Monday, December 23, 2019

Terrorism A Controversial Issue Of Morality - 1124 Words

The topic of how to deal with terrorism is often very controversial in terms of morality. In particular, the topic of torturing suspected terrorist often leads our nation in a huge debate. There are some discrepancies on what we define torture as and if it is morally right to use torture on suspects. To see if the U.S. should forbid torture even against terrorist the definition of torture, the U.N decision, act utilitarianism, and the effectiveness of torture must be considered. To see if the US should forbid torture, we must first define torture. Contrary to popular belief, â€Å"some forms of torture were designed solely to kill the victim in as agonizing a way as possible, not to extract information or a confession† (Chapter X: Torture, Ticking Bombs, and Buried Coffins). A broad definition of torture states that â€Å"They all are acts that cause intense physical pain and mental anguish, and they all are acts where the agents intend to cause intense physical pain and mental anguish† (Chapter X: Torture, Ticking Bombs, and Buried Coffins). The U. N. Convention defines the term torture as, â€Å"any act by which severe pain or suffering, whether physical or mental, is intentionally inflicted on a person for such purposes as obtaining from him or a third person information or a confession, punishing him for an act he or a third person has committed or is suspected of having committed, or intimidating or coercing him or a third person, or for any reason based on discrimination of anyShow MoreRelated Fighting the War on Terrorism Essay1247 Words   |  5 Pages It has been said that the easiest way to discredit someone in the political field is to accuse them of possessing Machiavellian morals. Until recently, todays political arena has been consumed by such illusive and controversial topics as human rights and the environment. Thus, it is easy to see why being referred to as a disciple of the austere Machiavellian principle could result in the untimely death of a political career. However, as of September 11th, the times have changed and so shouldRead MoreThe Doctrine Of The Divine Command Theory Essay1434 Words   |  6 Pages1. Introduction and Thesis This paper argues that Utilitarianism is a better ethical theory than many others proposed like the Divine Command Theory, which is the concept that morality is tied strictly to God and Immanuel Kant’s Duty Defined Morality, which has two distinct moral imperatives, because utilitarianism focusses on the benefit of the many which far outweighs the well-being of a single person. 2. Explanation of Philosophical Views The Divine Command Theory is a theory that morals areRead MoreIt and Ethical Issues Questions2610 Words   |  11 Pages Ethics and Social Issues Final Exam Essay Questions ESSAY QUESTIONS 1. Essay Question: Rule Vs. Act Utilitarianism (Utilitarianism) Suppose that you were wondering whether you, as a doctor, should hug a patient who is in tears. Give an ethical analysis of pros and cons from an act utilitarian point of view. Then give an analysis from a rule utilitarian point of view. 2. Essay Question: (Case Scenario -- Utilitarianism) Suppose that Rosa moves away her children out of town becauseRead MoreIt and Ethical Issues Questions2597 Words   |  11 Pages Ethics and Social Issues Final Exam Essay Questions ESSAY QUESTIONS 1. Essay Question: Rule Vs. Act Utilitarianism (Utilitarianism) Suppose that you were wondering whether you, as a doctor, should hug a patient who is in tears. Give an ethical analysis of pros and cons from an act utilitarian point of view. Then give an analysis from a rule utilitarian point of view. 2. Essay Question: (Case Scenario -- Utilitarianism) Suppose that Rosa moves away her children out of town becauseRead More Comparing Catherine MacKinnons Not A Moral Issue and Sallie Tisdale’s Talk Dirty to Me1715 Words   |  7 PagesComparing Catherine MacKinnons Not A Moral Issue and Sallie Tisdale’s Talk Dirty to Me Professor’s Comment: This powerful essay contrasts the views of two feminist, Catherine MacKinnon and Sallie Tisdale, each of which perceives pornography in widely divergent ways. While MacKinnons Not A Moral Issue explains the adverse impacts of pornography to women and society as a whole, Tisdales Talk Dirty to Me: An Intimate Philosophy of Sex is receptive to pornography despite these adverse impactsRead MoreEssay about The Influence of Religion on Scientific Advancement1737 Words   |  7 Pagessince the beginning of civilization and continues expanding today. This physical organization of personal beliefs has created wars and revolutions; nations and constitutions. In a subject as controversial as that of faith, it is often difficult to discern if it has benefitted humanity. One especially relevant issue today is religion’s influence on science. Throughout history, it is evident that religious movements have occasionally impeded scientific discovery; however, ther e is also evidence that scientificRead MoreEthics And Morality : A Noble Cause Corruption1196 Words   |  5 PagesEthics and morality are broad topics of everyday life. Instinctively, we as humans know the difference between right and wrong but in some cases, our ethics will narrow. Actions and decisions become selfish and for the sole purpose of personal gain. In some cases, unethical ways may even be illegal. Noble cause corruption is a prime example of when a person will utilize unethical means for a result to benefit the greater good. Noble cause corruption differs with traditional corruption. TraditionalRead MoreEssay about The Crucible by Arthur Miller981 Words   |  4 Pagesparanoia. The Puritans in those times were very strict in personal habits and morality; swearing, drunkenness and gambling would be punished. The people of Salem believed in the devil and thought that witchcraft should be hunted out. The play can be seen as a general statement on the effects that fear and fanaticism can have on human beings and how one person can cause such catastrophe. It is a purely a controversial play, so why write a play knowing the danger you were putting yourself inRead MoreCensorship Online1041 Words   |  5 PagesThis essay talks about issues regarding Censorship of the Internet. According to the textbook, censorship is a way used by governments or religious institutions to supervise or regulate the public access to offensive or harmful materials (Quinn 2012, p.496). Internet censorship applies the same discipline which regulates the public access to harmful content on internet. Nowadays, internet is a place with huge potential for growth. Statistics suggest that the total growth of new internet users isRead MoreKant And Kant s Theory1368 Words   |  6 Pagesgood example of the deontological moral theory, which takes that the rightness, as well as wrongness of an action, depends on the fulfillment of our duties and not on their consequences. Kant further believed that there exist a supreme principle of morality which he categorized the categorical imperative. In accordance with Kant, a good person entails an individual who does his/ her duty since it is his / her duty. It is okay if they perform their duty with joy and even if they do not enjoy, they would

Sunday, December 15, 2019

Equal Rights for Androids and Humans Free Essays

Equal Rights for Androids and Humans The concept of equality among all people was, unfortunately, not â€Å"self-evident† until the passengers on the Mayflower proclaimed it in 1620. A section of the Mayflower Compact reads, â€Å"†¦and by virtue hereof to enact, constitute and frame such just and equal laws, ordinances, acts, constitutions and offices†¦Ã¢â‚¬ . (Commanger, 23) Written in 1776, the second paragraph of the Declaration of Independence states, â€Å"We hold these truths to be self-evident, that all men are created equal†¦Ã¢â‚¬  (US Declaration Ind. We will write a custom essay sample on Equal Rights for Androids and Humans or any similar topic only for you Order Now This phrase echoes the same beliefs as those expressed in the Mayflower Compact. Efforts to achieve equality among all Americans have continued to this day. The concept of equality has not been ignored by Hollywood, either. The concept of equality has been a central theme in various popular films over the years. One such film is Bicentennial Man. The theme of Bicentennial Man challenges the viewer to question where they think the line of equality ought to be drawn. Throughout history, humans have struggled with this concept. Naturally, individuals desire to be the best, and they try to distance themselves from those who are not the same; the homeless, the handicapped, people from different cultures, or those that look different. The film approaches this idea in a different manner because Andrew, the android â€Å"star† of the film, is not a person. It takes Andrew a period of two hundred years (hence the name of the movie, Bicentennial Man) to convince the World Government that he did, in fact, have a soul and should be considered an equal. Columbus, Bicentennial Man) The film’s idea of android equality is not (yet) an issue needing to be addressed in American society. The film’s concept of equality does, however, resemble the real challenges of human equality faced by many Americans throughout history. At the start of the movie, it was established that Andrew only existed to serve and obey his owners, the Martin family. His only purpose was to obey the commands of and attend to the needs of this family. Jeremy Bentham, a political theorist, believes this is an example of the concept of utilitarianism. In simple terms, utilization is using an object (or people) â€Å"as a tool† to achieve a goal. (Nelson, 205). A word that could be used interchangeably with utilitarianism is, of course, slavery. Bicentennial Man evaluation of android equality is a clear reflection of the challenges of equal rights faced by many Americans throughout the history of the nation. In the film, Andrew Martin, the android, fought for 200 years in order to be declared equal to the humans he once served. In the real history of America, however, African-Americans fought for more than 300 years for equal rights as Americans. If only reality was a swift as Hollywood! Works Cited: Bicentennial Man. Dir. Chris Columbus. Perf. Robin Williams and Embeth Davidtz. Radiant Productions, 1999. DVD. Mayflower Compact. November 11, 1620. Documents of American History. Ed. Henry S. Commanger. New York: Appleton-Century Crofts, 1968. Nelson, Brian. Western Political Thought From Socrates to the Age of Ideology. 2nd. Englewood Cliffs: Prentice Hall, 1996. Print. How to cite Equal Rights for Androids and Humans, Essay examples

Saturday, December 7, 2019

Bibliography On Emerging Technologies On Wireless Sensor Network

Question: Discuss about the Annotated Bibliography On Emerging Technologies On Wireless Sensor Network. Answer: The evaluation of this article examines on the security of the wireless sensor network which has been an emerging technology and has been an important feature since it is utilized in the critical applications for example surveillance, tracking and controlling along with monitoring (Khan, 2014). There is significance of a secure and a reliable communications especially for the delivering the vital information correctly and in good time through a low powered sensor motes. The main problem associated in this technology is that of security of these networks particularly on the privacy (Khan, 2014). I have learnt the proposed security mechanism through combining of the features of the two security architectures in the WSNs such as the TESLA and Bloom Filters. Based on the interpretation and the evaluation done on this article, the main aspect it highlights is the wireless sensor networks that are the promising emerging solutions (Ramesh, 2014). This technology is offering possibility to the real time monitoring of the geographical areas that are susceptible particularly to the disasters mitigation (Ramesh, 2014). The article in addition has pointed out on the predicted issues confronted in the deployment of the wireless sensor networks and solutions that are intended to overcome them. The advantage related to this system is to delivering real warning to the community particularly during the rain. I have learned that the wireless sensor networks are among the efficient methods to real time monitoring in disaster susceptible places. The overview of research article highlights the wireless Sensor Network as the rising technology which demonstrates the promise for the numerous ultramodern programs both to the public and the military. From the article I have found out that there are advantages related to the technology , this sensing technology coupled with the processing power and the wireless communication tends to make it lucrative to become exploited in the future ( Pathan, Lee Hong , 2006). From what was learned in this post, there are security threats which occur mostly to the utilization of the technology. Nevertheless, the review has presented security mechanisms to the wireless sensor networks along with the holistic view to the security to make sure layered and robust security has been achieved in this technology. The article examines on the increase interest in the technologies which determine the next generation in the communication technology standard. Within this paper it recognizes numerous emerging technologies that could adjust and at the same time define on the future generation particularly to the telecommunication standards (Chin, Fan Haines, 2014). From the article it is learnt that some of these technologies have already make their way into the standards such as the 3GPP LTE and others are in the development stages (Chin, Fan Haines, 2014). These technologies they are provide benefits to the telecommunication technology such as the mobile phone that have revolved in the rapid past decade. On the interpretation and evaluation of this article it looks at how the wireless sensor network has surfaced as the most favorable technologies for the future (Rawat, Singh, Chaouchi Bonnin, 2014). This continues to be allowed by the improvements in the technology in addition to its accessibility and the smart sensors that lead to cost effective and easily deployable Wireless sensor network (Rawat, Singh, Chaouchi Bonnin, 2014). The literature of the article has addressed how the researchers are tackling the various challenges in order to facilitate the widespread deployment of WSN technology particularly in the real world domains. In overview, I have learnt about the wireless sensor networks and their application domains which include the challenges review to the recent technologies along with the testbeds for the WSN. Wireless sensor network technology continues to be an emerging as a feasible solution to most of the programs which are advanced (Ferdoush Li, 2014 ) . In the overview of the article, it explains a wireless sensor network system that has already been designed via utilization of an open-source hardware platform that are Raspberry Pi and Arduino ( Ferdoush Li , 2014 ) . I have learnt that within this system it is low cost and is definitely scalable in relation to the kind of the sensors and variety of the sensor nodes which make it to be suitable for various applications that are associated with the environmental monitoring. In the article it has also presented overall system architecture and model of the hardware together with the software elements. In the overview evaluation and interpretation of this article, it highlights that the wireless sensor networks have grown to be pervasive and they are presently utilized in numerous programs and services. The utilization of the WSN it is task oriented but it domain specific, hence, precluding re-use whenever other of the programs and services happen to be contemplated (Khan, Belqasmi, Glitho, Crespi, Morrow Polakos, 2015). The study has highlighted also to tackle the problem of proliferation of the redundant WSN deployments there usage of virtualization technology could help. The benefits of this technology enable the sharing of the resources or the infrastructure through multiple independent entities. Overview, the research study critically state the art and proposes the architecture for the virtualization of the WSN technology. In the article, I have learnt the proposed architecture and an illustration to the potential usage of the WSN especially in sharing of the multiple applica tions. The interpretation and evaluation of this research article examines the wireless sensor networks. On the findings, the WSNs have spurred new direction when it comes to the research in the agricultural and the farming domain. In the recent times according to the research, WSNs has been used widely in the application of different agricultural appliances (Ojha, Misra Raghuwanshi, 2015). The article reviews the potential for the WSN application as well as the specific issues along with challenges that are associated to deploying WSNs for improved farming. There has been analysis on the specific requirements, devices, along with the communication methods that are associated to the WSNs in agricultural applications (Ojha, Misra Raghuwanshi, 2015). The article has also provided numerous case studies to discover the current solution which are proposed in the literature to various types depending on design and implementation affiliated guidelines. The evaluation of this research article examines on the wireless sensor Networks which is the key components to the emerging technologies such as the internet of things paradigm. WSNs have been utilized in various application domains. The emerging technology in WSN is virtualization which could have the potential of enabling sharing (Khan, Belqasmi, Glitho, Crespi, Morrow Polakos, 2016). The article has examined on the WSN virtualization and it provides a comprehensive review of the state and an in depth discussion of the research issues. The review has presented on the existing work which has been discussed critically through use of requirements that is derived from the scenarios. This research article evaluates on the wireless sensor network that has been able to entice a number of the attention due to pervasive nature and deployment in the internet of things , cyber physical systems along with other of the emerging areas ( Shaikh Zeadally , 2016 ) . The problem concerns related in this research are on the limited energy related to the WSNs technologies ( Shaikh Zeadally , 2016 ) . Nevertheless, in overcoming on this limitation there has been design and development of an effective and high performance harvesting of energy system for the WSN environment. I have learned within this study on the extensive taxonomy of various energy pre-harvesting sources that can be employed for the WSNs. This research article examines on the emerging technologies on Wireless sensor network. The technology which has been developed and has utilized this application is automated irrigation program which is aimed to optimize water for the agricultural crops (Gutierrez, Villa, Nieto Porta, 2014). This system has the distributed wireless network for the soil moisture along with the temperature sensors that are put into the root zone of the plants. These studies have also highlighted how this system was designed and how it is powered. From this article have learnt the implementation of the automated irrigation system and its development has proved to be an asset especially in the use of the water irrigation purposes. This research article examines the wireless sensor networks which are utilized in the various applications and this has proved backbone to the new pervasive internet or the IOT (Shahzad Sheltami, 2015). In this research it has highlighted that the researchers are working to merge other emerging technologies as well as the services such as the cloud computing and the Big data with the designs of the IOT (Shahzad Sheltami, 2015). The research has highlighted the energy consumption is what is associated to the design in the WSN based system. In the paper I have learnt the performance of various MAC schemes for the WSNs. References Chin, W. H., Fan, Z., Haines, R. (2014). Emerging technologies and research challenges for 5G wireless networks. IEEE Wireless Communications, 21(2), 106-112. Ferdoush, S., Li, X. (2014). Wireless sensor network system design using Raspberry Pi and Arduino for environmental monitoring applications. Procedia Computer Science, 34, 103-110. Gutirrez, J., Villa-Medina, J. F., Nieto-Garibay, A., Porta-Gndara, M. . (2014).Automated irrigation system using a wireless sensor network and GPRS module. IEEE transactions on instrumentation and measurement, 63(1), 166-176. Khan, F. (2014, October). Secure communication and routing architecture in wireless sensor networks. In Consumer Electronics (GCCE), 2014 IEEE 3rd Global Conference on (pp. 647-650). IEEE. Khan, I., Belqasmi, F., Glitho, R., Crespi, N., Morrow, M., Polakos, P. (2016). Wireless sensor network virtualization: A survey. IEEE Communications Surveys Tutorials, 18(1), 553-576. Khan, I., Belqasmi, F., Glitho, R., Crespi, N., Morrow, M., Polakos, P. (2015). Wireless sensor network virtualization: early architecture and research perspectives. IEEE Network, 29(3), 104-112. Ojha, T., Misra, S., Raghuwanshi, N. S. (2015). Wireless sensor networks for agriculture: The state-of-the-art in practice and future challenges. Computers and Electronics in Agriculture, 118, 66-84. Pathan, A. S. K., Lee, H. W., Hong, C. S. (2006, February). Security in wireless sensor networks: issues and challenges. In Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference (Vol. 2, pp. 6-pp). IEEE. Ramesh, M. V. (2014). Design, development, and deployment of a wireless sensor network for detection of landslides. Ad Hoc Networks, 13, 2-18. Rawat, P., Singh, K. D., Chaouchi, H., Bonnin, J. M. (2014). Wireless sensor networks: a survey on recent developments and potential synergies. The Journal of supercomputing, 68(1), 1-48. Shahzad, F., Sheltami, T. R. (2015, October). An efficient MAC scheme in wireless sensor network with energy harvesting (EHWSN) for cloud based applications. In Local Computer Networks Conference Workshops (LCN Workshops), 2015 IEEE 40th (pp. 783-788). IEEE. Shaikh, F. K., Zeadally, S. (2016). Energy harvesting in wireless sensor networks: A comprehensive review. Renewable and Sustainable Energy Reviews, 55, 1041-1054.

Saturday, November 30, 2019

The Logic Of Evaluation Essay Example For Students

The Logic Of Evaluation Essay Along with questions there are answers, most questions must be evaluated before arriving to those answers. Usually when I am asking a question I go through a mental process of evaluating the question at hand before giving what I considered to be the most accurate answer. The purpose of my evaluation of the question is to rule out the other possible answers. Is evaluation the key to giving the, or getting the, correct answer, not always. However with evaluation of the question you can get more accurate account of what is being asked and how you can break it down to come up with the most correct answer. We will write a custom essay on The Logic Of Evaluation specifically for you for only $16.38 $13.9/page Order now Evaluation is not only a mental process in which you as an individual deals with internal feelings also be obtained through the outside collection of data, observations, and your own or others personal experiences. With all of this working for you in the process of evaluation your answer will be more accurate than if you were to guess without the evaluation of the question. One sunny day on vacation in Denver Colorado I was looking for a laundry mat. I had been driving around for some time with no luck. I pulled into a Circle K and asked the gas boy where one was located. He pointed and said five minutes that way. He had failed to use the evaluation process to answer my question. This evaluated answer that he should have given would include my data on travel as well as his personal experience of getting there himself. Evaluation is the heart of every question because without it your answer may not be as clear, precise or even relevant to the question. Evaluation can be lengthy at times when a simple guess is all that is required to get the ? ob? done. If all you are interested in is getting an answer of any sort why bother asking the question. Without careful evaluation of the questions being asked our need to strive for more would not be met in the sense that we were not taking the question seriously enough to take the time to evaluate for the most accurate answer. Spontaneity is good and fun but not when there is question or doubt. I would rather be a fool for five minutes asking a question than a fool for life not knowing the answer.

Tuesday, November 26, 2019

Stuart Davis, American Modernist Painter

Stuart Davis, American Modernist Painter Stuart Davis (1892-1964) was a prominent American modernist painter. He began working in the realist Ashcan School style, but exposure to European modernist painters in the Armory Show led to a distinctive personal modernist style that influenced the later development of pop art. Fast Facts: Stuart Davis Occupation: PainterMovement: Abstract art, modernism, cubismBorn: December 7, 1892 in Philadelphia, PennsylvaniaDied: June 24, 1964 in New York, New YorkParents: Helen Stuart Foulke and Edward Wyatt DavisSpouses: Bessie Chosak (died 1932), Roselle SpringerChild: George Earle DavisSelected Works: Lucky Strike (1921), Swing Landscape (1938), Deuce (1954)Notable Quote: I dont want people to copy Matisse or Picasso, although it is entirely proper to admit their influence. I dont make paintings like theirs. I make paintings like mine. Early Life and Education The son of sculptor Helen Stuart Foulke and newspaper art editor Edward Wyatt Davis, Stuart Davis grew up surrounded by visual art. He developed a serious interest in drawing by age sixteen and started illustrating adventure stories for his younger brother, Wyatt. Davis family moved from his childhood home in Philadelphia, Pennsylvania, to New Jersey, where he got to know a group of his fathers artist colleagues known as the Eight. This group included Robert Henri, George Luks, and Everett Shinn. Bar House, Newark (1913). Wikimedia Commons / Public Domain Stuart Davis began his formal art training as a student of Robert Henri, who became the leader of the Ashcan School, an American art movement known for focusing on painting scenes of daily life in New York City. They took much of their inspiration from Walt Whitmans poetry in Leaves of Grass. The Armory Show In 1913, Davis was one of the youngest artists featured in the groundbreaking Armory Show, the first extensive exhibition of modern art in the U.S. First showing at New Yorks 69th Regiment Armory, the exhibition then traveled to the Art Institute of Chicago and Copley Society of Art in Boston. The Mellow Pad (1951). Brooklyn Museum / Wikimedia Commons While Stuart Davis exhibited realist paintings in the Ashcan style, he studied the works of European modernist artists included in the exhibition, from Henri Matisse to Pablo Picasso. After the Armory Show, Davis became a dedicated modernist. He took cues from the cubist movement in Europe to move toward a more abstract style of painting. Colorful Abstraction Stuart Davis mature style of painting began to develop in the 1920s. He became friends with other influential American artists including Charles Demuth and Arshile Gorky as well as poet William Carlos Williams. His work began with realistic elements but he then abstracted them with bright colors and geometrical edges. Davis also painted in series, making his work parallel to musical variations on a theme. Swing Landscape (1938). Robert Alexander / Getty Images In the 1930s, Davis painted murals for the Federal Art Project, a program of the Works Progress Administration. One of those, the monumental painting Swing Landscape shows the style of Stuart Davis in full flower. He began with a depiction of the waterfront of Gloucester, Massachusetts, and then added the energy of the jazz and swing music he loved. The result is a highly personal explosion of color and geometrical forms. By the 1950s, Davis work evolved to a focus on lines and a style influenced by drawing. The painting Deuce is an example of the shift. Gone was the cacophony of bright colors. In its place was a lively set of vibrant lines and shapes still echoing lessons learned from the European cubism of the early 20th century. Later Career After he established himself as a vital member of the New York avant-garde painting scene of the mid-20th century, Stuart Davis began teaching. He worked at the Art Students League, the New School for Social Search, and then Yale University. As an instructor, Davis directly influenced a new generation of American artists. Nightlife (1962). Wikimedia Commons / Creative Commons 2.0 Although his late-career work continued to incorporate abstract elements, Stuart Davis never moved completely away from referencing real life. He rejected the abstract expressionism that dominated the American art world of the 1950s. In the early 1960s, Davis health quickly declined until he suffered a stroke in 1964 and passed away. His death came just as art critics saw the influence of his work in a new movement, pop art. Legacy Deuce (1954). Andreas Solaro / Getty Images One of Stuart Davis most lasting contributions was his ability to take lessons learned from European movements in painting and create a distinctly American twist on the ideas. His bold, graphical paintings contain echoes of the work of Fauvists like Henri Matisse and the cubist experiments of Georges Braque and Pablo Picasso. However, the end product finds inspiration in American life and architecture, a factor that makes Davis work unique. Pop artists Andy Warhol and David Hockney celebrated Stuart Davis blending of content from commercial advertisements with the shapes of everyday objects that he first depicted in the 1920s. Today, many art historians consider Davis work to be proto-pop art. Source Haskell, Barbara. Stuart Davis: In Full Swing. Prestel, 2016.

Friday, November 22, 2019

Acknowledgement

The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information. On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the system’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy – is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management – is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database – is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System – is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification – is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie Theater Charging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024Ãâ€"768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk – wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: †¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. †¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. †¢ The system was able to track whom librarian is accountable for the loss of a returned material. †¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: †¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed †¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button †¢ Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA.. Acknowledgement The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information. On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the system’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy – is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management – is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database – is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System – is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification – is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie Theater Charging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024Ãâ€"768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk – wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: †¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. †¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. †¢ The system was able to track whom librarian is accountable for the loss of a returned material. †¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: †¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed †¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button †¢ Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..

Wednesday, November 20, 2019

The Expert Witness Controversy Essay Example | Topics and Well Written Essays - 750 words

The Expert Witness Controversy - Essay Example One of the initial problems with expert testimony is that it is used by both the prosecution and the defense. The two experts must necessarily be at opposition in an effort to help their side's case and one of them must be wrong. This is further complicated by the vast number of "Expert Testimony Services" that have cropped up in recent years as lawyers and investigators pursue an expert-for-hire strategy. Some of these firms have been criticized for advertising that they will be paid only if they win the case. This is contrary to science and removes the neutrality of the scientific method. This attitude extends itself into the prosecution as government and police labs exaggerate claims or suppress evidence. In the case of Bromgard vs. Montana, Jimmy Ray Bromgard was convicted of raping an 8 year old girl based on a forensics expert who testified that the hair found at the scene had only a 1 in 10000 chance of not being Bromgard's. This expert testimony was fraudulent as there were n o means to statistically match hairs through microscopic inspection. Another problem with expert testimony enters the courtroom by way of new technology that may be unproven and unreliable. Termed "junk science", it is sometimes used by the defense to instill reasonable doubt, and more often by the prosecution to sway a jury in their favor. The 1993 case of Daubert vs. Merrill Dow Pharmaceutical set strict guidelines that lower courts must use to determine the admissibility of scientific evidence. It mandated that expert testimony be proven valid, reliable, peer reviewed, and generally accepted by the scientific community (Junk science, 2005). However, as new technology arises, it finds its way into court cases and is only upheld or overturned after years of appeal. When first introduced, fingerprint enhancement was labeled by defense attorneys as "...junk science, unreliable, and easily manipulated" (DeMarzo, 2003). Though the appeals process eventually upheld this technique, it runs the risk of alienating a jury and may result in a guilty verdict be ing overturned on appeal. The American Medical Association has been proactive in protecting the credibility of its profession by setting standards for medical testimony. In 1998 they adopted a policy that states, "... expert witness testimony is the practice of medicine subject to peer review" (Reardon, 1998). Medical malpractice suits and the questionable ethics of a Doctor receiving a contingency fee upon winning the case should arouse a sense of trouble in all involved. Expert testimony as it pertains to psychiatry is equally as troublesome as was seen in the case of John Hinkly. More recently, the case of Andrea Yates was overturned and ordered a new trial because of inaccurate testimony given by a leading forensic psychiatrist for the prosecution (Hausman, 2005). Further complicating the case was the controversial "Postpartum