Thursday, May 23, 2019

Music Comparison: Fanny Mendelssohn Hensel and Ludwig Van Beethoven

Music Comparison Fanny Mendelssohn Hensel and Ludwig van Beethoven Inspired by Ludwig van Beethoven and the ideas of Romanticism, the new group of composers in music were born. One composer, Fanny Mendelssohn Hensel, grew to love composing music, like Beethoven. The child prodigies both delighted in learning and performing music at a young age. Hensel learned music from legion(predicate) incompatible teachers, but Beethoven was taught by more kn possess instructors. Although the two composers both lived in Germany, they created very different compositions.While Hensel and Beethoven have many differences between them, there are also similarities, which are sometimes over looked. Music was always a big lineament of both Hensel and Beethovens lives, beginning from when they were children. The composers grew up only four hours away from each other, yet in both households, they were composing music at a young age. The first person to teach Beethoven music was his own father. Hensels f irst teacher her own mother.At the age of twelve, Hensel started writing her own music, while Beethoven was composing by eleven years of age. These composers started writing at a very early age, proving that they are musical geniuses. Considering the many teachers the composers had, it would apologise how they could create such beautiful music. Beethoven had many noteworthy teachers while Hensel was taught by many lesser-known, but just as talented, educators. Once Beethovens fathers teachings had reached its end, he was taught by Gottlob Neefe.Neefe taught mainly the organ and compositions to Beethoven and made a comment saying that If he continues like this, he will be, without a doubt, the new Mozart Although his teachers helped him greatly, Beethoven gave his first performance before any educator had taught him, when he was seven and a half, at Cologne, a large city in Germany. Her parents first taught her what was normally expected from a child, but later Hensel was taught by tutors the aspects of music. Some notable teachers that Hensel studied under were Marie Bigot, Ludwig Berger, and Carl Friedrich Zelter.Hensel only performed at once in public when she was twelve years old, from memory. Although she was very talented, Hensels father demanded that she never play music for a living, but maintain the role of a normal woman in their time. Hensel obeyed her father, but Felix Mendelssohn, her younger brother, was willing to help in her career. Mendelssohn was also musically talented and performed for the courts, sometimes playing Hensels workings that she composed. Once when Mendelssohn was performing for Queen Victoria, she was very impressed and mentioned that the work Italien was her favorite.Mendelssohn then admitted that that was his sisters work. Hensel often composed lieders, bagatelles, fugues, preludes, sonatas, and choral and instrumental ensemble music, present her versatility of music that she could perform and compose. One of her more famo us flora Oratorium nach den Bildern der Bibel was a cantata. Another example of Hensels compositions is one of her lieders, Swan Song. Beethoven, though partially deaf in his late twenties or early thirties, composed chamber music, sonatas, symphonies, songs, quartets and more. He was almost completely deaf when Beethoven wrote his trinity to eighth symphony.Many of Beethovens works are more famous than Hensels, but his most famous symphonies are the fifth and seventh symphonies. The many works that Hensel and Beethoven wrote were different than each others, but Beethoven is often known to help inspire the Romantic period composers. These two composers inspire many others to write and perform music throughout the world. There are many similarities between the two composers, even if Beethoven died only twenty-two years afterwards Hensel was born. The two were great composers and musicians starting in childhood, increasing their noesis of music early on. Though, they did not learn on their own.Many different teachers, composers, and musicians taught and influenced Hensel and Beethoven. These composers prospered greatly in their careers, expanding their knowledge more every day. Although Hensel and Beethoven have passed on, they will both leave a great footprint on music for generations to come. References Anonymous(n. d. ) Music History vision Center. Retrieved from http//academic. cengage. com/music/book_content/049557273X_wrightSimms_DEMO/index. html Anonymous(n. d. ) Facts about Beethoven. Retrieved from http//www. buzzle. com/articles/facts-about-beethoven. html Anonymous(n. d. ) Fanny Mendelssohn Hensel, 1805-1847.Retrieved from http//lcweb2. loc. gov/diglib/ihas/loc. natlib. ihas. 200156440/default. html Anonymous(n. d. ) Biography Beethovens Life. Retrieved from http//www. lvbeethoven. com/Bio/BiographyLudwig. html Estrella, E. (n. d. ) Profile of Fanny Mendelssohn Hensel. Retrieved from http//musiced. about. com/od/famousmusicians1/p/fmendelssohn. h tm? rd=1 Estrella, E. (n. d. ) Profile of Ludwig van Beethoven. Retrieved from http//musiced. about. com/od/classicalmusicians/p/beethoven. htm Estrella, E. (n. d. ) Music of the Romantic Period. Retrieved from http//musiced. about. com/od/historyofmusic/a/romanticmusic. htm? rd=1

Wednesday, May 22, 2019

Vigilance and E-Governance

VIGILANCE AND E-GOVERNANCE Vigilance means watchfullness or to bring awareness. Vigilance came into existence mainly for the purpose of fighting corruption. degeneration involves misuse of power , money ,government property etc. Though corruption cant be brought down to zero level, we can try to bring it as get-go as possible. This can be ensured by watchfulness, caution and vigilance. Or in other words it can be achieved by E-Governance. E-Governance is the use of various upstart information and communication techno logies such as internet, local area net adds, mobile phones,etc. by the government to promote democracy and minimize the corruption level. Simply e-governance is electronic management and electronic controllership. Therefore vigilance and e-governance are required for ensuring corruptionless functioning of any private, public or government organisation. In order to achieve this purpose, govenment has implemented various online services under national e-governance plan like property registration, railway reservation, pensions, passport, visa , company affairs, work records, e-courts, etc.Here we get out discuss some of the examples and we will see how they are proven to be effective, not only for fighting against corruption but also for improving the efficiency, effectiveness and comfortness of public. ONLINE DELIVERY OF LAND TITLES IN KARNATAKA, INDIA Before the computerisation of The Department of Revenue in Karnataka, farmers had to seek the Village Accountant to get a copy of the Record of Rights, Tenancy and Crops(RTC), a document take for many purposes such as obtaining bank loans. But there were unnecessary delays and harassments. Many were forced to pay bribes.Land owners found it difficult to access the village accountant, as his duties entail traveling. The time taken by the village accountant to provide RTC ranged from 3 to 30 days depending upon the size off the bribe. A tyypical bribe for a certificate could range from Rs. 100 to Rs. 2000. If some details were to be written in an ambiguous fashion, out of selfish motives, the bribe could go upto rs. 10,000. Land records in the custody of village accountant were not open for public scrutiny. But after the computerisation of The Department of Revenue in Karnataka, for a fee of Rs. 5 , a printed copy of the RTC can be obtained online at computerised land record kiosks in 140 Taluk offices without any delay or bribe. The software incorporates the bio-logon metrics constitution, which authenticates the users with their fingerprint. A log is maintained of all transaction in a session. This makes an officer accountable for his decisions and actions. The government has also got plans to web-enable the database to make it available for the farmers to receive a copy of the land records locally through an internet kiosk. Although without a signature such a copy will only have an informative value.This scheme is also profitable for preventing lands-scam as all the dat a related to the land is in a common server. COMPUTERISED INTERSTATE CHECK POSTS IN GUJARAT Gujarat has an extensive road network, which carries a banging volume of commercial traffic. Major highway systems link Delhi to Mumbai and provide the pricipal link to the Kandla sea port on Gujarats west coast. Gujarats 10 check posts are positioned at the rebound with three neighbouring Indian states. Nearly 25,000 transport vehicles enter daily through these check posts. most of the trucking companies aim to increase their earnings from each(prenominal) vehicle.Often this has promoted transporters to load their trucks beyond permissible axle load, creating a serious safeety hazard. Without the computerisation, a suspect vehicle is flagged to stop , and then weighed on a weigh bridge dictated away from traffic. The legal penalty for overload is Rs. 2000 per ton. However most of such fines are illegaly negotiated. The problem of corruption was particulaly difficult to attack as the corr upt were O.K. by politicians. In the absence of any systematic inspection of vehicles, the transport companies also adopted various illegal practices.Duplicate copies of a single registration hold up from the Regional Transport Office (RTO) have been used for many different vehicles, using fake license plates. With the computerisation, all check posts are monitored at a central location using video cameras installed at every check post cabin. The video cameras captures the registration number of all trucks approaching the check post. work out processing software converts the video image of the registration number to a digital form and the details of the truck are acessed from a central database.An electronic weigh bridge measures the weight feeds it to the computer, which automatically issues a demand note for the fine. The use of computers and other electronic devices at the 10 remote interstate border check posts in gujarat, has reduced the corruption and significantly increase d the states tax revenue. ONLINE INDIAN RAILWAY TRAIN STATUS AND RESERVATION SYSTEM Before the computerisation system it was very difficult to know the availableness of train seat and reserving without paying money. Even sometimes passengers had to pay additional money inside the train.But after computerisation, the availability of seats can be accessed by anyone through internet. Passengers can even book tickets online. It drastically reduced corruption. Also autoupgradation of passenger tickets increased the revenue to Indian railways and decreased the additional income(bribe) to TTE. WORK PROGRESS MONITORING SYSTEM This software is intensively used in all type of industry to monitor its work progress. This is not directly related with money corruption but it deals with monitoring corruption which includes delaying of projects which indirectly leads to increase the hidden cost of the company.CONCLUSION Thus by deploying some(prenominal) vigilance and e-governance, the level of co rruption has been reduced substantially. But the biggest challenge in deploying e-governance is not technology but the reposition in management. Sudden Management change not only affects the culture but also affects the workflow and the workers. E-governance doesnt mean proliferation of computer and other e-accessories, but is basically a political decision which calls for redress and attitudinal change in officers and employees.

Tuesday, May 21, 2019

The Storm – Kate Chopin

KATE CHOPIN (1850-1904)She was an American author of short stories and novels. She is now considered by some to have been a forerunner of feminist authors of the twentieth century. Chopin was born Katherine OFlaherty in St. Louis, Missouri. Her father, Thomas OFlaherty, was a successful businessman who had emigrated from Galway, Ireland. Her mother, Eliza Faris, was a swell-connected member of the cut community in St. Louis. KatherineShe was the third of five children, but her sisters died in infancy and her brothers (from her fathers first marriage) in their premature twenties.She was thus the only child to live past the age of twenty-five. After her fathers death in 1855, Chopin real a close relationship with her mother, grandmother, and her great-grandmother. She also became an avid proofreader of fairy tales, poetry, and religious onlyegories, as well as classic and contemporary novels.REGIONALISMIn literature, regionalism refers to fiction or poetry that focuses on ad hoc features including characters, dialects, customs, history, and landscape of a particular region. Kate Chopin is considered to be one of the best US Southern regional writers.THE STORMThe behave is a short story by the American writer Kate Chopin, written in 1898. It did not appear in print in Chopins life beat it was published in a volume called The Complete Works of Kate Chopin in 1969. The story is set in the late nineteenth century at Friedheimers repositing in Louisiana, and at the nearby house of Calixta and Bobinot.CHARACTERS Bibi four-year-old son of Calixta and Bobinot Calixta mother of Bibi Bobinot married man of Calixta and father of Bibi. Alcee Laballiere former Calixtas beau (lover).THEMES The main(prenominal) topic in the story is the provokeuality, a topic not publicly discussed in 1898. For this reason, the story was not published during her lifetime. The relationship between Calixta and Alcee holds a degree of passion absent from their marriages. Calixtas inn erity is directly trussed to the squeeze.ANALYSISThe Chinaberry tree being struck by lightning is also representative of Calixtas sin in a Catholic bea, where adultery is considered a sin that is so grave that it sends them to hell unless they repent before they die. 1 2 This musical composition was written at a time when faith was beginning to be questioned. The narrator begins by describing Calixta as a worrisome wife, but, after Alcee notices her for the first time in five years, the description shifts to her youthful beauty. Calixtas husband, the reader assumes, no longer looks at her the way Alcee does. He sees her as a real woman, but she pretends that everything has changes particularly after having a child. After the rain stops the sun was turning the glistening green world into a palace of gems. This could symbolize new outlooks on the two lovers marriages.The point of view is 3rd person omniscient. The story also highlights images of purity. White imagery is introdu ced at the beginning of the second section when Calixta unbuttons her white blouse at the neck. When we see the interior of the house for the first time, the narrator describes the white, monumental bed. When the sexual tension is released, the sexualized purity reaches a climax her neck, exposed by the act of unbuttoning, is white, and her breasts are whiter. She is as white as the couch she post upon, and her passion is described as a white flame. Added to this seemingly paradoxical use of white are the references to the Virgin bloody shame. While Assumption is a place name, it is also the feast that celebrates the bodily ascension of Mary into heaven, a metaphorical description of what has just happened to Calixta, and, to further the connection, her firm, elastic flesh is compared to a creamy lily. The lily is Marys flower.SYMBOLISMThe fall upon The violent storm is a super obvious symbol. Its involved in practically every element of the story. introductory off, its the t itle. Second, it plays a huge role in the plot, forming the beginning and the end of the story. It also plays a really all important(p) part in the middle by bringing Calixta and Alcee together, pushing them into each others arms and giving them the time and space to get physical before the world outside returns to normal. Assumption Assumption is the small townspeople where Calixta and Alcee met up and shared kisses long ago. Its also, tellingly, where they did not give in to their carnal desires completely they never had sex there.The name Assumption has religious connotations that remind us of virginity and chastity. In Christianity, its a reference to a specific event the Virgin Marys ascent to heaven after she dies. Whitenes With all the whiteness mentioned repeatedly throughout the story, The Storm practically reaches Moby-Dick levels. White usually symbolizes purity or chastity, but this story twists it around to represent sexual desire and longing. While this whiteness in literature would traditionally refer to a body that the antheral character couldnt access, that purity is transformed into sexuality here.The flame of Calixtas passion is white her body in all its ecstasy is same a creamy lily. In this story, the color white might almost be better understood as red-hot. It means giving in, not holding back.SUMMARYBobinot and his four-year-old son, Bibi, are at Friedheimers store when a particularly violent storm emerges. The two decide to remain at the store until the storm passes. Meanwhile, back at their house, Calixta is so occupied with her fasten that, at first, she does not notice the ominous clouds or thunder.Finally, she notices that it is growing darker outside and decides to shut the windows and retrieve Bobinots clothes, which are hanging outside. Alcee, one of Calixtas former beaus, rides up on his horse and helps her remove the remaining clothes from the line. The storm worsens and Calixta invites Alcee into her home until it abates . Alcee is hesitant to come in and corset outside until it becomes apparent that the storm is not going to let up. Calixta gathers up the lengths of cotton sheet she had been sewing while Alcee takes a seat in the rocker.Calixta goes over to the window and observes the intensity of the storm and worries about her husband and son. Alcee attempts to comfort her and reminisces about the passion they once felt for each another. As the storm increases in intensity, so does the passion of the two former lovers. Alcee brings up the passion and love they once had for one another. The adulterers sexual rule ends at the same time as the storm. Alcee rides off on his horse. Bobinot and Bibi return from the store and Calixta immediately embraces them.Calixta acts like nothing hadwas happened and she even wants to feast with her husband their way back to home. The story ends with the sentence So the storm passed and everyone was happy symbolizing Calixta and Alcee were happy to have the affair . This is also a good sentence to summarize the safe and sound of the story. When the storm hashave passed they all returned to the normality.BIBLIOGRAPHYhttp//en. wikipedia. org/wiki/Kate_Chopin http//en. wikipedia. org/wiki/The_Storm_%28short_story%29 http//www. katechopin. org/the-storm. shtml

Monday, May 20, 2019

British Philosophy

The European Philosophy that was witnessed in the early to late 17th century is more often than not regarded as the period of enlightenment when the reaction of the empiricists replaced the Rationalists of the early seventeenth century Europe. Introduction The word ism has its origins from the Greek language, which means love for scientific discipline. When first used the word used to integrate every forms of love for education. It is only recently that it started being used to refer to a special branch of interrogative which is distinct from other sciences.(Conway, A. 122) The British philosophical system is part of the Western philosophy that was in rise during the seventeenth century Europe that was characterized by a peculiar manner of living called capitalistic society. (John S. 237) The mode of living was also characterized by various forms of opinion that distinctly reflected the existent living lifestyles. The lifestyle and the thinking there-in is what gave rise t o what is ailing the whole of humanity today.It gave rise to modern-day capitalism or what was referred to as the bourgeois society. (Conway, A. 123) Open social environment that existed in the pre-Revolutionary England heralded the beginnings of the British philosophy. During this period the social conditions were bang-uply influenced by various Empiricists from Britain who included Thomas Hobbes and Francis Bacon and later John Locke who played a significant role during the indemnification Period.The development of Bourgeois thinking in Britain was greatly influenced by the exploitation of natural science which dictum the likes of Isaac Newton the father of modern physics (1642-1727) being one of the most prominent natural scientists from Britain, influenced its growth prior to the nineteenth century before the growth of the industrial revolution. (John S. 235) British Empire is generally ascribe with the development of a bourgeois revolution and was the first to make an ind ustrial revolution. This being the case the British rather than facing the challenges of working through supposition saw the need to accumulate material for theory to work upon instead. (J. H. Muirhead 88) To achieve the revolution, the British realized the only way to challenge the existent of the feudal wisdom that was characteristic amongst the ruling class and achieve political and economic freedom, the only way out was via exploration, science technological advancement, industrial growth and profiteering. (Julian B & Jeremy S 69)The British bourgeois is strongly interrelated with the Empiricist philosophy of the seventeenth century and because it is credited with the great changes that were accomplished by the industrial revolution in Europe, it has the intent to distrust all other theories and instead, depend so much on accumulated observation and experience. (Francois D L 23) Because of this reason the British have not featured prominently amongst the great names in the phi losophy history. British philosophy has not traditionally taken much of an interest in the lives of its great figures (Julian B & Jeremy S 70) The only notable British philosophers are Alan Turing and Bertrand Russell who were Mathematicians others include Adela Pankhurst Juliet Mitchell and Sheila Rowbothan who were British feminists. Conclusion British philosophy therefore did not churn out great philosophers as witnessed in other split of Europe. Nevertheless, it is credited for the development of modern day capitalism that started of during the period of the knowledge paving way to the industrial revolution.Works Cited Conway, Anne The Principles of the most ancient and modern philosophy. Loptson. The Hague Martinus Nijhoff, 1982. P122-123 Francois De Larrard British Philosophy in the 17th and 18th Centuries Thoemmes Press, 1992 p23-45 J. H. Muirhead Contemporary British Philosophy 1953 p 88 John Stuart Brown British Philosophy in the Age of Enlightenment Arnold Publishers. 20 03 p234-237 Julian Baggini, Jeremy Stangroom New British Philosophy The Interviews Routledge (1 May 2002) p69-70

Sunday, May 19, 2019

Luxury brands growth in India Essay

deprivation of quality prodigality space, environment and dearth of high bridle-path or super premium malls is a prime reason for restricted presence of opulence soils in India, thus there is a dire need for modernized and dedicated luxury retail argonas in protected vicinities such as airports, according to a recent ASSOCHAM-KPMG joint contract.Setting up stores in high streets affects luxury retailers profitability due to sky-rocketing rental costs, moreover, high streets argon very cluttered, crowded and are unsuitable due to the absence of exclusive ambience that luxury retail demands, according to a study on Challenges highlighted by luxury retailers in India, jointly conducted by The Associated Chambers of Commerce and Industry of India (ASSOCHAM) and KPMG.The Indian luxury market grew at a healthy rate of 30% to reach $8. 5 zillion in 2013 and is likely to continue growing at a healthy pace of about 20%, and reach $14 billion by 2016 owing to rising number of wealthy pe ople, growing diaphragm class, affluent young consumers and other related factors. Though, India currently enjoys just one-two per cent share in the world-wide luxury market but it is the fifth most attractive market for multinational retailers.Fragmented and alter consumer base in India is another(prenominal) signifi cornerstonet challenge being faced by luxury retailers in India as high net worth individual ( HNI) consumers are not easy to reach, celebrated the ASSOCHAM-KPMG study. sumptuousness injurys need to strategically design their growth plans to tap demand across three categories of HNIs, namely the inheritors (traditionally wealthy) who are habitual spenders the professional elite who are discerning spenders a large segment of business giants (entrepreneurs, owners of petty(a) and medium enterprises) who give up the money but lack appreciation for fine luxury goods be hunting expedition of no front exposure to such products, it added.There is a need for luxury b rands to focus on expansion in the type and nature of products being offered and increasingly adopt innovative marketing plans to tap rapidly evolving consumer behavioral trends, said Mr D. S. Rawat, secretary general of ASSOCHAM while releasing findings of the study. luxuriousness retailers need to plan out of the recess marketing strategies and come up with products that are tailor-made to suit the whims and fancies of varied Indian customers, said Rawat. Luxury is no longer a status symbol but is now a lifestyle and the globular brands need to fast evolve and learn ways to adapt within the topical anaesthetic environment so that they can get accustomed to nuances of the market by understanding the cultural identity of Indian consumers. Lack of policy support is another prominent challenge being faced by luxury brands in India, noted the ASSOCHAM-KPMG study. Despite strong demand momentum, Indian luxury market has not been viewed as policies and regulations amiable for the luxury retailers, the report said. Import duties (20-150 per cent) are relatively higher and this is con spotred as a key grab factor among the international players, who may resist them to frame aggressive growth plans for India, noted the study. Clauses such as 100% foreign direct investment (FDI) in both single and multi-brand retail requires 30% of local sourcing, announced in the liberalized FDI policy in luxury retail in November 2013 could be difficult for the international luxury players to comply with. The duties are manifold ranging from customs duty, counter veiling duty (CVD), special surplus tax, education cess adding to the overall cost, said Rawat.Besides, luxury retail is also affected by the system of uttermost retail price as it applies to custom duties and to cascading after the custom taxes, thereby heavily penalizing foreign brands push button their overall entrance costs by up to 40%. Lack of trained staff is another well-acknowledged challenge facing India n luxury retail industry which requires greater discretion and knowledge on the part of a salesperson, further highlighted the ASSOCHAM-KPMG study. Shortage of skilled labour for the industry is a major cause of concern as it is difficult to make the local workforce understand the heritage and legacy of the brand along with the specific finishes involved in the manufacturing process, said Rawat.In the absence of these requisite skill sets, brands arrest no option but to manufacture in their country of origin lack of skilled workers can also be attributed to the sales function where presentation and interpersonal skills form an integral element for the business. outgrowth prevalence of counterfeit luxury goods and a grey market are also hampering the growth of the industry, noted the ASSOCHAM-KPMG study. Most of these products belong to segments such as apparel, perfumes and accessories, which are usually lower ticket items and can be easily placed in grey channels.Luxury players i n India continue to face supply side issues such as wakeless loopholes pertaining tointellectual property rights, inadequate means to monitor various emerging channels, and a growing number of online portals, among other factors, the study added. A collective, industry wide effort is likely to have a far-reaching impact in dealing with the issue as seen in other industries such as films and music. Awareness and collaboration also needs to be built with authorities, who have experienced major tax revenue losses due to loss of taxes and duties, on how to deal with counterfeits, further suggested the study to counter the growing adventure of counterfeit luxury products.Corrective measures need to be taken to banish the growth of grey luxury goods market in India which results in sizeable revenue losses for firms, said Rawat, and added that a strong legal structure combined with effective framework of intellectual property protection would help prevent dilution of brand image and re duced consumer trust. Measures in form of effective intellectual property enforcement, plugging loopholes in the legal and judicial structure and higher conviction rates can help curb the growth of fake luxury products, said Rawat. Information collected through secondary sources such as internet and local newspapers

Saturday, May 18, 2019

Buyer Behavior & Integrated Marketing

The problems on which this assignment focuses on is how can an organization understand and mould the demands and needs of a consumer by using consumer stopping point making model and the a finish date model which helps an organization define a set sequence in order to plan for its trade and promotional strategy. The connection that has been researched upon in the research paper is Automobili Lamborghini S. p. A that has recently launched its new SUV in the trade which in any case happens to be the branch SUV gondola from the company.The railroad car is known is Lamborghini SUV and there are a great deal of things that need to be taken care of when introducing and market the car in automobile arena. A consumer decision model allow for help the company in order to shape how a particular theme of consumers decides for a particular commodity. What are their preferences, their expectations, how can they be attracted, what is their taste, how well do they memorize a plast ered product, their loyalties to a particular brand, their interpretation from a product or marketing strategy and the knowledge that they possess.A consumer consciously or unconsciously using all these circumstanceors when going to buy a product thus in the case of Lamborghini SUV the consumer will again question himself on the above mentioned grounds (MacKenzie 1986). As springinessn in the research done on the company, the main problems that the company tends to identify from the consumer behavior are 1. What is the product 2. What is the indicate market 3. What are the substitutes 4. How does the price and value for money are correlated 5. Is the product a lavishness item 6. What sort of a decision sequence model can be usedHere is a shortened answer to all of the questions mentioned above. As we all know that the product is a luxury SUV that is being marketed for the first time by the company, the company has to target to a specific group with specific characteristics. Thes e people are supposed to be well to do by having good executive level jobs or ladder businesses and having a family of 2 to 3 persons. This suggests that the targeted customer should be more then 35 years of age but not more than 45 because that goes beyond the sporty and speedy characteristics of the car.The sport and speedy characteristics of the car open two marketing and targeting corridors for the company, that are, 1. executives and managing directors, (as discussed above) and 2. The existing sports cars clients who will then be filtered for having or not having a taste for a sports SUV. The problem is that the product that is in question in the research is quite valuable and thus it is not at all kindred marketing coke. Customers need to be educated and intercommunicate roughly the value and worth of the product that should be other than the actual cost price of the car (Bettman 1975).With reference to Blackwell, Miniard and Engel analytical framework, analyze the likel y buying behavior of your target market, in terms of detail of problem solving, and identify the probable influences on this decision process. You should also identify any issues related to the development processing aspect, as this will inform task 3 With reference to Blackwell, Miniard and Engel, the decision of any consumer is base upon and involves two or more products that are substitutes to each other.For example a consumer might choose amid going out for a movie or staying at home, for this matter going to movie and staying at home will serve to be as substitutes to each other. Similarly, in this of Lamborghini, the consumers have a target of choices. These choices include other sporty SUVs that already in the market by competitor brands like BMW, Mercedes, Chrysler and others. Thus Lamborghini should look into the matter that what do consumers want in an SUV, how and what characteristics they should highlight to attract their customers.Blackwell, Miniard and Engel advoc ate the fact that there are a number of cognitive processes going on in a consumer see while he makes purchase decisions. These cognitive decisions can be identified as consumer knowledge about the market and the product, beliefs and memories about teaching that a consumer gathers from marketing and promotional activities going on around them, their cognitive process of comprehension and lastly their integration cognitive process in which a consumer evaluates two or more choices and short lists to one final choice.This choice is made on the basis of certain behavioral decisions, thus the decision making process of a consumer can also be regarded as their decision plan. A Cognitive Process Model of Consumer Decision Making Lamborghini should keep in mind that its consumers will gather most of the information from their surroundings. Apart from their own marketing campaign, the consumers consciously and unconsciously are gaining information about the sporty cars, their models, info rmation about other brands, performance of other SUVs that come I the same category of sporty cars and much more.Consumers are exposed to TV shows, magazines, discussions and even get to see these products live at show rooms that they already a lot about the car. However, a seller should always keep in mind that in order to attract a customer and give him what he wants, the product should be marketed in such a way that the consumer directly notices what he wants in the product without him being analyzing and comparing with other brands(Roberts 2000).The marketing campaign should highlight the characteristics of the product itself in the marketing campaign rather than letting the customer gather the information on his own that can also lead to possibilities that the customer may not be able to find those characteristics on his own. Same goes for Lamborghini, the company must market the new SUV in such a way that it highlights both its sporty constitution and its symbol of power of s tatus in order to cater both the target markets that have already been identified in the previous section.

Friday, May 17, 2019

Acknowledgement

Chapter 1 The puzzle and its Background Introduction The term RFID refers to communicate Frequency Identification, a technology which uses intercommunicate waves to automatically nominate items or people. Most comm tho this involves the use of an RFID check off and a sound discoverer doodad. In general terms, communicate Frequency Identification dodges consist of an RFID brand (typically many tags) and an interrogator or reader. The interrogator emits a sphere of electromagnetic waves from an antenna, which be absorbed by the tag. The absorbed energy is apply to power the tags microchip and a signal that includes the tag identification number is sent back to the interrogator.The use of a wireless non-contact carcass that uses radio frequencyelectromagnetic fieldsto direct data from a tag attached to an object, for the purposes of automatic identification and furrowing. Some tags require no battery and are powered and read at short ranges via magnetic fields (electrom agnetic induction). Backround of the Study Tanauan impart has already been using the subroutine program subroutine library system. Since the origin is already using much(prenominal) technology, these lead be the first clock for the institution to use Radio Frequency Identification.The researchers thought of maximizing its use by creating a constitution that go out track the school-age childs who borrowed books, which pull up stakes be having RFID stickers for monitoring purposes, in the library. Currently, the schools library is using the Library System in monitoring the books, which has a number of limitations. It is not assail fit of generating reports that fagful determine the books that are mostly borrowed which slew inspection and repair them decide on the number of a particular book they will be get in the future. It is besides using Micro easygoing Visual Basic for the frames database which pile only insert very limit info.On the other hand, the sy stem that the library is using in recording the att force outance of the drug users cannot help them in identifying the library users of the month. The librarians compulsion to manually count the number of times each student had logged in the system. Lastly, they receive excessively no means of reminding the library users regarding their borrowed book Statement of the Problem Not cap fitting of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding slightly their borrowed books. Manual numeration the number of times each student had logged in the system. Objectives of the StudyGenerally, the researchers bewilder to jut out and develop a system that would enhance the use of the current Library System with the help of RFID in the s incite Institute. Specifically, the story aims to fool and develop a system that will move over reports to determine the trend in book borrowing Use MySQL for the systems dat abase Determine the library users of the month in just a blabber of a freeing Remind the students and faculty members regarding their borrowed books Test and rate the systems accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration.This study limits its insurance goage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart pecker Readers will be employ for the system one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers.Other unavoidable circumstances, such as power interruptions an d speed of recover, and other to a greater extent complicated areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very conciliative and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system.The related foreign and local studies and literature would also be of jumbo aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to cautiously plan the whole study which is going to be the foundation of their research as a whole, fall in and analyze data before they physical body and code the sys tem. After the coding form, the researchers need to test and evaluate their study. If incumbent, modifications should be done to perfect the system. Conceptual ParadigmBelow is the figure of the conceptual paradigm of the study NOTE revise PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE.. Figure 2. Paradigm of the study description of Terms Accuracy is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation anxiety is a division in the library which is in charge of managing the borrowing and the returning of library materials. disposition Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. infobase is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System is the system which will be an aid for monitoring the books and tracking and reminding the bor rowers in a certain library. Radio Frequency Identification is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related literary achievements and Studies A. Related Literature Foreign LiteratureHolloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white idea which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three fundamental pieces of equipment such as (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software program to member the data into valuable information.Daniel (2004) summarizes the operation in a basic RFID system as discussed below First, the ta g will enter the RF field of the Reader then, the RF signal will power the pursue that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), Integrated RFID and Sensor Networks Architectures and Applications, they discussed and differentiate RFID and receiving set Sensor Network (WSN) Technologies.They also discussed why these technologies should be applyed to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have interrupt RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study authorize generative Client Application for RFID EPCIS Repository wherein he make waterd software which intended to provide a UML-like graphi cal delegation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system.Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created empower RFID Based Library Management System which is very similar to the study being conducted by the proponents. In their studys conclusion, they have indicated and proven that RFID in the library speeds up its proceeding such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study authorise Research Trends in RFID Technology wherein they have given attention at move research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, Student course credit Using Radio Frequency Identification for Tarlac Stat e University, which was undertaken to develop a system that would support and correct the current way of identifying students at Tarlac State University.The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can restrain users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and farm animal purposes.Another study which also focused on the record keeping of students who enter and overhaul the school premises is the visualize of RFID Interface System A Prototype conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way t hat the students can also be notified. He also developed software capable of capturing and recording the students name calling in concert with their time of arrival and departure within the school premises. B. Related Studies Foreign StudiesA study of Botterman and Oranje (May 2009) entitled Study on The Requirements and Options For RFID Application in Healthcare proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of relationss, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, Storing and Reading Sensor Data from Battery Assisted Passive RFID, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard.His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being cond ucted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study.Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions accessible ever since it was introduced to the Institute such as securing student identification upon entering the campus and on crinkle grade access of students.This study is in some manner related because both implementation target s are in universities. A study conducted by Balbacal (2005) entitled Automated Bus Fare System is related to the system that the researchers is planning to create. In Balbacals system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the users capability to pay. However, Aquino et. als (October 2009) Automation of the picture show TheaterCharging Procedures Through the Use of RFID proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems & improve charging operations of the system implied on improvement in the efficiency, reliability & accuracy of the operation. level off though the field of implementations of their study and the researchers are not the same, the purposes of both are identical. The researchers want to eliminate the circumlocution in recording the attendance of the students which the existing system is not capable of.In Villames (2010) research entitled Carrier Suppression Locked Loop Mechanism for UHF RFID Readers, he made an improvement on the front-end computer architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the liquidator become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers.This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research figure of speech In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The aspiration is of this method is to acquire accurate and systematic data which are based on facts that can be used i n averages, frequencies and similar statistical calculations.It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on all situation-speci? c problem solving or generalized inquiry actions. SamplingThe researching process will take broadcast at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are presently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The gameary tools will be the related foreign and local literature and studies that the researchers have gathered.Gathering Data The process of the data we gathered is shared into five phases namely Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the systems design will dictate the overall system architecture.If the proponents have inquiries about the system, they can gather and analyze the requirements again. order the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will loo k like. Test the System. To en original that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System.After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification Operating System Microsoft Windows XP or higher Microsoft SQL Sever 2008 or higher Microsoft .Net Framework 4. 0 or higher Windows meshwork Explorer 7 or higher ACS CCID Driver Hardware Specification Memory 2 GB or higher Processor 2. GHz or faster Hard Disk At to the lowest degree 3GB of available space Monitor 1024768 or higher resolution Printer ACR122U NFC Reader Gantt Chart ILAGAY DITO Chapter4 The Proposed SystemUser and need of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the side by side(p) advantages. ? User friendly interface ? Fast access to database ? Less phantasm ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization.Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet get along with but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and ch eck-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service.Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is about 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging trade union movements a lot easier accordingly. Chapter 5 ImplementationProgram exam We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to perceive and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The musical accompaniment has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike.The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components A. Computer an electronic device uses to manipulate data. B. USB Flash Drive is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface.C. Hard Disk wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen & Paper use for writing down the documentation and other important information. E. Internet the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials used for special reference. G. Printer used to provide hard copy of the program code and documentation. All the data which were manipulated passim the process of the study were stored in the computer hard disk drive with back up on several flash drives.Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is alike ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and sys tem were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it.Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities 1.Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and a ccuracy. 4. modify other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the reserve authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and RecommendationSummary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind.Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the systems reliability and the users acceptance. ConclusionThrough months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month.They can now finally be assured regarding the accuracy and reliability of the data ge nerated. The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. The system was able to track whom librarian is accountable for the loss of a returned material. The system was able to help them in reminding the students regarding their unreturned materials. RecommendationsFor the future researchers to improve, the researchers put forward the following Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button Module to Include visitors who dont have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..