Saturday, November 30, 2019

SPIDERS Essays - Venomous Spiders, Spider, Arachnid, Spinneret

SPIDERS Michelle Reynolds Pope Science January 06, 1999 Outline Title Introduction: I.The first sub-topic A. Distinctive Characteristics 1.Detail of the external anatomy 2.Detail of the sensory organs B.Circulation and locomotion 1.Detail of the circulitary system 2.Detail of the respiratory system II.The second sub-topic A.Digestion, Venom, and Spider Silk 1.Detail of the digestive system 2.Details of venom and spider silk Conclusion: Spiders are a very special unique and complexed Arachnids Michelle Reynolds Ms. Pope Science January 06, 1999 SPIDERS The word spider came from an Old English verb spinnan. Spinnan means ?to spin.? People in Eroupe see spiders with distaste, in African and in American cultures spiders are respected. Spiders are the most abundant and distinctive of all earthly predators. Most of the time they are not dangerous to us, spiders eat almost always insects and are found in places from the Tundras all the way to the low forrests They play abig job in taking care of the insect population, even the ones that can give us diseases. Distinctive Characteristics Even though insects and spiders belong to the group called, Arthopoda, they look so different from each other so they are put into different classes. The Insects and the Arachnids. Scientists think that these two classes split up thousands of years ago. External Anatomy Spiders come in different sizes, some of them are only 0.1 centimeter long,and some of the are more than 4 inches long. They have two body parts and eight legs. The spiders head and thorax are one body part. The thorax is the chest area of a spider. The abdomen or the stomache is the second body part Each leg has seven sections, and on the tips of many spiders legs are two tiny claws. Spiders that make a web use these claws and their notched hairs, to walk on their webs without sticking to them. Like insects, spiders have a body shell called an exoskeleton. This shell covers the body and the legs and keeps the spider from drying out. Much like our skin is to us. And to support the spider like our bones support us. Spiders even have a skelton inside called the internal skeleton. This is where the muscles attach. Unlike insects, spiders don't have antennaes. They do have two things near their mouths these are called pedipalps. They are used by spiders to handle their food. The palps of a baby male spider look like boxing gloves. When they grow up the palps are used for breeding. Sensory Organs Spiders have eight eyes in two groups and some spiders can see images. Others can't and they have to rely on feel like those on webs. Web weaving spiders eat, breed, and lay their eggs from silk threads. The main part of a spiders senses are two types of hair. The tiny ones have nerves. When these hairs are bent they send information to the brain and may cause it to run away or get ready to attack. They also sense touch, vibration and air flow. The second type of hair are the even tinier one these keep an eye out for pressure changes in the air. Curculation and Locomotion Spiders have an open circulatory system this means that they have no blood vessels or arteries. Instead, the blood oozes between the spiders flesh, and collects in little pockets on the underside of the body. A good circulation is very important to the spiders legs. When spiders don't get enough water, their legs fold up and they can't move them. Respiration Spiders have different kind of respitory systems. Some have a tubular tracheae, some have book lungs, and others have both. They first spiders to live had one or two pairpairs of book lungs. The spiders now days have one pair of book lungs and a pair of tubular tracheae. Digestion Spiders are th only animal to digest their food on the out side of their bodies. The gut of the spider is behind its stomach, and part of it goes into the front legs. This lets the spiders to live for days without eating. Venom Almost all spiders have venom glands. Most spider venoms are not harmful to us, but the black black widow and the brown recluse spiders will poisen us. Spider Silk What makes a spider a spider? They can spin a web. All spiders, even baby ones, have silk glands and spinning organs called spinnerets. The silk glands push the web out and the spinnerets weave the web. Works Cited First reference. The Comptons Interactive Enclopedia CD ROM. Additional reference. The Discovery Channel On-Line on the

Monday, November 25, 2019

12 Greatest Visual Artists of All Time

12 Greatest Visual Artists of All Time If you ask art historians who the greatest visual artists of all time are, there would be a multitude of different names. Of course,  there are several standards by which you can measure who the best artists of all time are. Unfortunately, the art world has been  historically dominated by men, and women artists are seldom mentioned despite their enormous contributions. It is important that women artists are also recognized as part of the canon, though, for their work is also of superior and enduring quality, and some even achieved success in their own day despite great societal obstacles. There are several factors that would determine if a particular artist makes the list. One of them is the trend and fashion of the moment that the artist lived, another is the longevity of an artists popularity. The impact made by an artist on his contemporaries is yet another factor to consider. In the long run, determining who are the greatest artists of all time may be a subjective opinion;  however, based on public opinion and what the museums say, the 10  best visual artists of all time are: 1.  Michelangelo (1475-1564) Michelangelo is regarded as the greatest sculptor and painter of all time. He was a major figure of the Renaissance in Italy, especially in Florence and Rome. Even today, some of his marble carvings have a flawless beauty. Michelangelo is popularly known for the Italian Renaissance sculpture as well as the Sistine Chapel frescoes, among other incredible works of art. 2.  Rembrandt van Rijn  (1606-1669) Rembrandt is a Dutch painting genius who created several masterpieces. Rembrandt is particularly renowned for his passion for history painting and still life portraits. He made several canvasses famous for their emotional content, which is why Rembrandt was branded as a realist painter. 3. Pablo Picasso (1881-1973) Pablo Picasso, the founder of cubism, is one of the most influential artists in history. He was a sculptor, printmaker, painter, and ceramicist. He produced several of the greatest paintings of the 20th century. Born to a painter father, Picasso received all the needed encouragement to build a successful painting career. This gave him the privilege to study art in some of the finest art schools in Spain. He was among the 250 sculptors who exhibited the 3rd Sculpture International held in America. His style and technique was exceptionally prolific throughout his lifetime, producing a total number of 50,000 artworks, including drawings, paintings, and sculptures, among others. Of all  forms of art, Picasso excelled most in painting. 4. Leonardo da Vinci (1452-1519) Leonardo was born in Florence, Italy. Despite living several centuries ago, he still remains one of the most influential artists of all time. His only training was in the field of science and he was apprenticed at an early age to a renown Florence painter of the  time.  Leonardo was regarded as an intellectual in his lifetime because of his passion for science. Leonardos contributions to the art world were small, but two of his paintings are the most popular today: Mona Lisa and The Last Supper, which is the only surviving fresco of Leonardo da Vinci. The fact that his interest ranged beyond art could have been the reason why his input was very small. In his lifetime, so engrossed was he in physics and mechanics, that he created workable artistic designs for bicycles, among other things. This is what is popularly believed to be the cause of his failure to complete several of his paintings and art projects. There are also credible reports that he spent a significant amount of time thinking and testing scientific laws, as well as writing his observations about them. 5. Claude Monet  (1840-1926) Claude Monet is popularly regarded as the founder of French Impressionist painting. Monet had an incredible passion for documenting the countryside in his numerous paintings. This was the birth of his impressionist paintings. When Monet went to Paris, he observed several artists copying the popular works of other artists. Rather than follow this trend, Monet developed the habit of sitting by an available window and painting what he saw. Gradually, Monet became popular for his impressionism. He influenced several young artists and made them commit to impressionism, and within a short period of time, Impressionism became a popular form of painting in Paris. Sometime in 1874, the first impressionism exhibition took place in Paris. In that exhibition, Monet presented a total of 12 artworks, which included five paintings and seven pastels. 6. Vincent van Gogh (1853-1890) Born in the Netherlands, van Gogh was a remarkable painter whose works of art are still sold at unbelievable prices across the world today. His contribution to art was basically painting. He created many still-life paintings, several of them were portraits of friends and acquaintances. In all, van Gogh completed about 800 paintings. One thing that distinguished him as a painter was his grasp for color relationship and unique brushwork. His work is still a great source of inspiration for  several impressionists all over the world. 7. Auguste Rodin (1840-1917) Rodin was a workaholic and a dedicated sculptor. He is a worthy successor to great minds like Michelangelo. Rodin is popularly considered the best sculptor of the modern era. His success is derived from his ability to model stone and clay in complex manners. During his lifetime, Rodin earned a living collaborating with established sculptors on several projects. 8. Jan van Eyck (1390-1441) He is one of the most remarkable Northern Renaissance artists and many of his works are greatly copied today. Aside from working for the court, van Eyck produced several paintings for private clients. One thing that was peculiar to him is that he was the only painter in his era to sign his canvasses. 9. Donatello (1386-1466) Donatello is regarded as the greatest sculptor of the 15th century. He was no doubt one of the best artists of that era. He was very skillful with wood, terracotta, and stone. 10. Peter Paul Rubens  (1571-1640) Peter Rubens was the most influential figure in counter-reformation baroque art. His contribution to art was basically paintings; however, he produced almost all possible genres of paintings. He was very versatile, producing cartoons and book illustrations as well as sketches for metal work and sculptures. 11.  Ãƒâ€°lisabeth Louise  Vigà ©e-Le Brun (1755-1842) Vigà ©e-Le Brun was one of the most renowned portraitists of 18th century France and the most famous woman artist in Europe. Through talent and perseverance, she achieved  success in one of the most turbulent periods of French and European history and became one of Queen Marie Antoinettes favorite painters. She painted more than 20 portraits of Marie Antoinette, along with portraits of other European aristocrats, actors, and writers, primarily women. She was elected to art academies in 10 different cities. She  created over 900 paintings in her lifetime, including roughly 600 portraits and 200 landscapes. 12. Georgia OKeeffe (1887-1986) Georgia OKeeffe was one of the most important and successful artists of the 20th century. She was one of the first American artists to embrace abstraction and became one of the leaders of the American Modernist  movement. Her art is personal and innovative. She is known for paintings of large abstract flowers, dramatic New York skyscrapers, and southwestern landscapes.

Friday, November 22, 2019

A Tale Of Two Cities Essays - English-language Films, Literature

A Tale of Two Cities Throughout the book, A Tale of Two Cities the theme of sacrifice is used to help the reader realize the cost of life, as well as to develop the plot through the effects of those sacrifices. Through the characters of Sydney Carton, Dr. Manette, and Ms. Pross the theme of sacrifice is developed. The theme of sacrifice brings key aspects of the plot together, and Carton's sacrifice brings the novel to closer in the end. Sydney Carton paid the highest cost of sacrifice with his life, and in doing so he was very similar to Jesus Christ. Carton laid down his life for a man who had never done anything for him and who in fact had abused his relationship as demonstrated on page 191 when Carton describes himself in Darnay's view as "a dissolute dog who has never done any good, and never will." Similarly Jesus Christ let himself be beaten, abused, and killed for the same people who spit in his face. Other people in both cases thought that Jesus and Carton were not thought to be much more that dogs, while they both sacrificed their lives so these people who treated them like dogs could live. Both Carton's and Jesus' sacrifice was inspired by a deep desperate love for which they were willing to do anything. Carton was willing to die for Lucie because of his desperate, scandalous love for her, just as Jesus showed his love for man when he was willing to give up his life for every man. This level of love makes the sacrifice even more valuable and brings things to closure. Finally, Carton and Jesus both knew that through their sacrifice, others could have life. Carton's death breathed life into Darnay just as Jesus Christ's death breathes life into those who trust in him. The importance of their death is that it brings life. The role of Carton's sacrifice in the plot is that the cost of life is sometimes high. Through his sacrifice the cost and privilege of living can be measured, just as Christians can see the true cost and privilege of life through Jesus Christ's sacrifice. Dr. Manette also sacrificed much of his life by giving up his own personal goals and agenda for Lucie. On page 125 Dr. Manette says, "any fancies, any reasons, and apprehensions, anything whatsoever, new or old against the man she really loved?they shall all be obliterated for her sake." Dr. Manette was willing to relinquish his own personal feelings or perhaps "rights" so that Lucie may be happy. He set aside, "anything whatsoever" in order for Lucie to marry the man she loves. Dr. Manette did anything he could to save Darnay from death, even to the point where Madame Defarge mocked him saying, "Save him now, my Doctor save him!" Dr. Manette had always been suspicious about Darnay, but he put aside his doubts in to Make Lucie happy. Deep down he knew that Darnay was an Evermond?, but he sacrificed his own feelings for Lucie's feelings. Thirdly, Dr. Manette gave up all of his desires, hopes, thoughts of revenge for Lucie, as demonstrated when he says, "She is everything to me; more t o me than suffering, more to me than wrong, more to me?." Dr. Manette had years of anger and revenge stored up him from when he was imprisoned, yet he forgot about all of it and only tried to make Lucie happy and make up for the many years he had lost. Dr. Manette's pain was so great that he often reverts to the insanity that was caused from his imprisonment, while he still does everything he can even though his pain is so great that he can not physically control it. Manette laid down his life so that Lucie could fully live. Ms. Pross sacrificed her life day by day for Lucie to have a better life. Ms. Pross simply devoted her life to Lucie, and her well being which is shown when Mr. Lorry describes Ms. Pross's devotion, "there is nothing better in the world than the faithful service of the heart; so rendered and so free from any mercenary taint" (87). Ms. Pross was sacrificed things

Wednesday, November 20, 2019

Engish Language- Discourse in Action Essay Example | Topics and Well Written Essays - 1500 words

Engish Language- Discourse in Action - Essay Example Us† (Text C) which use simple imperative forms of the verb â€Å"join.† There can be no ambiguity in the urge to follow this instruction, but Text C supplements the bare command with the use of the inclusive pronoun â€Å"us†, and the supplementary heading â€Å"Get involved.† The difference here is one of emphasis, whereby Text L stresses the recognition factor of its party name â€Å"Labour† and Text C stresses the element of belonging to a group. The connotations are political for Text L and personal for Text C, which indeed reflects the philosophy of collective and historic activism on the left, and individualism on the right. The most obvious linguistic difference between the two texts is the register of the preliminary introduction . Text L has an informal style, starting with an open question â€Å"Do you feel the same way we do about the kind of Britain you want to live in?† The question addresses the reader directly and suggests implicitly that a â€Å"yes† response is required. The next paragraph consists of three phrases separated by semi-colons and arranged as if they were a sentence unit. There is no main verb in this unit, however, and so it does not qualify as a proper sentence. This style is reminiscent of spoken language, where less attention is paid to the rules of formal grammar. The intention here is no doubt to make the process of joining the Labour party appear to be a casual, everyday event, which does not require any deep thought or special preparation. These three follow-up phrases make use of the rhetorical device of repetition, in a sequence: â€Å"A Britain where the re is†¦; where education is†¦and where you and your family†¦Ã¢â‚¬  (Text L) This usage is reminiscent of the speech-making techniques of former Labour Leader Tony Blair, whose personal style, no doubt heavily influenced by professional script writers, included many such non-grammatical phrases The informality of Text L continues with a further command, expanding the title of the

Tuesday, November 19, 2019

Waste Elimination Coursework Example | Topics and Well Written Essays - 1500 words

Waste Elimination - Coursework Example In the several groups identified by economist, Taiichi Ohno, there is the imperative need of identifying some of them and breaking them down in an effort to acquire greater understanding of their effects and subsequent characteristics. These waste groups include, damage caused by the waste to the environment, the waste in production and the waste brought about in motion. Baltimore Green Construction is a company based in Maryland that has made tremendous efforts in resolving the various waste issues experienced today. Focusing on the first category identified, there are very many effects caused by waste products to the environment and the affected are not only people, but also other organisms in the environment. One of the major problems that waste products have on the environment is pollution. Pollution is a problem that has affected many countries in the 21st century and the amount of waste products that bring about this is in a very large amount. Characterization of pollution is i nto three groups, one of the vast types is air pollution, the other type of pollution identified is water pollution, and then there is the less but still epidemic soil pollution. Focusing on air pollution, the major factor to identify with this is global warming. Many companies in the contemporary world manufacture and produce goods using industries and factories that do not have proper waste disposal systems. However, one of the ways through which Baltimore Green Construction has

Saturday, November 16, 2019

Organisational Behavior Notes Essay Example for Free

Organisational Behavior Notes Essay Definition * The study of human behaviour, attitudes and performance within organisational setting to improve performance and differences. * Frameworks of theories, methods and principles from disciplines such as psychology, sociology, political * The organisational Iceberg The study of organisational behaviour embraces, therefore an understanding of * The nature and purpose of the organisation * The human element and behaviour of people * Business strategy, organisational processes and the execution of work * The process of management as an integrating and co-ordinating activity * Social responsibilities and business ethics * The external environment of which the organisation is part of and * The need for organisation success and survival. The Pyschological Contract * The PC is not a formal written document that is referred to but a people organisation relationship where mutual expectations and satisfaction of needs are implied. * Important to enhance the level of trust and teamwork. * Human capital to be seen as a responsibility and a resources to be added to * Two observations in human behaviour at work * Peter Principle * Parkinson’s law ../2 The pyschological contract: possible examples of individual and organisational expectations Individual’s expectations of the organisation * Provide safe and hygienic working conditions. * Make every reasonable effort to provide job security. * Attempt to provide challenging and satisfying jobs, and reduce alienating aspects of work. * Adopy equitable human resource management policicies and procedures. * Respect the role of trade union officials and staff representatives. * Consult fully with staff and allow genuine participation in decisions which affect them. * Implement best practice in equal opportunity policies and precedures. * Reward all staff fairly according to their contribution and performance. * Provide reasonable opportunities for personal development and career progression. * Treat members of staff wit respect. * Demonstrate an understanding and considerate attitude towards personal problems of staff. Organisation’s Expectations of the Individual * Uphold the ideology of the organisation and the corporate image. * Work diligently in pursuit of organisational objectives. * Adhere to the rules, policicies and procedures of the organisation. * Respect the reasonable authority of senior members of staff. * Not to take advantage of goodwill shown by the management. * Be responsive to the leadership influence. * Demonstrate loyalty, respect confidentiality and not betray positions of trust. * Maintain harmonious relationships with work colleagues. * Not to abuse organisational facilities such as email or internet access. * Observe reasonable and acceptable standards of dress and appearance. * Show respect and consolidation to customers and suppliers. A pyshcological contract is not only measured in monetary value or in exchange of goods or services, it is in essence the exchange or sharing beliefs and values, expectations and satisfactions. Mutuality is the base principle of the pyshcological contract and consensus or mutual understanding is the basis of mutuality. Ideally therefore self-interest should be balanced with common interest in a win-win arrangement. In the past this unspoken contract might have implied that employees could expect job security and adequate rewards from their employer in exchange for hard work and loyalty. Today’s pyshological contract may be different, in line with a changed working environment that includes factors such as increased rationalism, technological changes, and management aproaches such as outsourcing. The new pyschological contract may revolve more around an employer’s willingness to assist you in developing your skills to order to maintain your marketability. The Peter Principle This is concerned with the study of occupational incompetence and the study of hierarchies. In a hierarchy every employee tends to rise to their level of incompetence. Employees competence in their postion are promoted and competence is each new position qualifies for promotion to the next highest posotion until a position of incompetence is reached. The principle is based on perceived incompetence in all levels of every hierarchy political, legal, educational and industrial and ways in whcih employees move upwards through a hierarchy and what happens to them after promotion. Peter suggests tow main means by which a person can effect their promotion rate. â€Å"Pull and push†. * Pull is an employee’s relationship – by blood, marriage and acqaintance – with a person above the employee in the hierarchy. * Push is sometimes manifested by an abnormal interest in study, vocational training and self-improvement. In small hierarchies push may have a marginal effect in accelerating promotion; in larger hierarchies the effect is minimal. Pull is therefore, likely to be more effective than Push. Parkinson’s Law A major feature of PL is that of the rising pyramid, that is â€Å"Work expands so as to fill the time available for its completion. There is little, if any, relationship between the quantity of work to be done and the number of staff doing it. Underlying this tendency are two statements; * An official wants to multiply subordinates, not rivals * Officials make work for each other What is driving leaders organisations behaviour? * The continuous importance that consumers base on value of product and service. * The diverse workforce is also an important factor that drives organisational behaviour. * Consumers expect that organisation understands their needs and produces top quality products at best price possible. These demands place leaders in a challenged situation by domestic and global markets and competition. What are organisational factors? * Organisational factors may be identified as the organisational environment, structure design * Individual characteristics, group behaviour * Overall decision making * The change processes adopted by the organisation The fast momentum in any industry highlights the importance of the leader to align the human resources with the organisational factors. Framing the Organisational behaviour Organisational behaviour may be studied under the following main contributors * The environment * The individual in the organisation * Group behaviour and interpersonal influence * Organisational process Organisational environment is the external and internal environment, the legal and political constraints, economic, technological changes and development all have an impact on the decisions that are taken by the management. The individual is the foundation of the organisation performance. This should therefore highlight the importance of managing individual behaviour at any level of the organisation. There are 3 important influences that mould the individual behaviour. 1. Individual characteristics 2. Individual motivation 3. Rewards Group behaviour Groups may form either intentionally by managerial decisions or form out of individual efforts. * Formal groups are groups that were intentionally created by managerial decisions * Informal groups are groups that form out of common interests and friendships that may have a negative or positive effect and therefore affect the organisation or individual performance. * Organisational processes are the communication, the decision making and the leadership elements that the organisation fosters as part of its culture and which in turn have an impact on the general performance of the individual and collective behaviour. Factors of organisation process Communication process is the ability of management to receive, transmit and act on information. The information integrates the internal activities with the external demand and information also integrates internally the activities of the organisation. Decision making process Decisions by managers have a direct impact on the employees well being, the organisation’s resources and the design and implementation of rules in a organisation. This should illustrate the importance of managers to communicate, assess and analyse the feedback of decisions and practises in the organisation. Leadership process Leaders in an organisation may be managers and non- managers. The manager may not always be the leader, yet leadership skills contribute in attaining the set goals. Some people believe that leadership styles should vary according to the situation, other believe that one style of leadership is effective in most situations. Importance of effectiveness * Surviving in the environment * Organisation ages- it forms, develops, matures and declines Importance of the Dimension of Time Quality, productivity, efficiency, satisfaction, adaptiveness and development are 6 general categories of effectiveness criteria. Each of the categories have a time base, short run criteria – 1 year, intermediate 5 years, long run are those for which the indefinite future is applicable. Personality Individual difference and work behaviour * Individual differences have a direct effect on behaviour because peole who perceive things differently behave differently. * Individual differences shape organisaitional behaviour and consequently, individual and organisaitional success. What is the ASA framework? This is the attraction- selection-attrition to careers and organisations. * Prospective employees are attracted to careers and organisations. * Organisations elect employees on the basis of the needs of the organisation. * Attrition occurs when individuals discover that they do not belong to the organisation. Studying individual differences at the work place is important since not addressing differences among employees may hinder from achieving organisation and personal goals. Understanding work behaviour Inorder to fully understand where individual differences arise the personal environment also needs to be given attention, weight and considered. Heredity factors are also important. An effective management must; * Observe and recognise the dufferences and * Study relationship between variables that influences individual behaviour. For discussion * What are the variables at work? * Give examples of work behaviour. Can you think of how these may be fostered on connected? The following variables impact employee productivity, creativity and performance extensively; * Heredity factors and diversity * Abilities and skills * Attitudes Heredity factors Gender, race and ethnic background are all heredity factors, mental and moral differences are also influenced by genetic inheritance and such factors mould each individual which in turn have a direct effect at work behaviour. 1.a Diversity * Diversity refers to those attributes that make people different from another. Primary dimensions of diversity include age, ethicity, gender, pyshical attributes, race and sexual orientation. When an employee is harassed as a resukt of diversity, due to isolation they become less enthusiastic in their job. * Managing diversity therefore ensures that employees become top level contributors especially in today’s Abilities and Skills * Ability is a pesson’s talent to perform a mental or pyshical task. * Skill is a learned talent that a person has acquired to perform a task. * Ability tends to be stable over time while skill tends to change according to training and experience. One needs ability to be a sales executive (appearance and manners are important) yet one may attain skills with years of experience in sales. * Mental ability therefore refers to the level of intelligence including comprehension, indicative or deictive reasoning, body language, associative memory etc. * Tacit knowledge is the work related to practical know how of the employees acquired eitehr through observation or direct experience on the job. Emotional intelligence – When you probe people to get to know them more * It is important that managers assess and attest abilities and skills snice no amount of leadership and motivation can make up for such deficiencies- job analysis therefore becomes important. * Job analysis is the process of defining and studying a job interms of tasks and behaviour and specifying responsibilities, education and training needes to perform a job – therefore removes guess work when recruiting. Attitudes Attitudes are deteriments of behaviour because they are linked with perception, personaility, fdeelings, etc therfore has a certain amount of importance to the managers. Attitudes are * Learned * Define one’s predeposition towards a given aspect or situation * Provide the emotional basis of one’s interpersonal relations and identifications with other * Attitudes are close to the core of personaility * Some attitudes are persistent and enduring while others are liable to change over time. Changing attitudes at the workplace How can a manager change attitudes of his employees? The process depends on three main factors / contributors 1. The Communicator 2. The Message 3. The Situation The Communicator * If the communicator is trusted and the employees perceive the manager as having prestige, they are more likely to change their attitudes. Employees change because they try to identify with a liked communicator and tend to adopt attitudes and behaviour of the liked individual. * A manager with a low prestige is not show respect / trust by peers and superiors – therefore more difficult to change attitudes of his team. The Message * Intentional and unintentional messages are delivered through verbal and no nverbal communication by managers. * The message delivered to employees has to be clear, understandable and convincing. * Developing persuasive verbal and non verbal communication skills is essential to managers. The Situation * The managers success in delivering a change in attitude also depends on the situation when the message is being delivered. * Distraction and pleasant surroundings are two factors that facilitate change in attitude (perks, performance allowance, training opportunities) Is job satisfaction an attitude? Job satisfaction results from the perception of the job itself and the degree which there is a good fit between the individual and the organisation Factors to consider * Pay – not just the pay but the perceived fairness. * The work itself are job tasks considered interesting? Do they provide opportunities for learning and accepting further / higher responsibilities? * Supervision – technical competence and interpersonal skills of the immediate boss. * Co workers – extent to which co workers are friendly, competent and supportive. Advancement opportunities – availability of opportunities Work conditions – the physical work environment is comfortable and supportive of productivity. Job security – it is reasonable expectation that one’s position is secure and contured employment within the organisation. Job relation in relation to Job performance on Effectiveness Are these 2 factors related or dependant on each other? * Attempts by management to satisfy employees may not mean higher performance while high performance may not mean that the employers are satisfied at work. * Discuss the ripple effects of rewards, warnings, absenteeism, fair promotion etc. That these have on job performance in general. Effect on OC Personality Personality refers to a relatively stable set of feelings and behaviour that have been significantly formed by genetic and environmental factors. * The manager attempting to understand his employees must give attention to the major forces that shape personality. * Cultural forces, heredity, family, relationship and social class are all factors that mould personality. How? * Culture – society, institutes various pattern behaviour with the result that members of a culture have common personality characteristics. * Heredity – varies from personality to another but are not constant since it is associated with values or ideals (temperament) * Family relationships – the experience one has with his parents, grandmothers, other family members / life experiences. * Social class – influences one’s self perception, perception of others, of work, of authority of money factor. * Personality is therefore a product (a number of forces that together have attributed to shape the unique individual). Personality is interrelated with perception, attitudes, learning and motivation – therefore analysis behaviour is incomplete unless personality is considered. Personality and Behaviour in Organisations The big five Personality Dimensions is key in understanding organisational behaviour. 1. Extroversion (Open minded, sociable, etc) 2. Emotional (Stability) 3. Agreeableness (More open to people, challenges and change) 4. Conscientousness (to understand your people’s attraction) Other three major factors are: Locus of control This relates to the extent to which employees believe that their behaviour will influence what happens to them. (Differing personalities of Internals Externals). Self efficacy Personal beliefs of competencies and abilities. This has an impact on Org behaviour and decisions like selection, training programmes and goal setting and performance. Creativity This is a personality trait that requires deviation from the normal thinking to produce new and useful ideas. (Think in an unconventional way). While a personality factor of the individual organisations play an important role to develop creativity at work by giving opportunities and freedom to think and come forward with new ideas. Reward winning ideas and discuss failures positively to nourish creativity all round. The Importance of Culture National Culture is the sum total of the beliefs, rituals, rules, customs, artefacts and institution that characterise the population. How organisational transactions are conducted is affected by nation’s culture and its subcultures. Values, customs and rituals of cultures do not simply appear. They are revolutionary and are influenced by politics, religion, language and cultural aspects. Managing in the 21st century For effective management understanding different cultures and various organisational cultures is important in the 21st century. ../9 ../9 Adaptation to new environment is becoming a common occurrence and although adaptation from one origin to another is always difficult, it can be better understood by learning about organisational culture. Organisational Culture Organisational culture is the shared values, norms, beliefs and norms which influence the way employees think, feel and act towards others inside and outside the organisation. OC gives unique identity to an organisation Although culture cannot be seen, it can be sensed and felt through a person’s attitudes, emotions and perceptions. â€Å"The way we do things around here† Deal and Kennedy 1982 â€Å"The collective programming of the mind†, Geert Hofstede 2001. Hostede identified four dimensions of culture: power distance, uncenrtainty, avoidance, individualism and masculinity. Power distance is essentially used to categorise levels of inequity in organisations which Hofstede claims will depend upon managment style, willingness of subordinates to diasgree with superiors, and the educational level and status accruing to particular roles. Uncertainty avoidance refers to the extent to which members of a society feel threatened by unusual situations. High uncertainty avoidance is said to be characteristic in France, Spain, Germany and many Latin American societies. Individualism describes the relatively individualistic or collectivisit ethic evident in that particular society. The USA, France and Spain display high individualism. Masculinity refers to a continuum between masculine charactertistics such as assertiveness and competitiveness, and feminine traits such as caring, a stress upon the quality of life and concern with the environment. Can organisational culture be created by management? * Ann Cunliffe (2008) states that OC is important for 4 reasons *Slaps the image that the public has as an organisation * Influences organisational performance * Provide direction to the company * Help to attract and retain motivated staff Creating the desired OC may be difficult since imposing a particular culture may not be met with resistance. Why? Is disparity between what the management states as values and the reality with the employee an issue? What organisational factors may be attributed to the development of a desired OC? Communication is an organisational factor that is an important factor is developing and fostering an OC Why? Discuss with example? Communicating top down only leaves management out of touch from the real situation and may lead to a gap in culture that management wants to create another culture that actually develops. Uncover the levels of cultures Artefacts Visible organisational structures and processes (had to decipher). Annual report, newsletter, furnishings are examples of artefacts. Espoused Values – Strategies, goals, philosophies (espoused justifications). Assumptions that tell individuals how to perceive, think and feel about work, human relationships and performance of colleagues. Basic underlying assumptions – Unconscious taken for granted beliefs, perceptions, thoughts and feelings (ultimate sources of values and actions). Summary with examples of Schein’s three levels of culture * Surface manifestation of culture – most accessible forms which are visible and audible behaviour patterns and objects (observable culture, send a message) * Organisational values – the accumulated beliefs held about how work hold be done and situations dealt with that guide employee behaviour ( be honest, be creative, work hard) * Basic assumption – invisible perceptions, taken for granted understandings, held by individual with an organisation concerning behaviour, the nature of reality and its relationship to its environment (stability, excellence, quality and responsibility). Where does OC come from? Values are the basic element that distinguishes one organisation from the other. Changing organisation structure and its process will mean a change in values and therefore a change in culture. Why? Discuss the difference on a change from tall hierarchy to a change in flat hierarchy.

Thursday, November 14, 2019

The Death of Marilyn Monroe Essay -- Papers Fame Suicide Famous Essays

The Death of Marilyn Monroe In the world today, we, the public, spend so much time admiring stars from Hollywood and many of us want to be like them. Yet, there is so much pressure placed on them, and some times this becomes all too much for them to cope with and they end up taking away their live. This is the unpleasant and tragic side of being famous as we are all made to believe that fame will make you happy. Edwin Morgan brings this theme into focus in the poem 'The Death of Marilyn Monroe'. He looks at how such a beautiful and worldwide icons such as Marilyn Monroe felt that to get rid of all the pressure that is associated with fame, she needed to commit suicide, which is the unpleasant truth, we the reader have to face while reading this poem. Edwin Morgan looks at this through the exceptional use of personification, symbolism and imagery. This was put to good use as it help me to create an image in my mind about how fame isn't all that it is hyped up to be and that it allows the reader to see the darker side of fame. Marilyn Monroe was the biggest film star in the late 50's. She was portrayed as being a sex symbol on the silver screen. She was a massive icon worldwide and was admired by everyone. Even today people still admire her, 42 years after her death, as she has her image on bags and calendars. Monroe, wasn't your average sex symbol, she wasn't sleazy as she had this child like innocence that so many people admired her for, including women. Edwin Morgan conveys this idea of Monroe being a sex symbol, yet, also being child like, by using a series of rhetorical questions. "What innocence? Whose guilt? What ey... ... people worldwide as they were 'shaken'. They felt that Monroe was part of their family and that the film industry will never be the same without her. Marilyn Monroe had the whole world at her feet, as she was rich and famous. Yet, fame has a darker side. Which makes you depressed and isolated. Fame is like a curse for many famous people and many people end up taking their lives such as Monroe. This gives the reader an insight of what fame is really like and what it gives you. Not money, but isolation and depression. In the end, being rich and famous only makes you unhappy, unlike what the American Dream tells us. Edwin Morgan is showing the reader the darker, more real side of fame. What we are told it is, but that is could end up taking your live away. Which is the price of being famous, that no one should pay.

Monday, November 11, 2019

Facial Identification Of Driver Fatigue Health And Social Care Essay

Driver weariness is frequently one of the prima causes of traffic accidents. In this concluding twelvemonth undertaking, a computing machine vision attack which exploits the driver ‘s facial look is considered, utilizing a combination of the Viola-Jones face sensing technique and support vector machines to sort facial visual aspect and find the degree of weariness.Section 1: DescriptionIntroductionStatisticss show that driver weariness is frequently one of the prima causes of traffic accidents. Over the past few old ages, a batch of research and attempt has been put forth in planing systems that monitor both driver and driving public presentation. A computing machine vision attack which exploits the driver ‘s facial look is considered in this concluding twelvemonth undertaking. The Viola-Jones real-time object sensing model working on a boosted cascade of Haar ripple characteristics is adopted for face sensing. To find the degree of weariness, multiple characteristic cate gorization is so performed utilizing support vector machines. The motives for taking to develop the system in this mode are the rapid face sensing times coupled with the simple and inexpensive overall execution, avoiding the demand to put in expensive and complex hardware.Concise Literature ReviewThis subdivision gives a wide reappraisal of the literary work related to face sensing in fatigue monitoring systems and engineerings, concentrating peculiarly on what has been done in the field of driver weariness. In subdivision 1.2.1, several statistics of fatigue-related motor vehicle accidents are mentioned and analysed. Section 1.2.2 high spots some of the more successful systems ( both commercial and non-commercial ) that have been implemented in recent old ages. On the other manus, subdivision 1.2.3 nowadayss an enlightening overview of the algorithms and techniques typically used in the development of such systems, particularly those refering to both face and facial characteristic sensing. Representative plants for each of these methods will be included.Statisticss Related to Driver FatigueDriver weariness has been one of the chief causes of route accidents and human deaths in recent old ages, and in this subdivision an effort is made to foreground some of the more of import statistics that demonstrate this negative tendency. The National Highway Traffic Safety Administration ( NHTSA ) [ 1 ] estimations that 2-23 % of all vehicle clangs can be attributed to driver weariness. Every twelvemonth, around 100,000 traffic accidents and 71,000 hurts related to driver sleepiness are reported in the United States, out of which more than 1,300 are fatal [ 2 ] . The NHTSA [ 3 ] besides reports that in the twelvemonth 2005 entirely, there were about 5,000 route human deaths ( around 8.4 % ) which were caused either by driver inattention ( 5.8 % ) or sleepy and fatigued drive ( 2.6 % ) . Furthermore, 28 % of fatal traffic accidents were due to lane maintaining failure, one of the indirect effects of weariness on drivers, ensuing in the loss of 16,000 lives. Undoubtedly, truck drivers are more capable to tire chiefly because of the long hours travelled on main roads, taking to inevitable humdrum journeys. In fact, a survey by the U.S. National Transportation Safety Board ( NTSB ) [ 4 ] confirmed that weariness was the finding factor in 51 out of 87 instances of truck accidents. These dismaying statistics pointed to the demand to plan and implement systems capable of tracking and analyzing a driver ‘s facial features or organic structure provinces and giving a warning signal at the first noticeable marks of weariness to seek and forestall the likely happening of an accident. In the following subdivision of this literature reappraisal, a figure of these systems will be presented.Existing Fatigue Monitoring SystemsMany different attacks for systems undertaking the job of driver fatigue have been studied and implemented over the past few old ages. Earlier devices tended to be instead intrusive, necessitating physical contact to mensurate fatigue characteristics while driving. These characteristics included bosom rate variableness, analysis of encephalon signals every bit good as the driver ‘s physiological province. Other systems studied the relation of driver sleepiness to maneuvering clasp and vehicle motions, with some besides using lane tracking installations. However, the focal point nowadays is more towards independent non-intrusive systems that work in the background without deflecting the driver in any manner, able to observe and track caput and oculus motions by agencies of one or more cameras mounted on the vehicle ‘s splashboard. The bulk of merchandises tracking weariness have been designed for on-road vehicles, such as autos, trucks and engines, and these will be reviewed in the undermentioned subdivision. In Section 1.2.2.2, other types of weariness monitoring systems that have been deployed will be analysed.On-Road Fatigue Monitoring SystemsCommercially Implemented SystemsIn the system presented by Advanced Brain Monitoring Inc. [ 5 ] , a caput mounted device in the signifier of a baseball cap uses the encephalon ‘s EEG ( Electroencephalography ) signals to mensurate weariness. Two electrodes inside the baseball cap are connected to the driver ‘s scalp to capture these signals, directing them v ia wireless moving ridges to a processing device 20 pess off from the driver. Russian seller Neurocom marketed the Engine Driver Vigilance Telemetric Control System ( EDVTCS ) [ 6 ] for usage within the Russian railroad system. EDVTCS continuously track drivers ‘ physiological province by mensurating alterations in the electro cuticular activity ( EDA ) i.e. alterations in the tegument ‘s opposition to electricity based on the eccrine perspiration secretory organs of the human organic structure, located chiefly on the thenar of our custodies and the colloidal suspensions of our pess. One of the first non-intrusive driver weariness supervising systems was ASTiD ( Advisory System for Tired Drivers ) [ 7 ] . It consists of an up-to-date knowledge-base theoretical account exposing a 24-hour anticipation form sing the possibility of the driver traveling to kip piece at the wheel, and a guidance wheel detector system capable of placing humdrum driving intervals, such as those in main roads, every bit good as unusual maneuvering motions as a consequence of driver weariness. Lane trailing is another attack taken to place distraction forms while driving. SafeTRAC, by AssistWare Technology [ 8 ] , consists of a picture camera located on the windscreen of the vehicle ( confronting the route ) and a splashboard mounted having device to which it is connected. The camera is able to observe lane markers in roads and issues hearable, ocular or haptic warnings if fickle drive forms, such as changeless impetuss between lanes, are observed. Sing the issues encountered in earlier systems, more importance now started being given to systems that monitored driver head motions, face and facial characteristics. MINDS ( MicroNod Detection System ) , described in [ 9 ] , paths head place and motion, with caput nodding being the chief weariness characteristic used for observing micro-sleep ( short periods of distraction ) while driving. Head motion is tracked by an array of three capacitance detectors located merely above the driver ‘s cockpit. Yet another attack was taken by David Dinges and Richard Grace [ 10 ] at the Carnegie Mellon Research Institute ( CMRI ) in the development of the PERCLOS proctor, which determines the oculus closing per centum over clip for fatigue sensing. In [ 11 ] , PERCLOS is defined as the proportion of clip the eyes are closed 80 % or more for a specified clip interval. FaceLAB [ 12 ] focal points on both face and oculus trailing, mensurating PERCLOS ( PERcentage of oculus CLOSure over clip ) and analyzing water chickweeds in existent clip ( including wink frequence and wink continuance ) . A important difference from other systems is that the absolute place of the eyelid, instead than the occlusion of the student, is used to mensurate oculus closing, doing it much more accurate. The 2001 AWAKE undertaking of the European Union [ 13 ] focused specifically on driver weariness, integrating many of the above mentioned steps. The chief end of this undertaking, ( its acronym standing for System for effectual Assessment of driver watchfulness and Warning Harmonizing to traffic hazard Estimation ) , was to supply research on the real-time, non-intrusive monitoring of the driver ‘s current province and driving public presentation. Many spouses were involved in AWAKE, including developers, makers and providers of electronics, research institutes, universities, auto makers and terminal users. The undertaking ‘s initial ends were those of accomplishing over 90 % dependability, a lower than 1 % false dismay rate and a user credence rate transcending 70 % . Car fabrication companies, such as Toyota, Nissan and DaimlerChrysler [ 9 ] are besides in the procedure of developing their ain weariness supervising systems.Research Based SystemsMany research documents closely related to driver fatigue monitoring have been published in recent old ages. Assorted attacks have been proposed, among which skin coloring material information has been really popular. Smith [ 14 ] nowadayss a system based on skin coloring material predicates to find weariness from oculus wink rate and caput rotary motion information. Similarly, in the gaze way monitoring system proposed by Wahlstrom et Al. [ 15 ] , coloring material predicates are used to turn up the lip part by finding those pels that match the needed coloring material values. Face extraction by skin coloring material cleavage utilizing the normalized RGB skin coloring material theoretical account is adopted in both [ 16 ] and [ 17 ] . Veeraraghavan and Papanikolopoulos [ 16 ] developed a system to observ e forms of micro-sleep by continuously tracking the driver ‘s eyes. PERCLOS is the fatigue characteristic measured in Aryuanto and Limpraptono ‘s system [ 17 ] . Horng and Chen [ 18 ] attempted to utilize the HSI coloring material theoretical account to take the consequence of brightness from the image. Machine acquisition is another common attack to tire sensing. Yang et Al. [ 19 ] choose to follow a Bayesian Network based â€Å" probabilistic model † to find the fatigue degree. A Bayesian Network theoretical account is besides constructed in [ 20 ] , where Zhu and Lan track multiple ocular cues, including caput and oculus motions and facial looks via two cameras, one for the face and the other concentrating specifically on the eyes, every bit good as Infra-Red illuminators to illume up the needed countries of the face. A nervous web attack is adopted by D'Orazio et Al. [ 21 ] and RibariA†¡ et Al. [ 22 ] in their proposed systems. In [ 21 ] , the oculus is detected based on the border information of the flag, with its darker coloring material doing it much easier to turn up. A back extension nervous web is trained to sort the province of the eyes ( either unfastened or closed ) . On the other manus, in [ 22 ] , a intercrossed nervous web and a combination of the â€Å" HMAX theoretical account † and â€Å" Viola-Jones sensor † together with a Multi-Layer Perceptron ( MLP ) are used to turn up the face. The grade of caput rotary motion, oculus closing and oral cavity openness are the fatigue steps calculated. To sort driver public presentation informations, Liang et Al. [ 23 ] make usage of Support Vector Machines ( SVMs ) . They focus on cognitive ( mental ) , instead than ocular driver distractions. For fast face and facial characteristic sensing, the method proposed by Viola and Jones affecting a boosted cascade of characteristics based on Haar ripples is adopted in a figure of documents, including [ 24 ] and [ 25 ] . Often, a loanblend of techniques are used to obtain better consequences for driver weariness sensing. Saradadevi and Bajaj [ 26 ] usage Viola-Jones ‘ method for mouth sensing and SVMs to right sort normal and yawning oral cavity cases. On the contrary, the one presented by Narole and Bajaj [ 27 ] combines pixel-based skin coloring material cleavage for face sensing and a mixture of nervous webs and familial algorithms to optimally find the weariness index, with the nervous web being given as initial input values for oculus closing and oscitance rate.Other Fatigue Mo nitoring SystemsAs with drivers in autos, pilots in aircrafts are obviously capable to tire, chiefly due to the drawn-out flight continuances. NTI Inc. and Science Applications International Corporation ( SAIC ) [ 28 ] designed the Fatigue Avoidance Scheduling Tool ( FAST ) , a system intended to track and foretell weariness degrees for U.S. Air Force pilots, based on the SAFTE ( Sleep, Activity, Fatigue and Task Effectiveness ) theoretical account created by Dr. Steven Hursh. Another application in which weariness monitoring is utile is in the bar of Computer Vision Syndrome [ 29 ] , a status caused by working for drawn-out hours in forepart of show devices, such as computing machine proctors. Matsushita et Al. [ 30 ] besides developed a wearable weariness monitoring system which detects marks of weariness based on caput motions. The broad assortment of different applications developed to supervise weariness is an grounds of the turning importance of this field. The focal point in the following portion of the literature reappraisal will switch to the weariness analysis attack taken in this thesis: the sensing of faces and their characteristics in images. The implicit in methods and algorithms typically used in this procedure will be discussed.Reappraisal on Face and Facial Feature Detection TechniquesKnowledge-based methodsDetecting faces in knowledge-based techniques involves the encryption of a set of simple regulations specifying the features of the human face, including pixel strengths in the images and the places and correlativities between the different characteristics, since these are common to all human existences. In a knowledge-based method presented by Yang and Huang [ 31 ] , a hierarchy of grayscale images of different declarations together with three different classs of regulations are used. The images are analysed for possible face campaigners by using regulations that have to make with the cell strength distribution of the human face. An betterment to this multi-resolution method was proposed by Kotropoulos and Pitas [ 32 ] . Alternatively of ciphering the mean pixel strength of each cell, merely those for each image row and column are computed, organizing perpendicular and horizontal profiles severally. To vouch a high sensing rate, the regulations in knowledge-based methods must neither be excessively general nor excessively specific, and hence, the coevals of regulations for the face must be performed really carefully. Because of the complexness required in coding all possible face constellations, rule-based techniques do non provide for different face airss [ 33 ] , doing them decidedly inappropriate for weariness monitoring applications.Feature-based methodsFeature-based attacks to confront sensing differ in a important manner from rule-based techniques in that they foremost attempt to place a individual ‘s facial properties and later find whether the latter are valid plenty to represent a human face, ensuing in the sensing of that face.Facial FeaturesThe presence of faces in images is frequently determined by trying to observe facial characteristics such as the eyes, nose and mouth. In a method presented by Sirehoy [ 34 ] , the egg-shaped nature of the human face is used as the footing for face sensing in grayscale images with littered backgrounds. Due to the different visual aspects of facial characteristics in images, Leung et Al. [ 35 ] usage a combination of several local characteristic sensors utilizing Gaussian derivative filters together with a statistical theoretical account of the geometrical distances between these characteristics to guarantee accurate face localisation. Han et Al. [ 36 ] , on the other manus, usage morphological operations that focus chiefly on the oculus part in their efforts to observe faces, based on the logical thinking that this is the most consistent facial part in different light conditions. A more robust and flexible feature-based system was presented by Yow and Cipolla [ 37 ] . The theoretical account cognition of the face that is used screens a wider country, including the superciliums, eyes, nose and mouth. A figure of Partial Face Groups ( PFGs ) , tantamount to a subset of these characteristic points ( 4 ) , are used to provide for partial face occlusions.Face TextureAnother face cue that is used for sensing intents is its textural form, this being specific to worlds and hence easy discriminable from other forms. Manian and Ross [ 38 ] present an algorithm that uses the symmetricalness and uniformity of the facial form as the footing of sensing. Rikert et Al. [ 39 ] tackle texture-based sensing in a different manner, utilizing a statistical method that learns to correctly sort whether an image contains a face or non.Skin ColourMany plants related to human clamber coloring material as a face sensing cue have been presented in recent old ages. Detection can be either pixel-based or region-based. The former attack is normally taken, in which each pel is analysed and classified as either tegument or non-skin. Two chief picks are made during this procedure: the coloring material infinite and tegument modeling method. Harmonizing to [ 40 ] , the normalized RGB, HSV and YCrCb coloring material infinites are typically used to pattern skin coloring material. Normalized RGB [ 41 – 45 ] is reported to be consistent in different light conditions and face orientations. On the other manus, YCrCb [ 46 – 48 ] and HSV [ 49 – 51 ] are normally chosen since they specifically separate the luminosity and chrominance constituents of the images. In [ 40 ] , several other tegument patterning techniques normally adopted are mentioned.Template matching methodsAnother proposed method for face sensing involves the storage of forms of the face and its characteristics, which are so compared to existent face images and given a correlativity value ( i.e. the degree of similarity between the existent image and the stored form ) . The higher this value, the greater is the opportunity that the image contains a face. Works on templet fiting techniques in recent old ages have focused both on fixed and variable-size ( deformable ) templets.Fixed-size TemplatesFengjun et Al. [ 52 ] and Ping et Al. [ 53 ] usage a combination of skin coloring material cleavage and templet matching for face sensing. Two grayscale templets with predefined sizes – one covering the whole face and the other concentrating merely on the part incorporating the two eyes – are utilised in both systems. Fixed-size templets, although straightforward to implement, miss adaptability to different caput places since sensing is greatly affected by the orientation defined in the templet.Deformable TemplatesAn improved templet matching method is one in which the templet can be altered to better reflect the input images and therefore would be able to place a wider assortment of faces in different airss. Yuille et Al. [ 54 ] propose deformable oculus and mouth templet matching in their work. Initially, the templets are parameterized through pre-processing to bespeak the expected form of both characteristics. The work presented by Lanitis et Al. [ 55 ] besides parameterizes the templet s, concentrating on the coevals of flexible molded human face theoretical accounts through the usage of a â€Å" Point Distribution Model † ( PDM ) [ 56 ] which is trained on a figure of images per individual with characteristic fluctuations within and between faces.Appearance-based methodsRather than being based on a set of preset templets, appearance-based face sensing relies on machine larning techniques that identify the presence of faces and their major features after a procedure of developing on existent universe informations. One of the most widely adopted machine larning attacks for face sensing are nervous webs, chiefly because of the success they achieved in other applications affecting pattern acknowledgment. Rowley et Al. [ 57 ] propose a robust multi-layer multi-network nervous web that takes as input pre-processed 20Ãâ€"20 grayscale pel images to which a filter is applied at each pel place, returning a face correlativity value from -1 to 1. The concealed beds o f the nervous web are designed to supervise different shaped countries of the human face, such as both eyes utilizing a 20Ãâ€"5 pel window and single eyes and other characteristics with the 5Ãâ€"5 and 10Ãâ€"10 Windowss. The web so outputs another mark finding the presence or otherwise of a face in a peculiar window. Yang et Al. [ 58 ] establish their system on a Sparse Network of Winnows ( SNoW ) [ 59 ] . Two mark nodes ( â€Å" linear units † ) patterning face and non-face form characteristics are used in this instance. The active characteristics ( with binary representation ) in an input illustration are first identified and given as input to the web. The mark nodes are â€Å" coupled via leaden borders † to a subset of the characteristics. To update the weights for farther preparation, the Winnow update regulation method developed by Littlestone [ 60 ] is adopted. A additive categorization technique in the signifier of Support Vector Machines ( SVMs ) was used to observe faces in an application presented by Osuna et al [ 61 ] in 1997. While the bulk of machine acquisition attacks ( including nervous webs ) effort to take down the â€Å" empirical hazard † , i.e. the mistake value in the preparation procedure, SVMs attempt to cut down the upper edge of the expected generalisation mistake in a procedure called â€Å" structural hazard minimisation † . Viola and Jones [ 62 ] present a rapid object sensing system holding face sensing as its motive. A important difference from other proposed systems is that rectangular characteristics, instead than pels, nowadays in the inputted grayscale images are used as the bases for categorization. This has the consequence of increasing the velocity of the overall procedure. Viola and Jones ‘ method will be discussed in item in the following chapter of this thesis.Purposes and AimsFamiliarization with the OpenCV tool. Literature Review about bing systems and methods to be used in this Dissertation. Fast face sensing utilizing Viola-Jones technique. Execution of multiple facial characteristics used to find the fatigue degree. Application of Support Vector Machine classifier to observe unsafe state of affairss such as driver kiping etc. Real-time execution of the proposed methods within OpenCV.MethodsViola-Jones technique for face sensing. Support vector machines to sort facial visual aspect ( e.g. open/closed eye/mouth ) . Features to be taken into consideration: caput motion, oculus closing and frequence of oral cavity gap ( bespeaking yawning ) . Eye weariness steps include PERCLOS ( PERcentage Eye CLOSure over clip ) and AECS ( Average Eye Closure Speed ) .EvaluationComparing the developed system to other systems found in literature in footings of preciseness, callback and truth. Deducing some trial informations on which the algorithms will be tested. Test topics seeking out the application. Showing the consequences obtained.DeliverablesProgress Report. Review Report. 2 page abstract for ICT Final YearA Student Projects Exhibition. Presentation Slides and Poster. Spiral and difficult edge transcripts of the Dissertation Report. C++ application, preparation and testing resources.Section 2: Work PlanWork done so farCollected and read several documents related to bing driver weariness systems and face sensing in general. Completed the first bill of exchange of the literature reappraisal. Familiarized myself with the OpenCV environment. Used a webcam to capture two short cartridge holders inside a auto, one in sunny and the other in cloud-covered conditions. Collected 2000 positive and 4000 negative images for face sensing. Positive images: 1500 taken from FERET grayscale face database, the other 500 from the captured cartridge holders. Negative images: created a C++ application to randomly choice non-relevant countries of the frames of the two captured cartridge holders. Created another C++ application to be able to harvest the positive images to bespeak merely the needed rectangular countries, bring forthing a text file to be used in the preparation procedure. Used this information to bring forth a classifier for faces in XML format with OpenCV ‘s Haar preparation public-service corporation.SubtasksCompute truth, preciseness and callback values for the face sensing preparation. Trial with new picture cartridge holders and observing the consequences obtained. Perform Cross Validation. Train the classifier for oral cavities, once more utilizing positive and negative images. For oculus sensing, an already generated classifier will be used. Extract characteristics from face, oculus and mouth sensing. Integrate and utilize a C++ library for support vector machines, such as libSVM, to sort facial visual aspect. Write Abstract, Introduction, Methodology, Evaluation, Results, Future Work and Conclusion of the Dissertation Report. Write Review Report. Write 2 page abstract for ICT Final YearA Student Projects Exhibition. Work on Presentation Slides and Poster.Schedule ( Gantt Chart )Section 3: Mentions[ 1 ] D. Dinges, M. Mallis, G. Maislin and J. Powell ( 1998 ) . â€Å" Concluding study: Evaluation of Techniques for Ocular Measurement as an Index of Fatigue and the Basis for Alertness Management † , U.S. Dept. Transportation, National Highway Traffic Safety Administration, [ online ] , Last accessed on 4th October 2010, Available at: hypertext transfer protocol: //ntl.bts.gov/lib/jpodocs/edlbrow/7d01! .pdf [ 2 ] National Highway Traffic Safety Administration ( 2005 ) . â€Å" NHTSA Vehicle Safety Rulemaking and Supporting Research Priorities: Calendar Old ages 2005-2009 † , [ online ] , Last accessed on 4th October 2010, Available at: hypertext transfer protocol: //www.nhtsa.gov/cars/rules/rulings/priorityplan-2005.html [ 3 ] National Highway Traffic Safety Administration ( 2005 ) . â€Å" Traffic Safety Facts 2005: A Compilation of Motor Vehicle Crash Data from the Fatality Analysis Reporting System and the General Estimates System † , National Center for Statistics and Analysis, U.S. Dept. Transportation, [ online ] , Last accessed on 4th October 2010, Available at: hypertext transfer protocol: //www-nrd.nhtsa.dot.gov/pubs/tsf2005.pdf [ 4 ] Hall, Hammerschmidt and Francis ( 1995 ) . â€Å" Safety Recommendation † , National Transportation Safety Board, [ online ] , Last accessed on 21st December 2010, Available at: hypertext transfer protocol: //www.ntsb.gov/recs/letters/1995/H95_5D.pdf [ 5 ] J. Cavuoto, â€Å" Alertness Monitoring Devices Emerge from San Diego † , Neurotech Business Report, [ online ] , Last accessed on 21st September 2010, Available at: hypertext transfer protocol: //www.neurotechreports.com/pages/alertness.html [ 6 ] J-S Co. Neurocom, â€Å" Engine Driver Vigilance Telemetric Control System EDVTCS † , [ online ] , Last accessed on 21st September 2010, Available at: hypertext transfer protocol: //www.neurocom.ru/en2/pdf/edvtcs_adv_eng.pdf [ 7 ] Fatigue Management International, â€Å" ASTiD: Advisory System for Tired Drivers † , [ online ] , Last accessed on 22nd September 2010, Available at: hypertext transfer protocol: //www.fmig.org/ASTID % 20Information % 20Document.pdf [ 8 ] AssistWare Technology, â€Å" Tired of Confronting Another Night Entirely? SafeTRAC can assist † , [ online ] , Last accessed on 22nd September 2010, Available at: hypertext transfer protocol: //www.assistware.com/Downloads/SafeTRAC-Fleet % 20Datasheet.pdf [ 9 ] European Commission, Information Society Technologies ( 2002 ) . â€Å" System for effectual Assessment of driver watchfulness and Warning Harmonizing to traffic hazard Estimation † , [ online ] , Last accessed on 21st September 2010, Available at: hypertext transfer protocol: //www.awake-eu.org/pdf/d1_1.pdf [ 10 ] D. F. Dinges and R. Grace ( 1998 ) . â€Å" PERCLOS: A Valid Psychophysiological Measure of Alertness As Assessed by Psychomotor Vigilance † , US Department of Transportation, Federal Highway Administration, [ online ] , Last accessed on 21st December 2010, Available at: hypertext transfer protocol: //www.fmcsa.dot.gov/documents/tb98-006.pdf [ 11 ] W. W. Wierwille ( 1994 ) . â€Å" Overview of Research on Driver Drowsiness Definition and Driver Drowsiness Detection † , 14th Technical Int. Conf. on Enhanced Safety of Drivers ( ESV ) , Munich, Germany, pp.23-26. [ 12 ] Sing Machines, â€Å" faceLAB 5 † , [ online ] , Last accessed on 21st September 2010, Available at: hypertext transfer protocol: //www.seeingmachines.com/pdfs/brochures/faceLAB-5.pdf [ 13 ] E. Bekiaris ( 2004 ) . â€Å" AWAKE Project Aim and Objectives † , Road Safety Workshop, Balocco, Italy, [ online ] , Last accessed on 21st September 2010, Available at: hypertext transfer protocol: //www.awake-eu.org/pdf/aim_achievements.pdf [ 14 ] P. Smith, M. Shah and N. D. V. Lobo ( 2003 ) . â€Å" Determining Driver Visual Attention with One Camera † , IEEE Transactions on Intelligent Transportation Systems, Vol. 4, No. 4, pp. 205 – 218, [ online ] , Last accessed on 16th August 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.4.842 & A ; rep=rep1 & A ; type=pdf [ 15 ] E. Wahlstrom, O. Masoud and N. Papanikolopoulos ( 2003 ) . â€Å" Vision Based Methods for Driver Monitoring † , IEEE Intelligent Transportation Systems Conf, pp. 903 – 908, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.3.4434 & A ; rep=rep1 & A ; type=pdf [ 16 ] H. Veeraraghavan and N. Papanikolopoulos ( 2001 ) . â€Å" Detecting Driver Fatigue Through the Use of Advanced Face Monitoring Techniques † , ITS Institute, Center for Transportation Studies, University of Minnesota, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //www.cts.umn.edu/pdf/CTS-01-05.pdf [ 17 ] Aryuanto and F. Y. Limpraptono ( 2009 ) . â€Å" A Vision Based System for Monitoring Driver Fatigue † , Department of Electrical Engineering, Institut Teknologi Nasional ( ITN ) Malang, Yogyakarta, Indonesia, [ online ] , Last accessed on 17th June 2010, Available at: hypertext transfer protocol: //aryuanto.files.wordpress.com/2008/10/teknoin09-1.pdf [ 18 ] W.-B. Horng and C.-Y. Chen ( 2009 ) . â€Å" Improved Driver Fatigue Detection System Based on Eye Tracking and Dynamic Template Matching † , Department of Computer Science and Information Engineering, Tamkang University, Taipei, Taiwan, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //dspace.lib.fcu.edu.tw/bitstream/2377/11188/1/ce07ics002008000132.pdf [ 19 ] J. H. Yang, Z.-H. Mao, L. Tijerina, T. Pilutti, J. F. Coughlin and E. Feron ( 2009 ) . â€Å" Detection of Driver Fatigue Caused by Sleep Deprivation † , IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, Vol. 39, No. 4, pp. 694 – 705, [ online ] , Last accessed on 16th September 2010, Available at: hypertext transfer protocol: //www.engr.pitt.edu/electrical/faculty-staff/mao/home/Papers/YMT09_DriverFatigue.pdf [ 20 ] Q. Ji, Z. Zhu and P. Lan ( 2004 ) . â€Å" Real-time Nonintrusive Monitoring and Prediction of Driver Fatigue † , IEEE Transactions on Vehicular Technology, Vol. 53, No. 4, pp. 1052 – 1068, [ online ] , Last accessed on 16th August 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.2.4714 & A ; rep=rep1 & A ; type=pdf [ 21 ] T. D'Orazio, M. Leo, P. Spagnolo and C. Guaragnella ( 2004 ) . â€Å" A Neural System for Eye Detection in a Driver Vigilance Application † , Proceedings of the 7th International IEEE Conference on Intelligent Transportation Systems, pp. 320 – 325, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //pr.radom.net/~pgolabek/its/A nervous system for oculus sensing in a driver watchfulness application.pdf [ 22 ] S. RibariA†¡ , J. LovrencI?icI? and N. PavesI?icI? ( 2010 ) . â€Å" A Neural-Network-Based System for Monitoring Driver Fatigue † , 15th IEEE Mediterranean Electrotechnical Conference, pp. 1356 – 1361. [ 23 ] Y. Liang, M. L. Reyes and J. D. Lee ( 2007 ) . â€Å" Real-time Detection of Driver Cognitive Distraction Using Support Vector Machines † , IEEE Transactions on Intelligent Transportation Systems, Vol. 8, No. 2, pp. 340 – 350. [ 24 ] H. Ma, Z. Yang, Y. Song and P. Jia ( 2008 ) . â€Å" A Fast Method for Monitoring Driver Fatigue Using Monocular Camera † , Proceedings of the 11th Joint Conference on Information Sciences, Atlantis Press, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //www.atlantis-press.com/php/download_paper.php? id=1717 [ 25 ] T. Brandt, R. Stemmer, B. Mertsching and A. Rakotonirainy ( 2004 ) . â€Å" Low-cost Ocular Driver Monitoring System for Fatigue and Monotony † , 2004 IEEE International Conference on Systems, Man and Cybernetics, Vol. 7, pp. 6451 – 6456, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.93.1899 & A ; rep=rep1 & A ; type=pdf [ 26 ] M. Saradadevi and P. R. Bajaj ( 2008 ) . â€Å" Driver Fatigue Detection utilizing Mouth and Yawning Analysis † , International Journal of Computer Science and Network Security, Vol. 8, No. 6, pp. 183 – 188, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //paper.ijcsns.org/07_book/200806/20080624.pdf [ 27 ] N. G. Narole and P. R. Bajaj ( 2009 ) . â€Å" A Neuro-Genetic System Design for Monitoring Driver ‘s Fatigue † , International Journal of Computer Science and Network Security, Vol. 9, No. 3, pp. 87 – 91, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //paper.ijcsns.org/07_book/200903/20090311.pdf [ 28 ] C. Trautvetter ( 2005 ) . â€Å" Software Scheduling Tool Fights Crewmember Fatigue † , Aviation International News, [ online ] , Last accessed on 20th September 2010, Available at: www.novasci.com/AIN-JL05.pdf [ 29 ] M. Divjak and H. Bischof ( 2009 ) . â€Å" Eye Blink Based Fatigue Detection for Prevention of Computer Vision Syndrome † , IAPR Conference on Machine Vision Applications, Keio University, Hiyoshi, Japan, [ online ] , Last accessed on 20th September 2010, Available at: hypertext transfer protocol: //www.icg.tugraz.at/Members/divjak/prework/MVA_2009_presentation % 20- % 20Divjak.pdf [ 30 ] S. Matsushita, A. Shiba and K. Nagashima ( 2006 ) . â€Å" A Wearable Fatigue Monitoring System – Application of Human-Computer Interaction Evaluation † , Proceedings of the seventh Australasian User Interface Conference, Vol. 50, [ online ] , Last accessed on 17th September 2010, Available at: hypertext transfer protocol: //crpit.com/confpapers/CRPITV50Matsushita.pdf [ 31 ] G. Yang and T. S. Huang ( 1994 ) . â€Å" Human Face Detection in Complex Background † , Pattern Recognition, Vol. 27, No. 1, pp. 53 – 63. [ 32 ] C. Kotropoulos and I. Pitas ( 1997 ) . â€Å" Rule-Based Face Detection in Frontal Views † , Proceedings of the International Conference on Acoustics, Speech and Signal Processing, Vol. 4, pp. 2537 – 2540, [ online ] , Last accessed on 16th October 2010, Available at: hypertext transfer protocol: //poseidon.csd.auth.gr/papers/PUBLISHED/CONFERENCE/pdf/Kotropoulos_ICASSP97.pdf [ 33 ] M.-H. Yang, D. J. Kriegman and N. Ahuja ( 2002 ) . â€Å" Detecting Faces in Images: A Survey † , IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, No. 1, pp. 34 – 58, [ online ] , Last accessed on 16th August 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.63.7658 & A ; rep=rep1 & A ; type=pdf [ 34 ] S. A. Sirehoy ( 1993 ) . â€Å" Human Face Segmentation and Identification † , Computer Vision Laboratory, Center for Automation Research, University of Maryland, [ online ] , Last accessed on 25th October 2010, Available at: hypertext transfer protocol: //drum.lib.umd.edu/bitstream/1903/400/2/CS-TR-3176.pdf [ 35 ] T. K. Leung, M. C. Burl and P. Perona ( 1995 ) . â€Å" Finding Faces in Cluttered Scenes utilizing Random Labelled Graph Matching † , Proceedings of the fifth International Conference on Computer Vision, Cambridge, Massachusetts, U.S.A. , [ online ] , Last accessed on 25th October 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.34.8710 & A ; rep=rep1 & A ; type=pdf [ 36 ] C.-C. Han, H.-Y. M. Liao, K.-C. Yu and L.-H. Chen ( 1996 ) . â€Å" Fast Face Detection via Morphology-based Pre-processing † , Proceedings of the 9th International Conference on Image Analysis and Processing, Florence, Italy, [ online ] , Last accessed on 25th October 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.29.4448 & A ; rep=rep1 & A ; type=pdf [ 37 ] K. C. Yow and R. Cipolla ( 1996 ) . â€Å" Feature-Based Human Face Detection † , Image and Vision Computing, Vol. 15, No. 9, pp. 713 – 735, [ online ] , Last accessed on 24th October 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.28.5815 & A ; rep=rep1 & A ; type=pdf [ 38 ] V. Manian and A. Ross ( 2004 ) . â€Å" A Texture-based Approach to Face Detection † , Biometric Consortium Conference ( BCC ) , Crystal City, VA, [ online ] , Last accessed on 26th October 2010, Available at: hypertext transfer protocol: //www.csee.wvu.edu/~ross/pubs/RossFaceTexture_BCC04.pdf [ 39 ] T. D. Rikert, M. J. Jones and P. Viola ( 1999 ) . â€Å" A Texture-Based Statistical Model for Face Detection † , Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, [ online ] , Last accessed on 26th October 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.32.8916 & A ; rep=rep1 & A ; type=pdf [ 40 ] V. Vezhnevets, V. Sazonov and A. Andreeva ( 2003 ) . â€Å" A Survey on Pixel-Based Skin Color Detection Techniques † , GRAPHICON-2003, pp. 85-92, [ online ] , Last accessed on 24th October 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.5.521 & A ; rep=rep1 & A ; type=pdf [ 41 ] D. Brown, I. Craw and J. Lewthwaite ( 2001 ) . â€Å" A SOM Based Approach to Skin Detection with Application in Real Time Systems † , Proceedings of the British Machine Vision Conference, [ online ] , Last accessed on 27th October 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.16.2675 & A ; rep=rep1 & A ; type=pdf [ 42 ] M. Soriano, B. Martinkauppi, S. Huovinen and M. Laaksonen ( 2000 ) . â€Å" Skin Detection in Video Under Changing Illumination Conditions † , Proceedings of the fifteenth International Conference on Pattern Recognition, pp. 839 – 842, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download ; jsessionid=751F3CF514D95B2D7C8C425A1753714B? doi=10.1.1.16.2582 & A ; rep=rep1 & A ; type=pdf [ 43 ] N. Oliver, A. P. Pentland and F. Berard ( 1997 ) . â€Å" LAFTER: Lips and Face Real Time Tracker † , Proceedings of the 1997 Conference on Computer Vision and Pattern Recognition, pp. 123 – 129, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.50.9491 & A ; rep=rep1 & A ; type=pdf [ 44 ] J. Yang, W. Lu and A. Waibel ( 1998 ) . â€Å" Skin Color Modelling and Adaptation † , Proceedings of the Asian Conference on Computer Vision, pp. 687 – 694, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.44.8168 & A ; rep=rep1 & A ; type=pdf [ 45 ] L. Mostafa and S. Abdelazeem ( 2005 ) . â€Å" Face Detection Based on Skin Color Using Neural Networks † , Proceedings of the 1st International Conference on Graphics, Vision and Image Processing, Cairo, Egypt, pp. 53 – 58, [ online ] , Last accessed on 24th October 2010, Available at: hypertext transfer protocol: //www.icgst.com/GVIP05/papers/P1150535113.pdf [ 46 ] R.-L. Hsu, M. Abdel-Mottaleb and A. K. Jain ( 2002 ) . â€Å" Face Detection in Color Images † , IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, No. 5, pp. 696 – 706, [ online ] , Last accessed on 30th August 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.33.4990 & A ; rep=rep1 & A ; type=pdf [ 47 ] J. Ahlberg ( 1999 ) . â€Å" A System for Face Localization and Facial Feature Extraction † , Technical Report, no. LiTH-ISY-R-2172, Linkoping University, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.43.7504 & A ; rep=rep1 & A ; type=pdf [ 48 ] D. Chai and A. Bouzerdoum ( 2000 ) . â€Å" A Bayesian Approach to Skin Color Classification in YCbCr Color Space † , IEEE TENCON 2000, Vol. 2, pp. 421 – 424, [ online ] , Last accessed on 13th November 2010, Available at: www.se.ecu.edu.au/~dchai/public/papers/tencon2000.pdf [ 49 ] S. J. McKenna, S. Gong and Y. Raja ( 1998 ) . â€Å" Modeling Facial Colour and Identity with Gaussian Mixtures † , Proceedings of Pattern Recognition, pp. 1883 – 1892, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.34.902 & A ; rep=rep1 & A ; type=pdf [ 50 ] L. Sigal, S. Sclaroff and V. Athitsos ( 2000 ) . â€Å" Estimation and Prediction of Evolving Color Distributions for Skin Segmentation Under Changing Illumination † , Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 152 – 159, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.1.9735 & A ; rep=rep1 & A ; type=pdf [ 51 ] L. Jordao, M. Perrone and J. P. Costeira ( 1999 ) . â€Å" Active Face and Feature Tracking † , Proceedings of the tenth International Conference on Image Analysis and Processing, pp. 572 – 576, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.33.893 & A ; rep=rep1 & A ; type=pdf [ 52 ] L. Fengjun, A. Haizhou, L. Luhong and X. Guangyou ( 2000 ) . â€Å" Face Detection Based on Skin Color and Template Matching † , Proceedings of the 1st International Conference on Image and Graphics, [ online ] , Last accessed on 14th November 2010, Available at: hypertext transfer protocol: //202.197.191.206:8080/44/course/chap03/sourse/colorfacedetect.pdf [ 53 ] S. T. Y. Ping, C. H. Weng and B. Lau, â€Å" Face Detection Through Template Matching and Color Segmentation † , Stanford University, [ online ] , Last accessed on 14th November 2010, Available at: hypertext transfer protocol: //www.stanford.edu/class/ee368/Project_03/Project/reports/ee368group04.pdf [ 54 ] A. L. Yuille, P. W. Hallinan and D. S. Cohen ( 1992 ) . â€Å" Feature Extraction from Faces utilizing Deformable Templates † , International Journal of Computer Vision, Vol. 8, No. 2, pp. 99 – 111, [ online ] , Last accessed on 14th November 2010, Available at: hypertext transfer protocol: //www.ittc.ku.edu/~potetz/EECS_741/SuggestedReadings/Lecture_14_Yuille_DeformableTemplates_IJCV92.pdf [ 55 ] A. Lanitis, C. J. Taylor and T. F. Cootes ( 1995 ) . â€Å" An Automatic Face Identification System Using Flexible Appearance Models † , Image and Vision Computing, Vol. 13, No. 5, pp. 393 – 401, [ online ] , Last accessed on 14th November 2010, Available at: hypertext transfer protocol: //www.bmva.org/bmvc/1994/bmvc-94-006.pdf [ 56 ] T. F. Cootes, A. Hill, C. J. Taylor and J. Haslam ( 1994 ) . â€Å" The Use of Active Shape Models For Locating Structures in Medical Images † , Image and Vision Computing, Vol. 12, No. 6, pp. 355 – 366, [ online ] , Last accessed on 15th November 2010, Available at: hypertext transfer protocol: //www.sci.utah.edu/~gerig/CS7960-S2010/handouts/ivc95.pdf [ 57 ] H. A. Rowley, S. Baluja and T. Kanade ( 1998 ) . â€Å" Neural Network Based Face Detection † , IEEE Transactions On Pattern Analysis and Machine intelligence, Vol. 20, No. 1, pp. 23 – 38, [ online ] , Last accessed on 4th December 2010, Available at: hypertext transfer protocol: //citeseer.ist.psu.edu/viewdoc/download? doi=10.1.1.110.5546 & A ; rep=rep1 & A ; type=pdf [ 58 ] M.-H. Yang, D. Roth and N. Ahuja ( 2000 ) . â€Å" A SNoW-Based Face Detector † , Advances in Neural Information Processing Systems 12, MIT Press, pp. 855 – 861, [ online ] , Last accessed on 4th December 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.41.152 & A ; rep=rep1 & A ; type=pdf [ 59 ] N. Rizzolo ( 2005 ) . â€Å" SNoW: Sparse Network of Winnows † , Cognitive Computation Group, Department of Computer Science, University of Illinois at Urbana-Champaign, 2005, [ online – presentation ] , Last accessed on 5th December 2010, Available at: hypertext transfer protocol: //cogcomp.cs.illinois.edu/tutorial/SNoW.pdf [ 60 ] N. Littlestone ( 1988 ) . â€Å" Learning Quickly when Irrelevant Attributes Abound. A New Linear-threshold Algorithm † , Machine Learning 2, Kluwer Academic Publishers, pp. 285 – 318, [ online ] , Last accessed on 5th December 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.130.9013 & A ; rep=rep1 & A ; type=pdf [ 61 ] E. Osuna, R. Freund and F. Girosi ( 1997 ) . â€Å" Training Support Vector Machines: An Application to Face Detection † , Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 130 – 136, [ online ] , Last accessed on 5th December 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.9.6021 & A ; rep=rep1 & A ; type=pdf [ 62 ] P. Viola and M. Jones ( 2001 ) . â€Å" Rapid Object Detection utilizing a Boosted Cascade of Simple Features † , Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 511 – 518, [ online ] , Last accessed on 5th December 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.137.9386 & A ; rep=rep1 & A ; type=pdf

Saturday, November 9, 2019

IT Outsourcing Essay

Today’s market place continues to shrink due to computer technologies and communication being at the speed of light. This makes the act of doing business on a large scale not only possible but expected. An organization needs implementation of outsource strategy to happen on every level within the company structure in order to function. Many factors contribute to a company’s success or failure. Company is defined by more than just its product or service and the price at which this product or service is sold in the market place. An effective organization has much strength in its favor to remain competitive. Factors such as: flexibility, creativity, openness to use of technology and innovations, communication across the organization and talented employees are a must for competitive advantage. It is an organization’s ability to adjust to changing times that creates a foundation for the public to admire. How an organization continues to reflect such a persona is entirely contingent on so many factors but really it comes down to vision and action. Integrity is crucial. Upholding the company’s value system and word to the public remains a key facet for success. Building any strategy or campaign on this premise presents the best possible and true corporate image to the public and allows for a great amount of trust to form. Building character and trust is very important within the financial world but also the retail forum of health products because there has been a backlash due to corporate lack of governance and scandal but also telecommunications is much like a double-edged sword. With the wrong image, comes poor press and lack of a first impression. It can make or break the situation. In this respect, outsourcing can be a complex game. In order to better understand customers, it is important one understands how marketing works. This means not only having knowledge of traditional methods but also knowing the fundamentals of e-marketing and e-commerce. Today’s Internet is a triumph for human ingenuity and spontaneous order. In some parts it embodies leading edge technology like Asynchronous Transfer Mode but really it is the use of new technologies combined with older ones that makes the Internet so fascinating and vital to business. Specifically the Internet ends distance limitations and it empowers individuals in important new ways to create new enterprise (Gasman, 2005, p. 2). The Internet is relatively vast in its freedom. Unlike the traditional telephone, the Internet is not charged by the mile or any distance. This brings people together. Retailers see the Internet as a marketing tool they can use to target a smaller, regional niche market. One must understand it is in the best interests of companies to make the e-retailing transitions because of the fact that most shopping now happens online. This is due to the increase in e-commerce and instant need for convenience. E-commerce makes purchasing easier and faster. It fits into the lifestyle of today’s 24/7 world where people do not have the time to shop at the mall or pay bills by writing out checks. Statement of the Problem The subject of IT outsourcing and e-business strategy in China’s pharmaceutical industry, its frameworks, convenience and also problems or implications were assessed in this research. As a result of this study, this research presented preliminary findings related to IT outsourcing in China. This leads us to looking at how e-strategy and use of the Internet to facilitate outsourcing has created a whole industry of service for the consumer or in other words, e-services. This required a look at different models to assess strategy and analysis a company’s role in the market. Purpose of the Study The overall purpose of this paper and study is to investigate the role of IT outsourcing within a Chinese drug company. This lead to further study of its use within the health industry in China. As growing importance in an organization’s competitive advantage and globalization makes an Internet presence an expectation, the right marketing strategy becomes all the more important in a company overall strategy but it also equals power. An organization needs careful research prior to investment but also needs to strategize and ponder if the consumer is worth the profit. This paper will look at how a proactive strategic analysis allows an organization knowledge of the market in order to build a lasting presence and customer relationships. This paper will also explore the implications of outsourcing. Review of Related Literature Information Technology is a powerful means that helps organizations meet the challenges of a competitive market environment and enable the firms to stay ahead of the competition. The information revolution is exerting substantial effects on the structure and functions of organizations. From the beginning of the computing era various studies have been made that predicted several positive effects ensuing from the implementation of information technology (IT) (Cash & Konsynski, 1986). Many cases have been published, as well as articles in the professional press, which predicted a net increase in business results of companies that invested more in IT (Buday, 1986). However, during the little more than 10 years of this research line, contradictory results have been found From the 1970s to 1980s, those companies that invested more in IT suffered a relative setback in the work factor productivity indexes. This paper will discuss the relationship between IT and competitive advantage in following content. We believe that IT is necessary to improve competitive position of the organization. Many business professionals point to the use and deployment of IT as a point of weakness, not a point of strength in their organizations. They think that the reason for this is often that IT is being driven from a technical perspective, not from a business perspective. This phenomenon exists because many businesspeople think that the IT is too complicated, too expensive, too risky and too changeable. They would not like to spend time on understanding the complex information technology management. Most businesspeople only understand how specific technologies affect their ability to do their specific jobs. Poorly understand IT initiatives often end in failure. The previous literatures reveal that IT brings huge impact on careers and information technology has impacted many jobs such as IT has replaced human labor and many organizations no longer pay people to simply oversee others and pass along information. The business benefits that are derived from the strategic use of technology are significant, but they are accompanied by risks that must be addressed. The failure to address IT vulnerabilities within their own organizations and throughout the supply chain can have devastating consequences for business operations. China and Outsourcing To this day, the country of China remains an enigma, isolated from the Western world and shrouded in mystery conceptualized by the Communist Red. Its culture both ancient and modern fascinates one on many levels mainly because it is so completely foreign. Aspects of their way of life, customs and lifestyle elements mirror the Communist doctrines and the absence of pure freedom seems sad to Westerners. Still slowly China is opening its doors to the West. There is a changing tide, a force at work. It is the advent of globalization, mass communication and new technologies that changed the atmosphere of China. The world is forever shrinking due to the marketplace is growing at the speed of light and commerce taking place over new mediums. This makes possibility happen. People from every nation have yearned to participate in this explosion. The Chinese have been no exception. They have reached a point in their history where they must not only hold on to their cultural identity but also embrace change from outside. This has been the only way to take advantage of globalization and create a new persona for China. Still the seed of change had to grow from somewhere. This transformation did not happen over night. It can be difficult and frustrating for one to understand yet try to respect. It is out of understanding what one fears that one can be a catalyst for change. Only then can the barriers come down. Much of the emergence of globalization can be attributed to the world economy. China has made steps of change within recent years and as a result found itself at the forefront of economic explosion. At this time the Chinese economy is growing at the rate of ten percent a year, faster than any other country in the world (Richardson, 2005, p. 1). As a result, the region of the Pacific Rim and more specifically South East Asia is considered an emerging market, one that many international corporations are focused on gaining a competitive advantage. This industry of health food and vitamins is no exception. Due to vast changes in available technologies, it is expected and imperative that all companies have an Internet presence or utilize a global e-strategy that involves their business practices to evolve into e-commerce. Two Models This project utilizes two models to analyze IT outsourcing. The models are as follows: (1) Kurt Lewin’s Force Field Analysis theory and (2) SWOT. These two models and others like them assist management and strategists in understanding a company’s standing within the market place. By assessing a company’s strengths and weaknesses or forces at work within a market or organization, one can have a better idea of which areas need attention. Force Field Analysis Theory  Field theories really took the basic form of the fluid mechanics developed in the eighteenth century, in which equations linked a â€Å"flow† or potential for transmitted force to spatial coordinates, but applied this form to situations where no fluid could be found; examples are motion induced by gravity, electricity, or magnetism. I will follow general use and employ the term â€Å"field theory† to denote only those theories that do not involve a clearly existent substantial medium. Lewin’s field theory provides â€Å"a method for â€Å"analyzing causal relations and of building scientific constructs† (p. 01) on several psychosocial concepts involving human actions, emotions, and personality. These psychosocial concepts include human frustration, levels of aspiration, marginality, punishment and reward, and social identity. Lewin’s field theory is built on two constructs (a) human behavior is derived from a combination of mutually interdependent co-existing facts in the life space of individuals, and (b) these coexisting facts have the characteristics of a â€Å"dynamic field,† because â€Å"any part of the field depends on every other part of the field† (p. 87). Using the analogy of â€Å"phase space† in physics, which represents a multitude of factors that might influence events in open systems, Lewin articulated the importance of â€Å"psychological space† in real life. Lewin reasoned that an individual’s life space, including one’s personal characteristics and environmental influences, is an inherent part of the individual’s total situation–momentary and general life situation as perceived by the individua l. He argued that the total situations or fields are more important in studying group behavior because at any given time, individual human behavior, is not only derived from, but is also likely to change, due to the individual’s perception of current situations based on their past cultural orientation, race, status, and experience. To account for such complexities and interdependence of the internal and external factors affecting individuals, Lewin advocated a middle course. By applying these field theory principles to groups in given situations, Lewin observed that it is possible to glean general patterns, underlying relationships, and structural characteristics that can be transposed to other real-world situations. As an example of the field theory principle, Lewin (1997c) advocated the use of a psychological approach to understanding fields that influence individuals and noted that a teacher can never succeed in giving proper guidance to a student if she or he does not learn to understand the psychological world in which that individual student lived. This objective description in psychology actually means describing a situation in its totality–a sum total of facts which makes up that individual. SWOT Assessment It is important to determine the impact a strategy will have on the operations and activities of an organization. The objective is to utilize present technologies and future innovations to plan the future of a company. It is important to allow a flexible framework for strategy to interact within the environment. Further the objective is to gain understanding of the surroundings and behaviors under which they are operating. The key is to create an excellent strategy in which to include within the organizational culture. It is best management remains informed of potential challenges and SWOT allows for clarity. IT Infrastructure and the Practice of Outsourcing As the act of doing business becomes more innovative due to new technologies and high levels of communication, it is surprising that doing business become more complicated and expensive. Is it the factor of elevated expectation and competition from global markets, it is a lack of understanding your own organisation and its cores? Angelo Mozilo believes that outsourcing creates room for improved focus upon core values and it is with the implementation of high speed communication and data systems that enables people to better interact with each other (2002, par. 3). It allows for context to be processed outside the core, only to return when needed. Outsourcing is much like a double-edged sword, it can be seen as a negative as much as a positive. Many believe that it is stealing from American jobs to use cheaper labour sources in countries like India. Timothy Smith surmises that outsourcing has three functions in making organisations more efficient, effective and reduces costs. â€Å"Outsourcing enables organisations to reallocate resources† (Smith 2001, par. 3). This in turn allows the organisation to spend less time on those tasks, saves it money in labour and location by changing focus from survival to enhancing competitive advantage. An organisation can only do this when it becomes people focused. Truly what IT outsourcing does for the business to supplier to the customer relationship is create a new business process that isolates pieces of IT by restructuring the entire segment of the customer’s business. This includes value added improvements in the organisational logic of processes, implementation of best-in-class technology, extensive management and employee training as well as adoption of best practices in the vendor’s field of experience. This may sound like a lot of both monetary and human resource investment but over the long run such implementation will allow the organisation to focus on core rather than context. It goes to show what many successful CEOs would say, â€Å"don’t sweat the small stuff† and this motto will take you to the next level of continual learning and success. Exporting organisations are also seeking ways to lower costs while increasing customer service. A relatively new approach is supply chain management (SCM). Supply chain management differs from traditional materials and manufacturing control in several ways (Burn & Hackney, 2003). First, SCM views the supply chain as a single process. Second, SCM requires strategic decision-making due to its impact on overall costs and market share. Third, supply chain management regards inventories as a mechanism of last resort. Finally, it requires an integrated approach to systems. Integration results in reduced inventory and significant cost benefits (Trunick, 2005). The success of SCM usually involves implementation of an information management system. Still the model is evolving to include new innovations being used as tools. The Amorphous type of chain changes as the company introduces new strategies. This type of model best reflects the continuous flow of ideas and possibilities within the e-commerce construct or Internet medium specifically. It helps anticipate future occurrences. This aids a company’s tracking of Internet use especially when applied to advertising and promotions, as it is known â€Å"the number of businesses utilising the Internet for e-business purposes was significantly low at 28% though an further 33% were actively considering the implementation† (Ritchie & Brindley, 2002, p. 2). The function of procurement within the logistics process is moving to a new plane of sophistication due to new technologies to make the job simpler. Much of it is moving to the platform of the Internet to maximise efficiency and productivity. E-Procurement is now moving from easy-to-automate tasks like invoicing generations to more complex concerns such a E-marketplace implementation, operation and electronic collaboration. Literature suggests that currently focus in on technologies that support E-procurement of direct goods that are mission critical. Also because raw materials that go into production of the finished product many account for â€Å"80 percent of a company’s expenses, the saving derived from implementing E-procurement is compelling† (Thierauf & Hoctor 2003, p. 250). In other words, E-procurement technology offers lower purchase prices to faster fulfilment cycles as well as lower administrative overhead to better control. As a result, companies realise broad, measurable benefits from the implementation of E-procurement. Companies stand to gain even more impressive results from coming generations of the technology that includes connecting to trading exchange with their own industries. This also enables a customer better informed purchases as a company learns to manage production on a daily basis. This means the capability for the supply chain to extend beyond customers and suppliers improves. This also improves the ability for the company to communicate with the customer and the supplier. This leads to new ideas and knowledge about the process as companies and suppliers work in a join environment. Sometimes organisations look to outsourcing inventory as a way to cut costs and speed up the process. GHL will find that by using the Internet as e-strategy that they can achieve multitasking on new levels, allowing for many lines of communication as once. The Internet will allow GHL to tap into a bigger supply base to ensure dependable supply and backup sources. This in turn will reduce the amount it takes to secure shipment of new products. Enterprise Resource Planning (ERP) systems are particularly valuable in new product introduction because it acts as a means of sharing information. Enterprise Resource Planning (ERP) systems are software packages that attempt to integrate the information flow within a company, solving the problem of incompatibility between systems and operating practices. The ERP system will streamline the GHL’s data flows and provide management with direct access to a wealth of real-time information. This is facilitated by the used of database technologies which will link applications together and pass relevant data between them as necessary. Any new information added to one of the system updates the other systems automatically, thus creating complete integration between them (Soh, 2002 and Grandt, 2005). Directory services and middle ware are used in order to connect the applications and provide an infrastructure for users to communicate with each other and connect to the sources of information. There are many benefits and drawbacks to using this method of data transportation. It is important to analyse rather not this will be good fit for a company like GHL. â€Å"A key difficulty is that departments distrust the information provided by another department, be it via an information system or some other mechanism. Therefore checking and cleaning the data should be made an integral part of the implementation† (Bonner, 2002, par. 5). If ERP is integrated with the organisation’s decision-making structure, ERP can begin to deliver business benefits, impacting data delivery levels. Still its success can only be measured by the attitude of the user.