in a frequence interval ) and scale gms ( to be defined subsequently ) utile at picking out frequences and ciphering power distributions. 7.2 DISSIMILARITIES BETWEEN FOURIER AND WAVELET TRANSFORMS The most interesting unsimilarity between these two sorts of transforms is that single ripple maps arelocalized in space.Fourier sine and cosine maps are non. This localisation characteristic, along with ripples ‘ localisation of frequence, makes many maps and operators utilizing ripples â€Å" thin † when transformed into the ripple sphere. This spareness, in bend, consequences in a figure of utile applications such as informations compaction, observing characteristics in images, and taking noise from clip series. One manner to see the time-frequency declaration differences between the Fourier transform and the ripple transform is to look at the footing map coverage of the time-frequency plane. The square moving ridge window truncates the sine or cosine map to suit a window of a peculiar breadth. Because a individual window is used for all frequences in the WFT, the declaration of the analysis is the same at all locations in the time-frequency plane. 8. WAVELET APPLICATIONS There are assorted sorts of applications in the field of ripples which are as follows can be explained as follows Computer and Human Vision FBI Fingerprint Compression Denoising Noisy Data Musical Tones 8.1 COMPUTER AND HUMAN VISION In the early 1980s, David Marr began work at MIT ‘s Artificial Intelligence Laboratory on unreal vision for automatons. He is an expert on the human ocular system and his end was to larn why the first efforts to build a automaton capable of understanding its milieus were unsuccessful. Marr believed that it was of import to set up scientific foundations for vision, and that while making so ; one must restrict the range of probe by excepting everything that depends on preparation, civilization, and so on, and concentrate on the mechanical or nonvoluntary facets of vision. This low-level vision is the portion that enables us to animate the 3-dimensional organisation of the physical universe around us from the excitements that stimulate the retina. He so developed working algorithmic solutions to reply each of these inquiries. Marr ‘s theory was that image processing in the human ocular system has a complicated hierarchal construction that involves several beds of processing. At each treating degree, the retinal system provides a ocular representation that scales increasingly in a geometrical mode. His statements hinged on the sensing of strength alterations. He theorized that strength alterations occur at different graduated tables in an image, so that their optimum sensing requires the usage of operators of different sizes. He besides theorized that sudden strength alterations produce a extremum or trough in the first derived function of the image. These two hypotheses require that a vision filter have two features: it should be a differential operator, and it should be capable of being tuned to move at any coveted graduated table. Marr ‘s operator was a ripple that today is referred to as a â€Å" Marr ripple. † 8.2 FBI FINGERPRINT COMPRESSION Between 1924 and today, the US Federal Bureau of Investigation has collected about 30 million sets of fingerprints. The archive consists chiefly of inked feelings on paper cards. Facsimile scans of the feelings are distributed among jurisprudence enforcement bureaus, but the digitisation quality is frequently low. Because a figure of legal powers are experimenting with digital storage of the prints, mutual exclusivenesss between informations formats have late become a job. This job led to a demand in the condemnable justness community for a digitisation and a compaction criterion. In 1993, the FBI ‘s Criminal Justice Information Services Division developed criterions for fingerprint digitisation and compaction in cooperation with the National Institute of Standards and Technology, Los Alamos National Laboratory, commercial sellers, and condemnable justness communities. Let ‘s set the informations storage job in position. Fingerprint images are digitized at a declaration o f 500 pels per inch with 256 degrees of gray-scale information per pel. A individual fingerprint is about 700,000 pels and demands about 0.6 Mbytes to hive away. A brace of custodies, so, requires about 6 Mbytes of storage. So digitising the FBI ‘s current archive would ensue in approximately 200 TBs of informations. ( Notice that at today ‘s monetary values of about $ 900 per Gbyte for hard-disk storage, the cost of hive awaying these uncompressed images would be about 200 million dollars. ) Obviously, informations compaction is of import to convey these Numberss down. 8.3 DENOISING NOISY DATA In diverse Fieldss from planetal scientific discipline to molecular spectrometry, scientists are faced with the job of retrieving a true signal from uncomplete, indirect or noisy informations. Can wavelets assist work out this job? The reply is surely â€Å" yes, † through a technique called ripple shrinking and thresholding methods that David Donoho has worked on for several old ages. The technique works in the undermentioned manner. When you decompose a information set utilizing ripples, you use filters that act as averaging filters and others that produce inside informations. Some of the ensuing ripple coefficients correspond to inside informations in the information set. If the inside informations are little, they might be omitted without well impacting the chief characteristics of the information set. The thought of thresholding, so, is to put to zero all coefficients that are less than a peculiar threshold. These coefficients are used in an reverse ripple transmutation t o retrace the information set. Figure 6 is a brace of â€Å" before † and â€Å" after † illustrations of a atomic magnetic resonance ( NMR ) signal. The signal is transformed, threshold and inverse-transformed. The technique is a important measure frontward in managing noisy informations because the denoising is carried out without smoothing out the crisp constructions. The consequence is cleaned-up signal that still shows of import inside informations. Fig.8.3.1 displays an image created by Donoho of Ingrid Daubechies ( an active research worker in ripple analysis and the discoverer of smooth orthonormal ripples of compact support ) , and so several close-up images of her oculus: an original, an image with noise added, and eventually denoised image. To denoise the image, Donoho: transformed the image to the ripple sphere utilizing Coiflets with three disappearing minutes, applied a threshold at two standard divergences, and Inverse-transformed the image to the signal sphere. 8.4 MUSICAL TONES Victor Wickerhauser has suggested that ripple packages could be utile in sound synthesis. His thought is that a individual ripple package generator could replace a big figure of oscillators. Through experimentation, a instrumentalist could find combinations of moving ridge packages that produce particularly interesting sounds. Wickerhauser feels that sound synthesis is a natural usage of ripples. Say one wishes to come close the sound of a musical instrument. A sample of the notes produced by the instrument could be decomposed into its ripple package coefficients. Reproducing the note would so necessitate recharging those coefficients into a ripple package generator and playing back the consequence. Transient features such as onslaught and decay- approximately, the strength fluctuations of how the sound starts and ends- could be controlled individually ( for illustration, with envelope generators ) , or by utilizing longer wave packages and encoding those belongingss every bit good i nto each note. Any of these procedures could be controlled in existent clip, for illustration, by a keyboard. Notice that the musical instrument could merely every bit good be a human voice, and the notes words or phonemes. A wavelet-packet-based music synthesist could hive away many complex sounds expeditiously because ripple package coefficients, like ripple coefficients, are largely really little for digital samples of smooth signals ; and Discarding coefficients below a predetermined cutoff introduces merely little mistakes when we are compacting the information for smooth signals. Similarly, a wave packet-based address synthesist could be used to retrace extremely tight address signals. Figure 8.4.1 illustrates a ripple musical tone or toneburst. 9. ADVANTAGES OF WAVELET TRANSFORMATION Advantages of ripple transmutation are as follows which are discussed below. Space and Time Efficiency ( Low Complexity of DWT ) . Generality A ; Adaptability ( Different Basis and Wavelet Functions ) . Multiresolution Properties ( Hierarchical Representation A ; Manipulation ) . Adaptability of the Transformation ( Different Basis Functions let different Properties of the Transformation ) Transformation is Hierarchical ( Multiresolution – Properties ) Transformation is Loss-Free Efficiency of the Transformation ( Linear Time and Space Complexity for Orthogonal Wavelets ) Generalization of the Transformation ( Generalization of other Transformations ) CONCLUSION AND FUTURE SCOPE Most of basic ripple theory has been done. The mathematics has been worked out in tormenting item and ripple theory is now in the polish phase. The refinement phase involves generalisations and extensions of ripples, such as widening ripple package techniques. The hereafter of ripples lies in the as-yet chartless district ofapplications.Wavelet techniques have non been exhaustively worked out in applications such as practical information analysis, where for illustration discretely sampled time-series informations might necessitate to be analyzed. Such applications offer exciting avenues for geographic expedition. Basically after working on this term paper we came to cognize about the construct of the ripples its relation with the Fourier transform its advantages in shacking universe. Mentions www.yahoo.com ( a truly friendly usher to ripples ) . www.google.com ( ripples ppt. ) . www.wikipedia.com ( ripples ) . www.google.com ( Seminar Report on ripples by ROBI POLIKAR ) www.google.com ( applications of ripples ) . How to cite Wavelets are mathematical functions, Essay examples

Thursday, December 5, 2019

Do squirrels remember where they bury their nuts free essay sample

Throughout the course of each year, squirrels save and store nuts, and bury them to eat in the winter. During the winter seasons, it is too snowy to leave their burrows to hunt for food, so the squirrels consume nuts from their underground storage. However, burying almost 5,000 nuts per year can be tricky for squirrels to remember the 5,000 different hiding places for each nut. Some scientists wonder if squirrels can actually remember where they bury their nuts. It was conventional wisdom that squirrels could sniff out their nuts’ hiding places. However, this theory is no longer held. Now, scientists think that squirrels possess a comprehensive memory that allows them to remember where they hid their nuts. This is a great feat because the animals store up to 5,000 nuts each winter, which means recalling 5000 different hiding spots. If other squirrels are watching a squirrel bury his nut, they will unearth the nut and eat it once the squirrel has left. We will write a custom essay sample on Do squirrels remember where they bury their nuts? or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page So squirrels have to be careful around their fellow squirrels or their nuts will be taken. Squirrels’ brains are rapidly growing during the year, so by the time winter comes, they have an amazing memory and are able to remember all of the spots where their nuts are buried. The squirrels’ nuts are buried relatively close to one another, so they will not have to search far and wide for their nuts in the winter. During the winter, they just eat and sleep. Squirrel’s winter nut stashing is intriguing. The brain capacity that it takes to recall all of those hiding spots gives them a better memory then the human brain. Scientists suprisingly know so little about this whole process.

Thursday, November 28, 2019

The Number 12 Looks Like You - Mongrel free essay sample

In a dark world of musical entropy where art is steadily going down the tube, there is very little light to keep us from falling entirely into nothingness. Once-respected bands are disgracing themselves by softening up and becoming radio friendly. One band, though, hasn’t disappointed me. The Number 12 Looks Like You, a mathcore band from New Jersey, scoffs and steps away from all of the sell-outs with their album â€Å"Mongrel.† The word chaos is an understatement. Mind-boggling drums, energetic guitar riffs, punchy bass lines, and piercing-to-gravelly screams are just part of the poisonous combo that is â€Å"Mongrel.† Despite the pandemonium, songs like â€Å"Imagine Nation Express† and â€Å"Grandfather† suddenly break into groovy riffs and catchy choruses. The flamenco flair in â€Å"Paper Weight Pigs† will stay in your head for hours, while the jazzy drums in â€Å"The Weekly Wars† will keep your feet and fingers tapping. As you could probably put together, the album is based on the concept of being a mongrel, or some mottled, mixed breed. We will write a custom essay sample on The Number 12 Looks Like You Mongrel or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This album is a mongrel; the disorder doesn’t stop until the last, unpredictable song, â€Å"The Try (Thank You).† As if to taunt bands from heavy genres that are lightening up, â€Å"Mongrel† is riddled with nonstop heavy chaos and intricate mixes of melody and disharmony. So, if you’re a fan of The Mars Volta, The Blood Brothers, The Dillinger Escape Plan, mathcore in general, or you’d just like to step out from what your radio and TV tell you to like, give â€Å"Mongrel† a listen.

Monday, November 25, 2019

Determining the Molecular Weight of a Volatile Liquid Essays

Determining the Molecular Weight of a Volatile Liquid Essays Determining the Molecular Weight of a Volatile Liquid Paper Determining the Molecular Weight of a Volatile Liquid Paper In todays society, many products are designed to undergo many chemical reactions before the desired product(s) is created. This principle, also known as chemical synthesis, is an integral part in the operation of products such as an automobile airbag. Beginning with the releasing of nitrogen gas to inflate the bag and ending with the production of Na2SiO3 and K2SiO3, the airbag is an excellent example of how several chemical reactions can lead to the production of a few products essential for its operation (Casiday and Frey, 1998). Other multiple-step reactions, including the synthesis of anti-cancer drugs, demonstrate the importance of this principle. However, many problems such as the percent yield can arise and proper care must be taken in order to prevent any errors from occurring. The synthesis of copper is an example chemists use to demonstrate the law of conservation of mass. This law states that the mass of the products is equal to the mass of the reactants used (University of Maine, 2001). The synthesis of copper is simply the production of copper metal through several chemical reactions. These reactions can be summed up as the Copper Cycle (University of Maine, 2001). The copper cycle is a series of five chemical reactions, not including the removal of zinc, which begins and results with copper metal (University of Maine, 2001). The products (and subsequent reactants) of the copper cycle include copper (ll) nitrate, copper (ll) hydroxide, copper (ll) oxide, copper (ll) sulphate, and copper metal (University of Maine, 2001). The production of each of these reactants is a result of the five chemical reactions, which are further explained in the procedure. During the copper cycle, several different types of chemical reactions occur. One type of chemical reaction that takes place in this cycle is known as a REDOX reaction (University of North Carolina, 1998). This reaction occurs when one element loses electrons (oxidizes), while another element gains them (reduces) (University of North Carolina, 1998). Another type of reaction is known as a single displacement reaction. This reaction occurs when one element displaces another element, creating a new compound (Westbroek, 2000). A similar reaction, a double displacement reaction, occurs when two compounds interchange elements and create two new compounds (Westbroek, 2000). The final reaction that occurs is known as a dehydration reaction. This reaction occurs when there is a loss of water from the reacting molecule (Westbroek, 2000). This can usually be caused by heating the solution. The purpose of this lab experiment was to recover as much of the initial mass of copper wire as possible after it undergoes the copper cycle. The value of the final mass of copper metal can help determine the percent yield (recovery) in comparison to the initial mass of copper. The percent yield is calculated using the following formula: (Final Mass of Copper) /(Initial Mass of Copper) * 100 = % Yield (Volland, 2005). This value will illustrate whether more copper was produced (% yield greater than 100) or consumed (% yield less than 100). In order to get the closest possible value to a 100% recovery, certain precautions must be taken. Any loss of copper due to spilling or being left behind in beakers must be avoided in order to achieve the best results. Procedure The experimental procedure used for this experiment was outlined in the CHEM 120L lab manual, under Experiment #1. All steps were followed with no changes in the procedure. For this lab, the general objective was to recover as much of the initial amount of copper after it went through the copper cycle. In the first chemical reaction, the copper wire was dissolved in nitric acid and became copper nitrate. Since this reaction was performed under a fume hood, the NO2 gas was not detected (University of Maine, 2001). This was an example of a REDOX reaction, where an element gains electrons and another element loses electrons (University of North Carolina, 1998). In this specific reaction, copper metal lost electrons (became oxidized), while nitrogen gained electrons (became reduced). During the second reaction, sodium hydroxide was added to the newly created copper nitrate and the new product formed was calcium hydroxide. Unlike the first chemical reaction, this reaction was a double displacement reaction where the two compounds were interchanged to form new compounds (Westbroek, 2000). This reaction can also be classified as a precipitation reaction, where an insoluble product results from the reaction of two or more soluble reactants (Westbroek, 2000). The newly created calcium hydroxide, which contained chunks of black precipitate, was then heated and copper (II) oxide was created. This was done by adding heat, which means that this reaction can be classified as a dehydration reaction, where there was a loss of water in the reacting molecules. Following this reaction, copper (II) oxide was filtrated and, with the addition of sulphuric acid, the solution now had an aqua blue colour. This reaction was also a double displacement reaction. Finally, zinc metal was added to the copper (II) sulphate solution, which resulted in a copper precipitate. This final reaction was classified as a single displacement reaction, where zinc metal displaced the copper and became zinc sulphate (Westbroek, 2000). Before the copper was weighed, zinc was removed by the addition of hydrochloric acid and any excess water was removed by the addition of heat. Once again, a dehydration reaction occurs because of the loss of water. In the end, more copper metal was obtained after the copper cycle then the initial mass of copper wire. As shown in the calculation of the percent recovery, the final amount of copper produced was greater than that of the initial amount of copper. As a result, the percent recovery was greater than 100% (130%). An error that accounted for this increase may have been that some of the excess water and/or zinc were not removed by heat and the hydrochloric acid, respectively. As a result, the final mass of copper recorded may have included a combination of water and/or zinc, along with the copper. Other incomplete reactions throughout the copper cycle may have also contributed to the increase in the final mass of copper metal. Questions During part 1 of this lab investigation, sodium hydroxide was added very slowly to the dissolved copper wire. The reason why the sodium hydroxide was added slowly to the solution was that if the sodium hydroxide was added to quickly, the solution would react very quickly, producing lots of heat, resulting in gas and possible spills. This is a very dangerous safety hazard, as the sodium hydroxide must be handled with lots of precaution. One of the acids used in this experiment that must have been handled with precaution was the sulphuric acid. Sulphuric acid is highly corrosive, which means that any liquid splashes could cause very severe burns (European Fertilizer Manufacturers Association, 1997). Therefore, eye and hand protection (i. e. goggles and gloves) must be worn at all times while this chemical is being handled. Proper ventilation must be given to this acid and any inhalation must be avoided (European Fertilizer Manufacturers Association, 1997). There were several terms in this experiment that must be clarified. A supernatant is a clear liquid that lies above a precipitate (Saunder, 2004). Decant, or decanting, is the process of pouring out a liquid, with the intent of leaving some of the liquid behind (Saunder, 2004). The third term, which is dissolution, is the act of going into a solution. Usually, it involves a chemical change from one form to an aqueous form (Saunder, 2004). The final term, which is bumping, occurs because liquids do not boil in an even fashion (Saunder, 2004). As a result, the bubbles do not form right away, which could cause eruptions when the bubbles actually do form (Saunder, 2004). This is why constant stirring of the solution is required in order to prevent any of these eruptions.

Thursday, November 21, 2019

Multiple Sclerosis and its Development Case Study

Multiple Sclerosis and its Development - Case Study Example This has been continuous and thus has been associated with the cause of the hearing loss. His condition caused a lot of misery in his life since he mysteriously lost over 20 pounds of weight and often become fatigued. This prompted Philip to seek medical attention where a few medical and neurological checkups led to MRI scan of the brain. The results indicated a patchy demyelination controlling every part of his body, thus a confirmation of multiple sclerosis. The results proved quite challenging to him with concern for his family members, his real estate business, and fear of loss of more physical attributes (Richard, 1). Despite the condition, Philip never gave up but intensified search for more knowledge about the disease. In his endeavor of the search, he met Dr. Swank, a neurologist who introduced the low dairy diet as well as low fat for the patients suffering from the disease. This program seemed effective for Philip, and thus reducing the severity of his condition. Despite experiencing some improvements, Philip never gave up and this offered him the opportunity to meet Dr. Richard, an orthomolecular practitioner. Due to his desire to get better, he accepted a neurological diagnosis, which authenticated the weakness in the left foot, failure of concordant rotational motion of the hands, hand tremor. Moreover, he displayed junky movements of the left limbs in case of stimulation by the neurological hammer (Richard, 1). Moreover, he experienced left-sided hyperactive reflexes, had nystagmus among other symptoms of MS. However, the laboratory report was more promising and indicated an iron overload due to the high presence of ferritin, which stores a lot of protein. Consequently, the thyroid panel indicated a low activity of 1.1 while the nerve cells were sensitive to mercury due to the presence of tubulin protein. Nevertheless, the laboratory test revealed deficiencies of vitamins pyridoxine and thiamin,  which facilitate nerve function (Richard, 1).  

Wednesday, November 20, 2019

3M CORPORATION BUSINESS STRATEGY Essay Example | Topics and Well Written Essays - 1000 words

3M CORPORATION BUSINESS STRATEGY - Essay Example This structural change comprised of very fast changes in information and product technologies and the globalization of markets. This globalization had influenced the kind of leadership capabilities that were required for the success of the organization. The two challenges faced by 3M that I managed to identify are: First, it needed to update its model of corporate leadership, while at the same time cultivating the leadership talent that was required for the company’s growth. Secondly, 3M needed to make its succession planning process more effective so that the company could make sure the deployment of capable leaders on the organization. The question raised for 3M became a major issue for the company.3M has had an emphasis on its efficiency as a result of which the question was raised on the company’s creativity and innovation being neglected. 3M is the company whose identity is built on innovating so this was a vital issue to consider for 3M. 3M had launched a couple o f efficiency programs which were designed to correct their work processes in order to make them defect less or at least minimize defects. Because of these kind of efficiency increasing initiatives, 3m’s creativity was very easily neglected. As innovation was a necessity and something that brings about new challenges and changes the problem was of managing innovation along with efficiency. Factors involved FUTURE GROWTH 3M needed to fight Competitive pressures in order to survive. The company needed to grow as well to deal with these issues. So the company needed to strengthen its leadership on its management side and also high potential leadership talent side. LEADERSHIP SUCCESSION The second challenge face by 3M was about its leadership team policy of the company is to do its promotions from within only so that employees who will become future leaders would have a good understanding of 3M’s diversified business so they can be capable of being effective leaders. Theref ore, it was quite an issue for the company to manage its succession planning and properly target its leadership development process. 3M needed a companywide leadership profile on which it could base its assessment of leadership potential Strategic options The strategic options being explored are in different aspects of the business. One of these is the creation of new models to capture the value created for the customers For this it was required by 3M to have an up to date model of leadership so that the company would be able to guide the leadership development across the company’s very strong succession planning process and diversified business. What 3M required to do, as figured by its senior executives, was to develop a global framework of leadership competencies which would be specific with the company’s vision, values and business 3M had to create a model that would clearly define the company’s desired competencies. This model would then help the management of the company in developing behaviors and skills that would be in line with the company’s corporate objectives. This became a major issue for 3M in the midst of the competitive pressures. This approach was to increase overall effectiveness. In the past, 3M has developed a leadership competency model of this sort however current literature suggested that competencies needed to be updated because of the changing philosophies of the new global business environment. (S. Sharma, 2011) Strategic analysis tools The strategic analysis tools that can be used in this case are SWOT analysis, core competence analysis of 3M, Porter’s five forces and PEST analysis. The reason why these tools can be used is because they will help the company in

Monday, November 18, 2019

Letter for Dean (a sort of petition letter) Essay

Letter for Dean (a sort of petition letter) - Essay Example I have tried to change my major three times, but the main reason I did not succeed was the GPA that I earned from past universities, although the first time I tried to change my major for spring quarter in 2006, my GPA in the Ohio State University was over 3.4, but my accumulated GPA, including my scores from KyeMyung University was about 2.7. My chosen career is accountancy, and in order to become a well-defined accountant, I need to achieve a strong business education from Fisher College of Business. I have family members and close relatives who have worked as accountants in Korean Internal Revenue Service and other public accounting firms, and I have watched with interest, all the current accounting issues such as Sarbanes Oxley Acts and M&A for many well known companies. I want to become an accountant because I have a deep passion for the profession, and an innate talent for finding mathematical errors and hidden mistakes. I am willing to make sacrifices to realize my ambition to become an accountant, which is being hindered because of my past GPA. My short term goal has been achieving a degree from Fisher College of Business and I intend to later go for a Masters program in Accounting, to complete my education. I feel that an accounting degree from the FCOB will be very useful not only in the United States but also in Korea. Sir I really wish you would consider my application, and I would be very grateful if my request is granted. Yours

Friday, November 15, 2019

Definition of Research and Research Methodology

Definition of Research and Research Methodology In this section of study, components used to answer research questions and the methodology constructed to analyse those procedures are justified based on literature reviewed. Consequently, special emphasis is provided to other methods of research and the rationale behind them for not being subjected to be part of this exploration. However, constituent of research philosophy, research strategy and element of research design and research procedure are dealt in detail to offer maximum credibility to decisive findings. Besides, throughout the chapter ethical considerations have gained great substance allowing results to be analysed with immense attention. Research is used to describe a number of similar and overlapping activities relating a search for information. It is something that people undertake in order to find things out in a systematic way, thereby increasing their knowledge (Saunders et al. 2009). According to Kothari (2004), endeavour of any research is to uncover the concealed reality that is yet to be exposed or revealed. However, research is constantly used to solve organizational problems through systematic strategies (Ojo, 2008). Foundations of research are built and conducted over a structure called methodology (Remenyi et al. 1998) and a valid study will always adapt encouraging research methodology (Buckley et al. 1975). Hence, it is decisively fundamental to deploy quintessential methodology with great care and systematic understanding of the intricacies involved (Amaratunga et al. 2002). In this particular piece of study, efforts are made to discover the factors that lead to bullying at workplace with special emphasis on ethnic bullying. Intentions of this research were to illustrate, appreciate, anticipate, criticize and interpret the existing social science phenomenon (Maylor Blackmon, 2005) by systematically obtaining data to solve research problem (Ghauri Gronhaug, 2005). 3.3 Methodological Considerations: 3.3.1 Preconceptions and frame of reference: Generally research questions are derived from preconceptions. When study samples respond to these questions they react differently with reality (Lundahl Skarvad, 1992). Meanwhile, frame of reference formed in the minds of people due to preconceptions, repeatedly affect on findings of any research either directly or indirectly. Johansson Lindfors (1993) writes there are three major aspects to be considered in perceptions; Epistemological perceptions, Common perceptions and Theoretical perceptions. Temporarily, epistemological perception is a method used to explain the knowledge in the form of theories (Fisher, 2004). Thus, it is obligatory to know the acceptable knowledge of any discipline (Bryman Bell, (2003). While formation of common perception are developed through personal experience or firsthand information gathered from work or studies, Theoretical preconceptions provide an opportunity to appraise a range of views attained through various theories of academic sources, books, journals, articles, and magazines. To be precise they are impractical to compile through personal experience (Johansson Lindfors, 1993). 3.3.2 Research Philosophy and administration: Given that the research philosophy transmits the enlargement of knowledge and its temperament, chosen research philosophy ought to answer all the research questions in actual fact (Saunders et al. 2009). A lot of times research philosophy inculcated will manipulate the researcher views and the methods that are chosen to construct research strategy. But, within the context of social science there is an uncompleted argument to pick the most suitable position from the excessive horizons of positivism to the extreme end of interpretivism (Smith et al. 1991). However, research philosophy is further broadly classified into three major categories; Positivism, Interpritivism and Pragmatism or Realism. Core regulations of any approach are authentic/perceptual knowledge and hermeneutics (Johansson Lindfors, 1993) which constantly travel in opposite directions to each other (Andersson, 1979). While authentic/perceptual knowledge or positivism represents phenomenon of a discipline through quantifiable observations (Dayarathna, 2009), hermeneutics interprets the same social components through qualitative observations (Saunders et al. 2007). Under positivism there is a possibility of cause effect relation that can be confirmed or rejected (Patel Davidsson, 2003). Here, values of researcher and phenomenon of the study are clearly distinguished with a rule or law helping the researcher to observe reality. Whereas in interpritivism, this rule or law doesnt exist thereby making it viable for the researcher to involve in the process (Hartman, 2004) by allowing him/her to interpret the work at any desired stage in any desired ways to obtain complete knowledge. The philosophy adopted here is believed to express both positivism and interpritivism. Objective methods are used to measure properties of externally existing social world and are not subjectively attached through sensation, reflection or intuition (Smith et al. 2008). Hence, working with an observable social reality and the product of such research can be law-like generalizations similar to those products by natural and physical scientists. (Rememyi et al. 1998, pp. 32). For the moment, Interviews and self administered questionnaires are used here to gather the required data by emphasising on both qualitative and quantitative methods of data collection. The objectives of research: To discover different sources of ethnic minority bullying at work To inspect diverse forms of ethnic minority bullying at work To find out important causes that leads to ethnic minority bullying at work To expose effects of bullying on ethnic minority employees at work To observe reactions of ethnic minority employees to unhealthy practices bullying at work To realize various defensive mechanisms developed by ethnic minority employees to prevent from being bullied at work To examine the management/managers perspectives on ethnic minority bullying at work To suggest recommendations to prevent ethnic minority bullying at work A range of problems will be encountered throughout practical implementation of the project or research administration (Rowley, 2002). To avoid these inadequacies, study should infuse the objectives that are measure driven. Concurrently all the aims of research cannot completely revolve around human interests and beliefs (Smith et al 2008). Because, qualitative approaches often fail to reproduce commonality of the results (Sekaran, 2003). In such situations quantitative approaches appears much more meticulous. 3.3.3 Research strategy: Normally intentions of research invade strategy, where time, resources, philosophy and approaches play a greater role. But, there will always be an element of deduction in any type of studies undertaken (Ticehurst Veal, 2000), thereby persuading the researcher to be selective towards the data required or the data gathered. However, quantitative strategy is a method of data collection under deductive approach where data will be accumulated through survey questionnaires and acquired data will be analysed through statistical methods. Sub-sequentially deductive approach always helps in verifying or discarding a hypothesis by assembling and quantifying data (Dayarathna, 2009). Being objective and scientific in its nature this strategy is considered to be black and white method due to its lack of consideration with the results (Bryman Bell, 2003). Owing to positivism deductive approach is used for this study. Although there are various types of research strategy, general and business research rely more upon survey based strategy (Saunders et al. 2009). Because, the techniques applied here to collect data largely depend on purpose of the study, intensity of the problem, information required and the availability of time, money and human resources (Ghauri Gronhaug, 2005). Indeed, under this strategy data can be gathered in three different forms; personal interviews, survey questionnaires and telephone interviews (Bernard, 2006) and for the current project, personal interviews and survey questionnaires are used to extract required information. As part of quantitative analysis, a self administered questionnaire will be sent to the ethnic minority employees working in the organization to extract maximum information on ethnic minority bullying, and the sources, causes, and forms that leads to bullying behaviour. Personal interviews will also be used as part of study to know the responses of the employees to bullying manners and the measures anticipated by them in abolishing ethnic minority bullying at workplace thereby fulfilling the requirements of qualitative analysis. First section of the survey questionnaire consist of five basic or personal information questions; Age, Gender, Job Level, Ethnicity and Work Experience and in the second section of the questionnaire, eleven close ended and three open ended questions were asked focusing more on bullying and ethnic bullying at work. Especially, Open ended questions were used to present employees with an opportunity to express their genuine ideas and thoughts about the subject without any barrier. Primarily, all questions of the study were designed and uploaded to an online survey portal; SurveyPirate with a note in the beginning of the questionnaire clearly stating the purpose and objectives of the survey in brief. Later, link of the portal leading to questionnaire was downloaded and delivered to the respondents by emails with the help of Vice President-HR, ABB. India. Constructive nature of qualitative method makes it central to understand respondents views and how they generate meaning in an active manner (Maxwell, 2005). To involve interview approach as part of study researcher has to be very open in his perspective. As nature of the project demanded a qualitative approach to explore the unquenched myriads of ethnic bullying, a prior prepared semi-structured interview questions were also used during the study along with quantitative methods of data collection (Saunders et al. 2003). Personal interview conducted with the managers during the project will help in understanding the mangers perspective towards existing ethnic bullying practices and the problems caused by them. Furthermore, it also assists in recognizing the policies and measures implemented by both organization and the government to address these unpleasant and unfavourable workplace traditions By making use of qualitative or interview methods, analysis of the report gains a comprehensive and exclusive edge over other similar explorations undertaken on bullying. As it lend a hand in gathering valid and reliable information relevant to the questions and objectives of the research (Kahn Cannell, 1957), it becomes easier to compare the outcomes of the study to the theoretical frameworks ethnic bullying. Under qualitative method understanding between the author, respondents and the subjects will be on much higher grounds than other approaches of data accumulation (Bryman Bell, 2003) because Interview is nothing but a conversation or exchange of views and ideas between two people on a topic of mutual interest (Kvale, 1996). In order to accomplish the aims of the study eight managers from different department were interviewed with prior appointment. The ambitions behind interviewing managers were to bring broader viewpoint to the observations made and to explore the problem on macro levels. All the interviews were carried out as per the semi-structured questionnaire designed with in the time limit allotted. Despite all the above precautions qualitative methods can be very subjective and the final outcomes could involve element of bias due to preconceptions (Patel Davidsson, 2003). Semi-structured Questionnaire: Q1. Is ethnic minority bullying at workplace a major issue in your organization? Why do think so? Q2. What according to you are the major reasons that ignite and magnify ethnic minority bullying in your organization? Q3. In what form does the bullying take place in your organization and who are people that are often involved in the bullying practice? Q4. Have any staffs of yours left their job or taken time off work in the past six months? If yes, what were their reasons for leaving? Q5. How do the employees react in your organization when are being bullied? Q6. How do you tackle ethnic minority bullying in your organization? Q7. In your opinion what are the crucial factors that might lessen the likelihood of ethnic minority bullying in your organization? Q8. Does your organization make any efforts to prevent ethnic minority bullying? What are your views? Q9. Does your organization provide counselling services for bullied employees? If yes, how effective are they? 3.4 Research Design: According to Gauri and Gronhaug, (2005, pp. 56), The research design is the overall plan for relating the conceptual research problem to relevant and practicable empirical research. It is an important method used by the authors, in order to answer research questions (Saunders el al. 2007) and any design under the control of researcher will adjoin more flexibility in terms of valuable information. Meanwhile, there are four major types research design; exploratory, inductive, and casual descriptive (Zikmund, 2003) and the most appropriate way to get solutions to the research problems is through exploratory design (Zikmund, 2003). In exploratory design, researcher will have a weak idea about the problems as they are defined very poorly. But, the moment author starts accumulating relevant information; the entire picture becomes brighter and better thereby supporting to find healthier solutions to the problems (Gauri Gronhaug, 2005). On the other hand, inductive design employs various theories built on observation. Diverse approaches are carried over for deliberating and pursuing these observations. Justified theory emerging out of these observations will further aid in discovering appropriate solutions to the research problems. Although casual research is better structured than the other designs of research, cause and effect relationship is often confronted. In fact, during majority of instances it becomes very easy to predict the final results evolving from the changes incorporated (Nargundkar, 2003). Nonetheless, in contrary to the explorative method, problems are well defined under descriptive design. Thus researcher can start assembling secondary data associated to the problem instantaneously. In some circumstances, where there is a scarcity or absence of resources author will have attempt to collect data through different data collection techniques (Gauri Gronhaug, 2005). The research design used for this project is descriptive approach where a concrete problem is identified and defined by exploiting secondary sources of data existing. It is frequently used to depict precise silhouette of person/persons events and situations (Robson, 2002). Since research question is a problem which necessitate further investigation to formulate anticipated results (Bjereld et al, 2002), question for the current study is derived from the area of interest. Passable numbers of study samples are involved right through the process and unbiased measurements are practiced to execute and report about on project. Given that the sampling is important in this form of research, survey questionnaires and interviews are included with definite time limits. 3.5. Research Process and Procedure: 3.5.1 Sources of data: Sources of data are broadly classified in two categories, primary and secondary. According to Parasuraman et al. (2004) primary data are the information collected for the first time to bring about any explicit needs of a particular research. They are the firsthand descriptions represented by research reports, published in a scientific journal or periodical to reflect on the observations performed by the researcher (Gravetter Forzano, 2008). Furthermore, they also facilitate authors to illustrate their research by answering and substantiating against the questions or uncertainties rose during the progression of investigation. Like, why and how study was undertaken, what results were found, and how those results were interpreted. However, course of primary data collection entail a range of diverse means. They are, personal or emails based survey questionnaires, face to face or telephone interviews, observations and focus groups (Ghauri Gronhaug, 2005). Primary data is often more consistent with the research questions and objectives. Under this method of data gathering questions can be formed both formal and informal ways (Parasuraman et al. 2004). Yet, success of this approach relay largely upon the capabilities of the researcher, who pose the questions to the respondents (Bryman Bell, 2003). Major downside of this data source is that they require ample amount of time and may consume lot of money (Malhotra Bricks, 2007). Since the researcher is completely dependent on the willingness and ability of the respondents, at times it becomes very hard to approach respondents (Kanikapati, 2007). Secondary data is detailed information accessed by the researcher through other available sources of information to obtain thorough literature review. In fact, most of the studies begin in that fashion (Kanikapati, 2007). It is a second hand report where the observations of different authors will be discussed by the researcher to accomplish aspired objectives (Gravetter Forzona, 2008). Generally secondary information is of high standards (Bryman Bell, 2003) and fundamentally used to understand and explain research problems better. Secondary source of data is very easy to extract and available in plenty through, books, magazines, journals, articles, websites and etc. More importantly it is inexpensive and time saving but, its basic nature of collection for different purposes during different time span with different objectives makes it less effective to robust into present study. In this project, a combination of both sets of data are used achieve maximum results. Since the objective of the research is to observe whether, membership of an ethnic minority plays a greater role in work place bullying? A significant role is played by the primary data as it is directly accumulated from the employees in the ABB, UK. All over the study secondary data have been utilized to explore literature on the consequence of bullying, workplace bullying and ethnicity bullying. Majority of the data pertaining to study have been collected trough books, magazines, journals, websites and articles. 3.5.2 Direction-finder: Opportunity of every large study requires to be tested on a smaller sample size before execution. Direction-finder or pilot study will assist in inspecting the pros and cons of extensive process to be accomplished further. According to Saunders et al. (2007) questionnaires needed to be experimented on a limited population, to assess the difficulties that might encounter in answering the questionnaire and while recording data. By doing so, researcher can make certain that the collected data is valid and reliable. Conversely, pilot study is also essential to realise that the collected data answer all the research questions, easy to scrutinize and findings of the study are valuable (Smith et al, 1991). In the meantime, a direction-finder test was conducted to 4 employees of the Lebara organization, UK to investigate accuracy of questionnaire in extracting require data and their precision in gauging ethnic bullying factors in ABB, UK. Pilot process not only helped in understanding whether the respondents have interpreted the research questions as the same way they are intended to but, made the author realise that there were lot of concerns pertaining to open ended questions. However, a few of them were later modified or replaced with close ended ones. 3.5.3 Time horizons: At the outset, collection of samples was planned for the Month of July 2010 but shortly it was rescheduled to October 2010. Soon there were Christmas holidays to follow in the Month of December 2010 decision was made to distribute questionnaires in the Month of October to capture a balanced response as highlighted by Saunders (2007). 3.6 Research Context: 3.6.1 Obtaining permission: To obtain data, a request letter (Annexure) drafted by the researcher explaining the purpose of the study and the types of data required was sent to the Manager-Human Resource of ABB, UK through Vice President of ABB, India. Mr Rajesh Kumar Roy (Vice President ABB, India), who happens to be previous employer of the researcher accepted the request and recommended the proposal for further consideration. This was later approved by the respected authorities of ABB in UK. 3.6.2 Sample size: Multi-cultural or ethnic diverse nature of the research topic encouraged the researcher to choose ABB, UK for sample selection. Since the organization has its branches in more than 100 countries, mobility of ethnic centred employees within the company will be abundant. And this movement of workforce will be much more effective in UK because of its versatility. As it is impractical to survey the entire ethnic minority staff of ABB, UK due to time and budget constraints, a sample of 120 employees that represents the entire ethnic minority population of the organization was viewed as satisfactory for the quantitative method of study (Saunders et al, 2007). But, when it was realised that whole ABB labour force in UK consists approximately 8% of ethnic minority employees, the numbers of sample numbers were further reduced to 92 by considering 50% of the total ethnic minority workers (8% of 2300 is 184 and 50% of 184 is 92). On the other hand, qualitative research requires very limited num ber unlike quantitative approach (Miles Hubermann, 1994). Thus it is restricted to 8 members from four different locations (Daresbury Park Warrington, 9 Moorbrook Park Didcot, Park House Eastern Avenue Burton-on-Trent and Unit 15; Peddie Street Dundee). 3.6.3 Sampling techniques and selection: Selection of appropriate sample is the key in both qualitative and quantitative procedures of research (Maxwell, 2005). There are two major types of sampling techniques; Probability sampling or representative sampling Since they reflect the characteristics of the population, they often provide the most valid or credible results. But, they are expensive, time consuming and require certain level of skill sets to perform (Adamchak et al. 2000). However, under probability sampling every element has a chance of being selected and the selected elements probability can be calculated. Any variation between the elements is only a matter of chance as there is no bias involved (Adamchak et al. 2000). Non-probability or systematic sampling Though these methods are more elastic, cheap and require very limited time span, they are less desirable than probability samples due to their weaker evaluation and outcomes (Adamchak et al. 2000). But, their validity can be increased by approximating random section, and eliminating sources of bias. Here the elements are obtained on the basis of opportunity, judgement and referrals from other sample subjects (Adamchak et al. 2000). Probability sampling technique or procedure cannot be employed for this research because the population of the study is well defined. Therefore, systematic stratified sampling method is used to represent all the ethnic minority employees of ABB, UK without any discrimination. 3.6.4 Non response bias: Non response rate of any study depend upon sensitivity of the subject, clarity of objectives and level of confidentiality. However, anonymous questionnaires always enjoy high response rates. Hence, a covering letter (Annexure) stating purpose of the study was attached to the questionnaire to attract soaring response rates. Meanwhile, questions of the survey were kept anonymous to convince the respondents that the data collected will be treated with confidentiality (Sekaran, 2003). 3.6.5 Response rate: Respondents interests vary depending upon the type of research being conducted. Response rates tend to be very high among educational oriented studies. However, according to Saunders et al. (2007) satisfactory response rate of a research lies between 30% 40% and they could become even lesser when a topic is more sensitive and hard to relate. Meanwhile, unbiased approaches and ethical considerations might boost response rates despite all obstacles and hardships that could come in between. For the current research 92 survey questionnaires were distributed and 72 returned back. So the total response rate for this project was 78.26%. Non-response rate for the project was 21.74% and the core reasons for non-response could be refusal to become a part of the study or reluctant to answer all the questions (Dayarathna, 2009). 3.6.7 Rejected methods: Even though, focus groups are the supreme means of understanding through exchange of ideas within a group. They are not involved in the study due to their unfeasible nature. They are boring and often unsuccessful in bringing the group together under a single roof. Moreover, they dont provide sufficient time to the respondents during group discussions (Parasuraman et al. 2004). 3.7 Ethical Considerations: Issues pertaining to ethics of the study arise throughout research starting from formulation of research question, till presenting results. According to Saunders et al. (2007), they arrive in five stages; topic selection, designing and gaining access, collecting data, processing and storing data and during analysing and revealing findings. To begin with, access to data collection was attained by drafting a formal request letter to the concerned authority explaining the purpose of the study. When the access was granted a covering latter was prepared addressing respondents of the study ensuring that the data collected will be kept confidential and will be used only for the academic purpose. Anonymous questions were formed to conceal the identity of the individual participants (Smith et al. 1991) making it hard for other to recognise separately. To avoid personal bias and to add credibility and validity to the report research was conducted with minimum intervention. Collected observations are carefully analysed and results presented without any manipulations. All the secondary sources used for the study are recognised and acknowledged. 3.8 Limitations of the Study: Limitations are often accompanied by the element of human factor. Like any other general and social research even this research escort certain amount of boundaries to its procedure, scope and applicability. Firstly, Very limited numbers of open ended questions are used in the study and the ones that are used with the help of qualitative approach can make the results of the project biased (Patel Davidsson, 2003) by reflecting lack of transparency (Brayman Bell, 2003). Secondly, Closed ended questions used in the study might have restricted the respondents from indentifying various others factors that encourage workplace bullying. Finally, there will always be a problem of time, money and resources when a particular study is undertaken. 3.9 Conclusion: Comprehensive discussion about methodology for the selected study was presented in the above chapter to justify tactics incorporated is in line with the topic chosen. Deployment of deductive approach and addition of positivism and interpritivism were proved to be appropriate for the research due to various reasons as illustrated. Sampling procedures, sampling techniques and the size of samples were also explained along with the data collection methods, ethical considerations and limitations of the project. In the next chapter results of the research will be evaluated in detail.

Wednesday, November 13, 2019

Feasibility Report Essay examples -- essays research papers

Abstract   Ã‚  Ã‚  Ã‚  Ã‚  The purpose of this report is to determine whether it would be feasible for the Style Shop to add a computerized register to the store. The Merchandising Society is the largest club on F.I.T.’s campus. It provides the opportunity for its members to enhance their college experience at the Fashion Institute of Technology. Its members are dedicated to gaining exposure to the fashion industry first-hand through running a business, visiting companies worldwide, and volunteering services to the community. The club is responsible for operating a successful on-campus boutique, the Style Shop. The store offers the unique opportunity for FIT students, faculty and alumni to sell their original creations on a consignment basis. This not only allows students to earn recognition and profit, it enables Merchandising Society members to gain experience in buying, product development, marketing, finance, customer relations, management, visual merchandising, and website development. The Style Shop offers students the chance to develop a sharper awareness of group dynamics, build professional relationships, and actively participate in our college education. Currently the store uses a non-computerized register. There is no computerized inventory or bar codes used. Everything is done by hand. The addition of a computer would not only help keep track of all purchases by time, it would allow for the finance team to plan sales and monitor loss. The Style Shop uses a budget handed out by FITSA to fund purchases and stock for the store. This budget would be used to purchase a computer. It is highly feasible that the Style Shop purchases a computer and a register program. Introduction Purpose The purpose of this report is to determine the feasibility of adding a computerized register to the Style Shop team. Problem During the 2001/02 school year the Merchandising Society has over 180 active members. The store currently has no regulated computerized system. Inventory and tickets are all manually printed. By adding a computer to the store, inventory and sales could be more easily monitored. The computer would also serve as a ticket printer and finance station. Scope The addition of a computerized register would make the flow of goods in and out of the Style Shop easier. By adding a computer to the store each Merchandising Society member would h... ...h day. They will also be in charge of closing all curtains at night so that passers-by cannot see the computer in an empty store. Summer/Winter   Ã‚  Ã‚  Ã‚  Ã‚  When the Style Shop is not in operation the computer will be disconnected and stored in the Style Shop closet on the 7th Floor of the A-Building. This closet is only accessible to Style Shop Managers. Conclusion   Ã‚  Ã‚  Ã‚  Ã‚  The Style Shop is a growing student run boutique on F.I.T.’s campus. Each semester the store’s sales increase. The store needs a better way to track sales and inventory. By purchasing a computer Managers would be able to effectively track sales, inventory, and expenses. The total cost for the computer and register system is just under $2000.00. The money to purchase the computer/register would come out of the Style Shop budget given to the store by F.I.T.S.A. Recommendations   Ã‚  Ã‚  Ã‚  Ã‚  The Style Shop is an expanding establishment at the Fashion Institute of Technology. The addition of a computerized register would increase productivity within the store. It is recommended that the Style Shop use their budget and purchase a computer and a point of sale