Thursday, October 31, 2019

Delegating responsibilities is the key to effective management Assignment

Delegating responsibilities is the key to effective management - Assignment Example ted in many organizations, resulting in role duplication, confusion and overlaps that cause conflicts between members of an organization, and also results in inefficient use of manpower (Rao & Krishna, 2005:412). Thus, possessing the right delegation skills is very important, since poor delegation can be very disruptive and even destructive of an organization. Good delegation is associated with developing people within the organization to achieve their maximum potential, motivating workers and enhancing teamwork. In addition, effective delegation is a prerequisite for grooming the right successor to a management or any other relevant organizational position (Agarwal, 1986:172). This way, delegating responsibilities does not only make the management of an organization very effective, but it also helps in saving both time and resources, which would be applied towards training different organizational members for different leadership positions in the organization. On the other hand, the failure to delegate responsibilities effectively can cause frustration, de-motivation and confusion, which end up in a cycle of organizational conflicts and poorly accomplished tasks (Muir, 1995:6). Therefore, delegating responsibilities is not the key to effective management per se, but the effectiveness with which such delegation is done. This makes delegation skills a very important management skill that is worth improving for the managers (DuBrin, 2012:287). In fact, delegating responsibilities does not only help the management to share tasks and activities and have them accomplished, but is also the basis of the futuristic strategy for succession planning and personal development, and a necessary pre-condition for awarding promotions (Rao & Krishna, 2005:408). In this respect, through effective delegation of responsibilities, the management is able to solve several organizational issues that would require individual investment of time and resources. Thus, delegation is the

Tuesday, October 29, 2019

Three Social Media Aggregators That Bring It All Together Essay Example for Free

Three Social Media Aggregators That Bring It All Together Essay Social media services facilitate connection of people via Facebook, Twitter and Flickr, for example, have opened enormous opportunities for people to interact and share ideas. As Pash (2009) puts it, managing the many updates is not an easy task; hence, must provide a viable way of managing the different social media services. In the article, 3 Social Media Aggregators That Bring It Altogether, Pash (2009) asserts that social media aggregators are the solution to the challenge of managing the different social media services that keep people connected. According to the author, social aggregators are significant in ensuring that there is a single entry point to access one’s social networking sites. This has long-term benefits by enabling one to keep monitoring his social network streams and keeping them in one dashboard. Through this, it will be possible for social network users to establish flexible ways of managing the network sites by categorizing them in terms of importance. People who rely on social media as a communication platform, for instance, business owners will find the concept extremely significant. This is because they have to communicate with their clients and expand their customer base. Through the social aggregator processes, it is possible for business owners to prioritize on their activities and establish long-term connections with clients. On a personal level, the idea of social media aggregation is important in enhancing the ability to monitor social media tools in my jurisdiction. The need to improve communication networks will certainly trigger me to join the social media aggregation exercises. Indeed, this is a valuable way of examining one’s social media influence. Reference Pash, A. (2009). Three Social Media Aggregators That Bring It All Together. Retrieved from: http://www.pcworld.com/article/169515/social_media_aggregators.html Source document

Sunday, October 27, 2019

The History Of Hostel Management Systems

The History Of Hostel Management Systems INTI International University (IIU) is an education institution that has been rapidly improving for the past few years. As the fast increasing student numbers, therefore, to accommodate part of the students studying in the institution, the INTI International University has had to build up more hostels in the campus. INTI International University, Nilai campus got 16 Halls of Residence named after great men who have contributed to the well-being of mankind. All these hostels at present are manage by the accommodation office. Internet connection, Wi-Fi, Resident Fellow, security, facilities and convenient stores are some of the facilities provided for the convenient of the students. Coin-operated washing machines and dryers are also available in every hall of residents. The INTI hostels have provided many types of room such as Single, Twin-sharing, Single with air-con and Twin with air-con. (New INTI, 2009) As is well known, the education institutions are rapidly increasing for the past few years. Therefore, it leads to mushrooming of hostels for the residence of the students who study in these institutions. As the world keep changing with the fast developed information system and information technology, there is a need for the education institutions to apply the information system and information technology in their daily work to improve the workflows and reduce workloads. Hence, there is system appears in managing hostels to avoid the problem when do it manually. System Development The accommodation office in INTI International University currently uses the system which is called Hostel Management System (HMS). This system is software that is being developed to help officers who work in accommodation office in managing various kinds of activities in the hostels. Hostel Management System (HMS) is one of the modules of the Total Campus Management System (TCMS). Unlike the Integrated Library Management Utility (ILMU), HMS is only a module. ILMU is a unique system that management the whole library which is same as the TCMS. TCMS is comprehensive workflow management systems that integrate and manage all key function of work progress. It increases the productivity with real time communication between the front office, administrators, and management. It consist reporting, accounting, financing, examination grade, etc. Hostel Module Hostel management module has features of efficiently and effectively managing the entire residential facility in the institute. It has reducing the staff paper works and improved workflows. This hostel module will keep the updated records of students, lodging, transfer room and other facilities. Hostel Management System (HMS) is a system which helps in managing various activities in the hostel. According to Miss Azlinda Binti Alias (Officer Accommodation Office), the previous system used in INTI is called Room Master. The older systems (Room Master) only perform three single functions for the hostel. That is check-out, check-in and booking. It didnt help the staff very much in the hostel. Many works that also need to do manually by the staff. It required more strength and strain of manual labor needed. For example, the staffs need to go to the finance office to get the list of students who enroll for the semester in order to do the check-in for them. It is because of lacking of data-sharing and availability between finance office and accommodation office. In the previous system, staffs in accommodation office need to record all kind of transactions and processes manually which involves more man power. There are many paper works and duplicate task in data entry. It is difficu lt to handle and store the data. Besides, there is also difficult to update the data while there is always got students move in and move out every semester. With the help of computerized information system, it can reduce the human errors. With the new system, it brings many conveniences to the staff. Thus, it has improving their efficiency and productivity in works. As the mention in above, Hostel Management System (HMS) is a sub module of the Total Campus Management System (TCMS). TCMS has improved communication and data-sharing between the departments in a collaborative environment. There is a link between HMS and TCMS which enable the staff in Accommodation office can access the information needed from the finance office. Yet, TCMS also control the access to data and information based on user roles which means that there is a control over information each user can view or edit. Staffs do not need like before do their work manually. Hostel Management System has helped the accommodation office in saving the human resource as compared to the previous system (Room Master). All the edited information or updated information will show in the HMS immediately. HMS has provides the best service to the accommodation office in managing daily workflows. Through the implementation of Hostel Management System, it has replacing manual system where it able the staff to complete the work more efficient and effectively. The system has helped in managing any problem occurring within the hostel accommodation and avoiding any problem when keying in the detail manually. Therefore, through the usage of this system, they can easily manage the room details, student records, room vacancy details, mess bill calculation, mess expenditure, allocation of room and hostel attendances. Besides, repetition can be easily avoided. It also has reduced that data redundancy and any inconsistency of data. The accommodation office uses Hostel Management System to key in all the details of the students who are staying in the hostels. This system is mainly used to do room bookings, check in and check out of the students and also the payment for the accommodation. Reports in regard to the room allocation, room availability, student transfer and evacuation are provided too. System Functions: Hostel Management System (HMS) has several functions which enable the staffs from accommodation office such as allocate students to the different hostels, reserve the room for the students, control status of rental payment and edit the details of the students modify the student records. Allocating students to the hostels The officers must check the details in an application form of the students and verify it from database to match the application of students. Therefore, when the students are eligible then they are allocated to the hostel. The officers will also allocate the room according the requirements of the students as there are different types of rooms are available. Vacating the room As the students have completed their course In INTI, they will be graduated and vacant their rooms. When the students vacant their room, the officer needs to check whether the room facilities have missing or broken down. If all facilities are completed, accommodation office will return the deposits to the students. Thus, the officers in accommodation office will have to remove the particular student details and records from the student database. This is to ensure there will not be the problem exists when the existing residents records coincide with previous residents. Control status of rental payment Every student who stays in the hostel has to make a rental payment every semester. The rental payment varies by the types of room available. As the students who need to book the rooms every semester, they need to pass up a form and get the invoice from the accommodation office. The officers need to key in details of the students as well as type of room that the student want, the system will eventually know how much the students has to pay for that particular semester for their chosen room. Lastly, the officer needs to process it and print out the invoice for the students to make their payments at the Finance Office. There is a link between the system of Finance Office and Hostel Management System. Besides, officers are also able to check any outstanding payments which have not been made by the students through the processing of the system. Editing the details of the student and modifying the students records As there are new students move into the hostels, they need to register themselves as a residents of the hostels. The officers need to key in the details of the new students who want to move in into the database. Therefore, the officers have to edit the details of the students and modify the student records to ensure the data is updated. Besides, this system also enable staffs of accommodation office to check whether the student have done their room booking or rental payments, it can also check whether if the students are staying in the hostels or not, and it can retrieve records of where the students have stayed before. Maintenance Maintenance of the Hostel Management System (HMS) will only do when the system facing the problem. The systems no need to have a check annually or quarterly. Maintenance always involve system enhancements or corresponding to problems that faced by staffs of accommodation office in the systems operation. According to the officer of the Accommodation office, Azlinda Binti Alias, she says the system is not facing any serious problem until now. Regardless to the update, the system will have update when the Hostel Management System (HMS) doesnt meet the requirement of the Total Campus Management System (TCMS). In this point, Information System Office (INSO) Information Technology Centre (INTC) which is from the INTI International University departments will handle this update. The staff of the Accommodation office only is the end user of the system. They dun know about the technical problem of the system. The entire problem will pass to INSO INTC to handle. Problem that Hostel Management System(HMS) Having There is a problem that Hostel Management System (HMS) is having. From the interview, we know that when the Total Campus Management System (TCMS) is giving a huge amount of staff is using, HMS will be affected. Example like, when the TCMS is jamming because of many people is using its, HMS cant send or received the information from the TCMS. The staffs have to wait the TCMS recover only they can do their works. Future Plan and Recommendation Future plan of the Accommodation office is to create an E-service for the residents of the hostel. The E-services will provide residents an on-line booking room functions. Residents do not need like before do their room booking manually. But due to some problem they are considering, the panning is still waiting to approve. The problem they are considering have many, one of them is they are considering that now a day residents computer skill is very good. They finding a good security for the E-services to provide the system will be hack by the residents.

Friday, October 25, 2019

Wonder Woman: A Symbol of the Feminist Movement Essay -- Wonder Woman,

"William Marston was an unusual man—a psychologist, a soft-porn pulp novelist, more than a bit of a carny, and the (self-declared) inventor of the lie detector. He was also the creator of Wonder Woman, the comic that he used to express two of his greatest passions: feminism and women in bondage."(Berlatsky, 2015) For over 60 years, Wonder Woman has filled the pages of her magazine with adventures ranging from battling Nazis, to declawing human-like Cheetahs. Her exploits thrilled and inspired many young girls, including Gloria Steinem. Through all of this, she has had to pilot her invisible jet through territories that her male counterparts have never had to. She is constantly pulled in two directions; her stories must be entertaining and non threatening to the male status quo, while simultaneously furthering her as the original symbol of 'Girl Power.' She is praised for being an icon of strength to women everywhere, but chastised for wearing a skimpy costume and tying men up, as if she were no more than a male fantasy. No comic book character has had to endure as much scrutiny as Wonder Woman. That's because Wonder Woman represents an entire gender, at a time of important social flux. Although she was created by a man to influence a male audience, Wonder Woman has evolved into an important symbol of the feminist movement. An Amazon is born Shortly after Superman made his appearance in 1939, a noted psychologist by the name of William Moulton Marston wrote an article in Family Circle magazine, praising comic books. According to Les Daniels in Wonder Woman: The Complete History (Chronicle Books, 2000, pp. 22-24), his article caught the eye of M.C. Gains of DC Comics. Gains was so impressed by the article, he hired Marston into a new position at DC Comics. Within a year, at the urging of his wife, Marston set out to create a female superhero. By February 1941, Marston handed in his first script for ‘Suprema: The Wonder Woman.’ (We owe a debt of thanks to whoever dropped the Suprema.) Marston created a unique heroine, based loosely on Greek Mythology. Diana was the Princess of Paradise Island, a mystical place inhabited by Amazons. Her mother, Hippolyte (sometimes referred to as Hippolyta), Queen of the Amazons, wanted a child and petitioned the Goddesses of Olympus to give her one. She was instructed to sculp t a child from clay. When she was done, the... ... nurturing. All the while balancing family issues and fighting against stereotypes. As her comic book moves ahead, Wonder Woman will continue to tackle issues relating to every woman, and even, every human. Works Cited: Berlatsky, Noah. Wonder Woman: Bondage and Feminism in the Marston/Peter Comics, 1941-1948. January 2015. Print. Daniels, Les. Wonder Woman: The Complete History. San Francisco: Chronicle Books, 2001. Edgar, Joanna â€Å"Wonder Woman Revisited†: Ms. Warner Communications: (July 1972) 28-29 Jimenez, Phil. Wonder Woman #172. (Second Series) DC Comics: (August 2001) Kanigher, Robert. Sensation Comics #97. DC Comics: (May-June 1950) Kanigher, Robert. Wonder Woman #204. DC Comics: (January-February 1973) Marston, William Moulten. Wonder Woman Archives, Vol. One. New York: DC Comics 1998, 8-16 â€Å"The New, Original Wonder Woman† Wonder Woman, ABC: November 7, 1975 O’Neil, Dennis. Wonder Woman #177. DC Comics: (July-August 1968) Perez, George. Wonder Woman #1 (Second Series) DC Comics: (February 1987) Thomas, Roy. Wonder Woman #288 DC Comics: (February 1982) Wolfman, Marv. Crisis On Infinite Earths #12 DC Comics: (December 1986)

Thursday, October 24, 2019

Choking in Sports Essay

In 2007, Reeves, Tenenbaum, and Lidor conducted research in order to study what causes talented athletes to often fail to perform to the best of their abilities when placed under stressful situations. The purpose of the study was to discover whether athletes who participate in self-consciousness training adapt to pressure situations better than players who do not. To measure this, the researchers examined â€Å"choking† during kicking a soccer ball with participants of two different skill levels, low-skill and high-skill. The participants had to complete two different tasks, kicking a soccer penalty and a breakaway. They were placed under two pressure situations, both low and high, and the experimenters also had three different training conditions – single task, dual task, and self-consciousness. The high-skill players were members of a NCAA Division 1 women’s soccer team at a southeastern, United States university with at least ten years playing experience. There were 18 participants in the high-skill group ranging from 18 to 22 years of age. The low-skill players were junior varsity girl soccer players from two southeastern high schools. There were 19 participants in this group, ranging from age 14 to age 16. All of these participants were randomly assigned to one of the three training conditions. On the first day of the experiment, participants were told the purpose of the study and were asked to fill out performance information sheets as well as sign informed consents. Participants then warmed up and began performing the simple task of penalty kicks under low-pressure conditions. Before each kick, participants filled out the part of the psychological grid for that kick, and then performed the task. On the second day, the participants were split into two teams and told they would be competing for a prize. They were told that their competition would be videotaped and that a sports psychologist would evaluate their mental performance in front of the goal. The psychological grid was again filled out before each penalty kick. On the third day, the participants completed the complex task (breakaways) under low pressure conditions. On the fourth day, participants were told that the competition involving penalty kicks was unfair and that the competition needed to be replayed but with breakaways. The researchers found that choking occurred in the simple task of penalty kicks, but not in the more difficult task of breakaways. Also, the single-task and dual-task treatments experienced a decrease in performance under high-pressure situations. Meanwhile, participants who underwent self-consciousness training improved their performance under high-pressure situations. Reeves et al. used a repeated measure ANOVA with skill level and treatment as between-subjects factors and pressure condition and task complexity as within-subjects repeated measures on perceived pressure. This ANOVA was used to check for the effect of pressure on the participants, and a significant effect was found (F (1,31) = 32. 32, p < . 001). Repeated measures ANOVAs were also used to assess performance and perceived performance during the shooting tasks. There was a significant interaction of task difficulty and pressure condition on performance such that participants performed the simple task better under low-pressure (M = 12. 63, SD = 3. 35) than under high pressure (M = 11. 17, SD = 3. 24). However, they also found that the more difficult task was performed equally well under low- (M = 11. 08, SD = 2. 64) and high-pressure (M = 11. 25, SD = 2. 90) conditions. A significant interaction was also found between pressure condition and treatment as they affect performance. Participants in the dual-task treatment suffered decreases in performance when shifting from low- to high-pressure situations, whereas participants in the self-consciousness treatment group increased performance. The single-task treatment had the highest decreases in performance from low- to high-pressure situations. Significant interactions were also found between skill level and treatment condition such that low-skill players given self-consciousness and dual task training perceived their performance as higher than those in the single-task condition. However, high-skill players in the self-consciousness treatment perceived their performance as being lowest of all three treatments. Yet another analysis of the data showed a significant interaction between pressure and treatment on perceived arousal and pleasantness levels. One limitation of this particular study is that it only examined the effects of high pressure situations in female soccer players. Although this study did account for differences in skill level, players of a different sport may have had dissimilar results. Also, there may be gender differences when it comes to choking during performance. The authors discussed the possible limitations of this study in the discussion section. There it says, â€Å"Further explanation of what constitutes a simple and complex task under pressure situations and of the ability to generalize to other task types is needed to enhance our understanding of the choking phenomenon. The researchers go on to say that there was no significant difference in skill level shown. The results reported by the experimenters and the discussion section did seem to be consistent in their findings. Using the statistical analysis and results from the ANOVAs, the researchers explained what they found using previous theories on choking in high pressure situations. The results of this study supported the explicit monitoring theory to explain choking under pressure in proceduralized skills. On the other hand, distraction theories explain choking under pressure in cognitive skills. Both of these conclusions were supported by data in the results section of the paper. This study not only has implications for athletes, but for everyday life as well. Athletes should be aware of the pressure they are experiencing in different situations and be able to regulate their arousal when necessary. If an athlete is facing a difficult task under high pressure conditions, they should consider undergoing self-consciousness training to help increase their performance. Similarly, if a student is studying for an extremely difficult exam that will determine whether they pass or fail a course, they should use self-consciousness training to help them obtain the best grade possible. For simple tasks, both athletes and students should realize that being under an increased amount of pressure can result in lower performance. Therefore, when completing mundane tasks, athletes and students alike should decrease their arousal and be under as little pressure as possible to achieve optimum performance. In a study by Wang in 2004, researchers were examining â€Å"dispositional self-consciousness and trait anxiety as predictors of choking in sport. Sixty-six basketball players completed the Self-Consciousness Scale and the Sport Anxiety Scale prior to completing 20 free throws in low-pressure and high-pressure conditions. A manipulation check showed that participants experienced significantly higher levels of state anxiety in the high-pressure condition. A series of hierarchical multiple regression analyses supported the hypothesis that self-conscious athletes were more susceptible to choking under pressure. The best predictors of choking were private self-consciousness and somatic trait anxiety that together accounted for 35% of the explained variance. † If one is self-conscious, they are putting themselves under even more pressure than the situation at hand already is. Therefore, these athletes are already at a disadvantage when it comes to reaching optimum performance. The best athletes in the world have no trouble stepping onto the biggest stage and performing well on a consistent basis. Also, in terms of choking, another factor that seems to be important is how high one’s approach motivation is. Choking is the concept that one performs worse than expected in a situation that carries great importance. This is Michael Jordan hitting a game winner in game six, or Mr. October Reggie Jackson going yard to give the Yankees the lead, or even a young intern at the FBI figuring out the biggest case of his life that makes his career; except it’s not. Choking is bricking that shot, grounding out to the second baseman, and having someone else figure out your case for you and thus getting your promotion. Recent questions have been raised about the major causes of choking. Some believe that â€Å"motivation to avoid failure often may predict choking under pressure† (Jordet 2008). â€Å"In achievement motivation theories, avoidance motivation typically refers to behavior directed by negatively valenced events, whereas approach motivation refers to behavior directed by positively valenced events† (Jordet 2008). People who avoid failure often get worried more and are more likely to perform poorly (choking). People who approach it, are often more confident and have less anxiety and thus, tend to have better performance (Dweck 1988). In this study, the researchers hypothesized that, â€Å"elite performers who are in negative valence situations engage in avoidance behaviors and these behaviors may contribute to low performance† (Jordet 2008). This study uses the high pressure situation of a penalty kick in a soccer match to fill the gap in knowledge on real-world choking. A penalty kick occurs when two teams are tied after two overtime periods. Especially in big games such as the World Cup final, these shots are very high pressure moments. Studies on these shots suggest that the more important the shot, the worse people performed because of elevated stress and anxiety levels. Researchers for the current study hypothesized that players in negatively valenced situations would attempt evading the situation, while players with positively valenced shots would take their time to look at the goal keeper, line up their shot, and take the necessary time to prepare. The negatively valenced shots would have their back turned to the goal keeper and would get the shot over with as quickly as possible (Jordet 2008). The results of this study showed that whether one takes an approach or avoidance motivation can have an effect on whether professional athletes choke under high pressure situations. They found that soccer players especially tended to use avoidance behavior and thus made 30% less shots than with the positively valenced shots (Jordet 2008). Despite prior research that suggested that professionals who choked tended to take longer to shoot, the present study found that the athletes who shot quickly actually performed worse. There are two possible situations. Either, through hurrying up, the athlete is able to time their shot and put it where they want, or they rush their preparation and don’t focus in enough on where they need to place the ball and can therefore choke. Jordet states that more research needs to be done on the relationship between dreading the shot, waiting to shoot, and the result or performance on the shot. Researchers in this study included a neutrally valenced condition in which they found it was most related to the negatively valenced condition. Therefore they concluded that athletes in the positively valenced group simply strive under pressure i. Michael Jordan, etc. Jordan approached failure face to face and more often than not came away successful as a result. It is all dependent on what sort of success and patterns a player has developed over his or her career (Dweck 1988). If a player shows a pattern of stepping up and hitting a key shot, you can expect that he or she will perform better on a big stage because they are self-confident. If I were to perform further research on this subject, I would first attempt to create a model that would help explain the complex reasons for choking while performing tasks during different situations. This would help other teachers, coaches, and researchers use this information to foster the highest level of performance in athletes and others. Another possible direction for these findings is to have three conditions in a study, one in which a participant completes a proceduralized task, one for a cognitive task, and one for a task that is both cognitive and proceduralized. Using this design, I would be able to examine if the two theories interact or if they are separate. Another possible direction for research is to see if low-, moderate-, or high-skilled players are more likely to choke under pressure rather than simply studying the choking habits of just elite athletes. Finally, a personality psychologist could assess if different personality dispositions make an athlete more or less likely to choke than others. With further research and increased understanding of the choking phenomenon, sports psychologists could discover a technique to help decrease the chances of choking under high-pressure situations. This could help improve athletes’ confidence, self-esteem, and performance while competing.

Tuesday, October 22, 2019

Health Insurance Portability and Accountability Act Essays

Health Insurance Portability and Accountability Act Essays Health Insurance Portability and Accountability Act Paper Health Insurance Portability and Accountability Act Paper The Health Insurance Portability and Accountability Act or HIPAA is implemented in organizations belonging to the health care industry to secure electronic medical records and protect the privacy of patients. HIPAA was brought about by much-needed changes perceived in the field of health care with the emergence of the technology age. Since then, health care entities have adapted technologies that will assist them in keeping and storing medical records. Of course the benefits or advantages of technology in the field of health care are undeniable. Medical records stored electronically allow work efficiency and productivity, enhance transfer and storage of information within the health care network, and maximize quality services provided to patients. However, there will always be two sides of the story. Technology has also its disadvantages. Private information may be accessed by external parties and use it for malevolent intent. The design of a network or system run by technology is not flawless. It can be breached by illegally, with thousands of patient information used to falsify documents for profit or other deceitful reasons. Due to these perceived problems that health care organizations might encounter with their adaptation of technological tools, HIPAA provides guidelines or standards in securing electronic records and protecting patient privacy. Although most health care organizations have adapted the concept of HIPAA, statistics prove that most technological tools or systems utilized in health care organizations do not fulfill HIPAA guidelines and standards. Because of this, problems regarding health care organization compliance to HIPAA arise. Dr. Zachary Peterson continues to discuss the law framing the foundation of HIPAA. One particular law supporting the concepts of HIPAA is the necessity to employ information management within the health care organization. This privacy rule is fortified by the security rule which acts as a defense from external risks and threats that might jeopardize its integrity and accountability as an organization that promises patient information confidentiality. To realize these goals and objectives, HIPAA also necessitates the utilization of technological tools that allows accessibility to electronic records whenever needed, privacy and security of confidential information, and the validity or legitimacy of stored information or records. The laws and technology requirements aforementioned should be observed by health care organizations in order to exhibit full compliance with HIPAA. The article was picked out of all the HIPAA article results shown in the web search because it fulfills the requirement of currency of information. Aside from that, the article was well-developed and concise, presenting all important information in an organized fashion. The article does away with extraneous statements and expressions. The expertise of the writer in the field of systems security was persuasive enough to draw interest and evaluative purposes to the article. It ties up issues discussed in the course and outlines the importance of systems security in the field of health care. Furthermore, it provides a fresh perspective of how HIPAA is applied in real life situations as in the author’s field of industry. Although the article concisely discussed the concept of HIPAA and compliance requirements for health care organizations, it failed to discuss comprehensively the major reasons why full compliance of all health care entities is unsuccessful, effects of non-compliance to HIPAA, and recommendations, in an expert’s point of view, on how problems regarding non-compliance should be addressed in order to ensure patient information privacy and maintain integrity and accountability as a reputable health care organization. The article could have exceeded its limited coverage if the speaker addressed these issues. However, the article compensated for its weakness by exhibiting authority, accuracy, objectivity, and currency. This article was published on March 13 this year, eliminating doubts of out-of-date content that fails to provide real time information applicable to current trends and situations in the field of health care. It was published by a CEO of Netspective, but the content of the article was written by Dr. Zachary Peterson. He earned degrees in John Hopkins University for Computer Science and Security Informatics. At present, Dr. Peterson is a Senior Security Analyst. He works for an organization, the Independent Security Evaluators (ISE) that provides information regarding computer security. Dr. Peterson presented the content of the article objectively. He discussed HIPAA, laws, and required technologies clearly, citing both advantages and disadvantages of technology when applied within the context of health care organizations. Although explanations were brief, Dr. Peterson presented all relevant topics that solidify full answers to queries regarding HIPAA, security rule, technology, laws, and compliance. The accuracy of information presented by Dr. Peterson may be tied up with his experience in learning computer systems and informatics in graduate school as well as his experiences as a Senior Security Analyst in ISE. ISE works closely with reputable organizations such as MasterCard and WebEx, to name a few. Since the concepts of security systems have been applied in his field of industry, Dr. Peterson was able to provide accurate information regarding the aforementioned topics. ARTICLE REFERENCE Shah, S. N., (2008), Guest Article: IT Security and Record Management in Healthcare. Retrieved September 10, 2008, from The Healthcare IT Guy. Website: healthcareguy.com/index.php/archives/417

Monday, October 21, 2019

Lee-Enfield Rifle in World War I and II

Lee-Enfield Rifle in World War I and II The Lee-Enfield was the primary infantry rifle used by British and Commonwealth forces during the first half of the 20th century. Introduced in 1895, it was a magazine-fed, bolt-action rifle that replaced the earlier Lee-Metford. Constantly improved and enhanced, the Lee-Enfield moved through a multitude of variants during its service life. The Short Lee-Enfield (SMLE) Mk. III was the principal rifle used during World War I, while the Rifle No. 4 version saw extensive service in World War II. Variants of the Lee-Enfield remained the British Armys standard rifle until 1957. The weapon and its derivatives continued to be used around the world. Development The Lee-Enfield traces it roots back to 1888, when the British Army adopted the Magazine Rifle Mk. I, also known as the Lee-Metford. Created by James P. Lee, the rifle utilized a cock-on-closing bolt with rear locking lugs, and was designed to fire the British .303 black powder cartridge. The design of the action permitted easier and faster operation than similar German Mauser designs of the day. With the shift to smokeless powder (cordite), problems began to arise with the Lee-Metford as the new propellant caused greater heat and pressure which wore away the barrels rifling. To address this issue, the Royal Small Arms Factory at Enfield designed a new square-shaped rifling system which proved resistant to wear. Combining Lees bolt-action with the Enfield barrel led to the production of the first Lee-Enfields in 1895. Designated .303 caliber, Rifle, Magazine, Lee-Enfield, the weapon was frequently referred to as the MLE (Magazine Lee-Enfield) or the Long Lee in reference to its barrel length. Among the upgrades incorporated into the MLE, was a 10-round detachable magazine. This was initially debated as some critics feared that soldiers would lose it in the field. In 1899, both the MLE and the cavalry carbine version saw service during the Boer War in South Africa. During the conflict, problems arose regarding the weapons accuracy and a lack of charger loading. Officials at Enfield began working to address these issues, as well as to create a single weapon for both infantry and cavalry use. The result was the Short Lee-Enfield (SMLE) Mk. I, which possessed charger loading (2 five-round chargers) and vastly improved sights. Entering service in 1904, the design was further refined over the next three years to produce the iconic SMLE Mk. III. Lee Enfield Mk. III Cartridge: .303 BritishCapacity: 10 roundsMuzzle Velocity: 2,441 ft./sec.Effective Range: 550 yds.Weight: approx. 8.8 lbs.Length: 44.5 in.Barrel Length: 25 in.Sights: Sliding ramp rear sights, fixed-post front sights, dial long-range volley sightsAction: Bolt-actionNumber Built: approx. 17 million Short Lee-Enfield Mk. III Introduced on January 26, 1907, the SMLE Mk. III possessed a modified chamber capable of firing the new Mk. VII High Velocity spitzer .303 ammunition, a fixed charger guide, and simplified rear sights. The standard British infantry weapon of World War I, the SMLE Mk. III soon proved too complicated for industry to produce in sufficient numbers to meet wartime needs. To deal with this problem, a stripped down version was designed in 1915. Dubbed the SMLE Mk. III*, it did away with the Mk. IIIs magazine cut-off, volley sights, and rear-sight windage adjustment. British forces with their SMLE Mk. IIIs in the trenches during World War I. Public Domain During the conflict, the SMLE proved a superior rifle on the battlefield and one capable of keeping up high rates of accurate fire. Many stories recount German troops reporting encountering machine gun fire, when in fact they had met trained British troops equipped with SMLEs. In the years after the war, Enfield attempted to permanently address the Mk. IIIs production issues. This experiment resulted in the SMLE Mk. V which possessed a new receiver-mounted aperture sighting system and a magazine cut-off. Despite their efforts, the Mk. V proved to be more difficult and costly to build than the Mk. III. World War II In 1926, the British Army changed its nomenclature and the Mk. III became known as Rifle No. 1 Mk. III. Over the next few years, Enfield continued to improve the weapon, ultimately producing the Rifle No. 1, Mk. VI in 1930. Retaining the Mk. Vs rear aperture sights and magazine cut-off, it introduced a new floating barrel. With tensions in Europe rising, the British began searching for a new rifle in the late 1930s. This resulted in the design of the Rifle No. 4 Mk. I. Though approved in 1939, large-scale production did not begin until 1941, forcing British troops to begin World War II with the No. 1 Mk. III. While British forces in Europe deployed with the No. 1 Mk. III, ANZAC and other Commonwealth troops retained their No. 1 Mk. III*s which remained popular due to their simple, easy to produce design. With the arrival of the No. 4 Mk. I, British forces obtained a version of the Lee-Enfield that possessed the updates of the No. 1 Mk. VIs, but was heavier than their old No. Mk. IIIs due to a longer barrel. During the war, the Lee-Enfields action was utilized in a variety of weapons such as jungle carbines (Rifle No. 5 Mk. I), commando carbines (De Lisle Commando), and an experimental automatic rifle (Charlton AR). Post-World War II: With end of hostilities, the British produced a final update of the venerable Lee-Enfield, the Rifle No. 4, Mk. 2. All existing stocks of No. Mk. Is were updated to the Mk. 2 standard. The weapon remained the primary rifle in the British inventory until the adoption of the L1A1 SLR in 1957. It is still used by some Commonwealth militaries today, though it is more commonly found in ceremonial, reserve force, and police roles. The Ishapore Rifle Factory in India began producing a derivative of the No. 1 Mk. III in 1962.

Sunday, October 20, 2019

Free Essays on Music Changed My Life

Music changed my life There was a time in my life when I paid little attention to music. This time is known as childhood. I was too busy with my Ninja Turtles and G.I. Joes to even think about music. That’s not to say I didn’t listen to it, though. Despite the hideous music we now so affectionately call â€Å"the 80’s† that was playing on the radio stations when a was a child, I still listened. I started paying attention when I was nine years old, and that is when my affliction with music all started. To gain a better understanding of how music has changed my life over the years, we must start from the beginning of my musical learning timeline. When I was nine years old, my mother paid for piano lessons from my neighbor, and I started learning songs right away. I started with the usual beginner’s songs – Mary Had a Little Lamb, Yankee Doodle, and etc. I practiced every day, even though most times I didn’t want to do so. I took piano lessons for about a year and ended up getting through one book, and then baseball started conflicting with my practice time, so I quit my piano lessons. My musical learning did not end here however. The next instrument I picked up was the Trumpet. When I was in sixth grade, the trumpet was all the rage. So, I jumped on the band wagon (no pun intended). I joined the liberty bell band and started taking private lessons. I was 2nd chair by the end of 7th grade, which basically meant I was second best. I still remember the boy who was 1st. He could hit every note on the scale, and his seat was well deserved. When the â€Å"coolness factor† wore off, I quit band and trumpet all together. I guess you could say, the 8th grade clichà © of trying to be cool didn’t include being in band, thus ending my trumpet career. My brother played drums all through high school, and he had a drum kit in his room that I had access to all times. So, after my trumpet playing was over, he started ... Free Essays on Music Changed My Life Free Essays on Music Changed My Life Music changed my life There was a time in my life when I paid little attention to music. This time is known as childhood. I was too busy with my Ninja Turtles and G.I. Joes to even think about music. That’s not to say I didn’t listen to it, though. Despite the hideous music we now so affectionately call â€Å"the 80’s† that was playing on the radio stations when a was a child, I still listened. I started paying attention when I was nine years old, and that is when my affliction with music all started. To gain a better understanding of how music has changed my life over the years, we must start from the beginning of my musical learning timeline. When I was nine years old, my mother paid for piano lessons from my neighbor, and I started learning songs right away. I started with the usual beginner’s songs – Mary Had a Little Lamb, Yankee Doodle, and etc. I practiced every day, even though most times I didn’t want to do so. I took piano lessons for about a year and ended up getting through one book, and then baseball started conflicting with my practice time, so I quit my piano lessons. My musical learning did not end here however. The next instrument I picked up was the Trumpet. When I was in sixth grade, the trumpet was all the rage. So, I jumped on the band wagon (no pun intended). I joined the liberty bell band and started taking private lessons. I was 2nd chair by the end of 7th grade, which basically meant I was second best. I still remember the boy who was 1st. He could hit every note on the scale, and his seat was well deserved. When the â€Å"coolness factor† wore off, I quit band and trumpet all together. I guess you could say, the 8th grade clichà © of trying to be cool didn’t include being in band, thus ending my trumpet career. My brother played drums all through high school, and he had a drum kit in his room that I had access to all times. So, after my trumpet playing was over, he started ...

Saturday, October 19, 2019

Chaos in the Caribbean Case Study Example | Topics and Well Written Essays - 1000 words

Chaos in the Caribbean - Case Study Example In addition, Avey’s responsibilities as the Jamaican government expertise witness involved giving forensic examination and audit assistance. He employed professional examination techniques to carry out an investigation in a way that his findings would be relevant when presented to a court of law (De-Carmoy, 1990). An alert expert witness declaration is essential in any investigation. Avey had an adequate comprehension of the legal course, regulatory and statutory issues of compliance, and pertinent rules of evidence. This made him the most suitable candidate to be appointed by the Jamaican government. Moreover, he investigated evidence that regarded affirmations. This was to determine the evidence association to ascertained criteria performed as required by a court of law. Avey carried out his research on the basis of reliable principles of accounting. This assisted him hastily find out misdealing in Blaise Merchant Bank and Trust Company where finances were lent from a single Blaise financial unit to corporations managed by its main shareholders. In the case involving Century National Bank and its associated financial units, he established dishonesty was the main reason for the issues (McLaughlin, 2006). Question 2 Avey employed professional forensic accounting techniques to investigate the link between Blaise Merchant Bank and Trust Company, Eagle Merchant Bank, and Century National Bank and its associated financial units. Avey may have used source and application of funds technique. This method is utilized when enormous amounts of finances are used for personal gain or growth as a substitute of buying investments or assets. For example, in the Century National Bank and its associated financial unit’s case, the bank used depositors’ money to obtain assets like real estate for the possible personal benefit of the people who managed the financial institutions instead of the benefit of the institutions (McLaughlin, 2006). In addition, the ap plication of funds technique may have been applied in the Eagle merchant Bank case. Here, instead of the depositors’ funds being used for the benefit of the financial institution, the money was misused. This was in connection with the building of a hotel that was intended as an apartment complex with 130 room suites. Avey may also have used analytical tools during his investigation. Forensic accountants make use of trending to examine financial numbers within a period (De-Carmoy, 1990). Trending entails performing indicators ratio analyses, for example, working capital and inventory turnover to ascertain deceitful financial statements. Avey used trending to detect self-dealing in Blaise Merchant Bank and Trust Company. In this case, finances were given out from a sole Blaise financial unit to corporations managed by key shareholders. Donald Panton and his wife’s funds were utilized to finance the institution’s owners businesses. Question 3 The troubles in the fi nancial sector began when Blaise Merchant Bank and Trust Company was temporarily managed by the Finance and planning minister.

Friday, October 18, 2019

Should gay coupels be allowed to adopt children Term Paper

Should gay coupels be allowed to adopt children - Term Paper Example Proponents of child adoption by gay couples say that children adopted by gay couples display development similar to other children. This is not true. Children lack the presence, love, affection, and presence of the parent of the non-existent gender throughout the developmental process. If it is a male gay couple, the child is denied the love of a mother. If it is a female gay couple, the child is denied the affection and guidance of a father. This creates voids and grey areas in the child’s mind about the roles and responsibilities of the non-existent parent, and this subjectivity of concepts affects the child’s relationships with friends in the childhood, and with spouse and children in the adulthood. Proponents of child adoption by gay couples say that children adopted by gay couples can live a normal social life. This is very untrue. Gay couples promote gay culture. Gay culture is essentially a subculture adopted by a particular community within the society, whereas the larger part of the society comprises heterosexual couples, many of which condemn homosexuality to the extent of abhorrence. In such a conservative society, being part of a gay family may be extremely traumatic and inconvenient for the children. The children given to gay couples are at huge risk of violence, mockery, and bullying. Children raised in such families are made fun of and their views of their parents’ questionable sexual orientation are readily asked. Repeated occurrence of this encounter may yield life-long negative consequences for the children. These children are made to feel different and isolated from the larger population of children which live in the nuclear family systems. Proponents of child adoption by gay couples say that gay couples can take care of the adopted children like their own children. The fact is that the children are

The Importance of Nursing Research in Clinical Practice Essay

The Importance of Nursing Research in Clinical Practice - Essay Example The importance of research in clinical practice is that it provides analysis used to guide nursing profession. Clinical nursing research is based on the problems arising from the practice. Nursing research is conducted on patients facing real problems and the analysis gives chances of solving the problems through the upgrading of nursing care. There are two types of research that is basic and applied research. The basic research is undertaken to enlarge the foundation of understanding in the profession, produce or improve a theory. On the other hand, the applied research seeks to find solutions to existing problems. The research develops and supports clinical practice through recognition, exploration, prediction, explanation, description, and control of problems in the nursing practice (Polit & Beck 2004:18). The nurses in practice are expected to have immense knowledge and apply research and base their practice on evidence-based research. The evidence-based practice is the applicati on of the best evidence from research carried out by other health professionals and nurses to make patient care decisions. The nursing decisions based on evidence-based analysis are clinically suitable, cost-effective and results to positive patient outcomes (Polit & Beck 2014:3).A qualitative research is a wide word that covers various techniques and thoughts hence its complex nature. It is an approach that permits the study of people’s encounters in depth, by employing a particular set of research techniques.

How East-Asian Martial Films Have Influenced Hollywood Cinema Literature review

How East-Asian Martial Films Have Influenced Hollywood Cinema - Literature review Example This genre has been known to incorporate richly detailed choreographed action scenes with high-flying kicks and martial art techniques. When it was first seen in Asia, it was far-removed from the American film genre and style. However, it soon became a common feature in the Hong Kong film industry (Michallet-Romero, 2003). While trying to preserve the traditional stories of Chinese heroes, Hong Kong film directors translated martial arts techniques into film and in the process influenced the Hollywood film industry. The Wuxia tales in Chinese history were representations of male and female sword masters who represented much heroism in their actions (Garnet, 1999). These tales of heroism were developed in an era dominated by Confucianism and the teachings of this religion. Confucius was very much focused on loyalty, obedience, and on fulfilling one’s duty to one’s family. The father was considered the head of the household and as such total respect was owed him by the re st of the family (Morgan, 2001). Confucius also advocated the belief that those who were stronger must protect the weak, the aged, and those who were unable to defend themselves. Confucius also supported the ideal leader, ordering his warriors to live their lives with dignity and with valour. From these teachings grew wuxia literature. This literature was also enriched by the stories of the Buddhist religious leader Siddartha Gautama (Michallet-Romero, 2003). Buddha’s teachings incorporated philosophical beliefs to the wuxia tales and also advocated the idea of alleviating the sufferings of man. Physical disciplines were later associated with Buddhism and Confucianism and these movements were meant to enhance a person’s chi, which is considered to be the life force of all beings (Michallet-Romero, 2003). ... iplines were later associated with Buddhism and Confucianism and these movements were meant to enhance a person’s chi, which is considered to be the life force of all beings (Michallet-Romero, 2003). From these movements Kung Fu would soon evolve. The Wuxia tales presented the image of the hero – either male or female – as one who is able to wield a sword skilfully, travelling to distant lands and carrying out heroic deeds in defence of the powerless and the weak. These heroes were often known to travel alone, exemplifying their strong skills in martial arts and sword play (Desser, 2002). The relationship of master and student within these stories were also apparent. The wuxia tales also presented the virtues of justice, valour, and sacrifice for the greater good of the people. The protagonists were also usually of common lineage and with skill and training gained much prestige (Birrell, 1999). This protagonist was very much different from the protagonists portra yed in Western stories where the heroes were often of noble blood. Wuxia folklore eventually made its way into the common and the noble people of China and these stories were retold with slight changes in their characterizations, making them darker and flawed and somehow representing a danger to those who were weak. Due to these changes in their characterization, the heroes were often made to confront their dark side as well (Birrell, 1999). Eventually however, this wuxian hero would be able to redeem himself by favouring the original teachings of Buddhism and Confucianism, harnessing enough chi to make the ultimate sacrifice for the people. These wuxia tales became popular forms of literature in China and they became common themes among travelling groups of actors in China. When the Peking Opera was

Thursday, October 17, 2019

Medline Search Essay Example | Topics and Well Written Essays - 500 words

Medline Search - Essay Example The ‘Medline’ database was studied with directed and pointed queries in the main search box for terms related with the clinical question. The first query was made using a rather obvious sentence ‘improving functional status in adult asthmatics’ but it yielded no results. The search was repeated using a more targeted collection of terms ‘asthma control in adults’ which yielded some very good results. The primary papers shortlisted in this search which were somewhat relevant with the clinical question included papers on medical adherence amongst adult asthmatics residing in two inner city clinics, the beliefs of patients as well as physicians about asthma control and risks involved. Another search was conducted on the same website using ‘asthma self care’ as the key words. This yielded a number of hits and two papers talked about the impact of education on asthma patients, adults as well as children. Out of these, one was found to be highly relevant to the clinical question and is summarized below. Yet another search with the key words ‘asthma medication’ yielded quite good results and another paper was selected for discussion and summarization. In total 10 relevant studies were obtained in this search. The two selected studies had high relevance with the clinical question due to their focus on the impact of education on patient adherence with medication for asthma and are therefore summarized below: 1. A descriptive and correlative study tried to examine the impact of education, knowledge and patient characteristics on emergency visits to the hospital which can yield some fair knowledge about the clinical question (Emtner et al, 2009). In a year long study, 84 asthma patients and 52 COPD (Chronic Obstructive Pulmonary Disease) patients were interviewed on phone 4 to 6 weeks after an emergency room (ER) visit and followed up for one year to study the impact

Financial Management assignment 2 Essay Example | Topics and Well Written Essays - 3000 words

Financial Management assignment 2 - Essay Example The company does not seem to be cash-rich as it currently has an overdraft facility. Although the company has been operating successfully, taking on the project will put the company in an unfavourable cash flow position. The Internal Rate of Return in which the Net Present Value is zero is undefined as there is no discount rate that is small enough to make the Net Present Value zero. The company has already incurred a considerable sum of GBP 750,000 on research and development of this new range. Perhaps, the company can consider alternative ways of manufacturing this product, such as outsourcing or negotiating for better material costs without compromising on its quality. The initial research cost of the project has already been incurred by the company and is considered as sunk cost. This is because whether Paddle Your Own Canoe Plc takes up the project, or not, the initial research cost will still be considered as being spent. In analysing the cash flow that will be generated from the project, sunk costs must be ignored. As such, the treatment of the initial research cost is to exclude from the cash flow calculation. Likewise, depreciation of the plant and machinery is not included in the calculation of the cash flow because this is a non cash flow item, while the investment appraisal focuses on cash flows. Depreciation is an accounting method of recognising the reduction of the company's fixed assets in its income statement over time and does not affect cash at all. Thus, this item has also been excluded. The additional working capital that the company needs to invest in is meant for other purposes at the end of the project. In fact, this will only be released for use at the end of the project. Although the company has to commit to this much earlier, the item has also been excluded in the calculations. This is because the working capital is not related to the project and will not affect the investment at all. However, in the event that the working capital is sought for the purpose of the project, then this will have to be considered in determining the feasibility of the project. Question 1c The payback period calculation looks at the shortest number of years to recover the cost of the project. Although the calculation is easy to understand and simple, it still has its limitations. It ignores the benefits that occur after the payback period and more importantly, the method ignores the time value of money. The Net Present Value is an indicator of how much value an investment or project adds to the company. The Net Present Value is a more reliable method of calculating the returns expected from investments as the method considers the time value of money. The Net Present Value compares the value of a dollar today to the value of that same dollar in the future, taking both inflation and returns into account. A positive Net Present Value generated from a prospective project is a good sign and should be accepted On the contrary, a negative Net Present Value resulting from projects should be rejected because the cash flows will also be negative. The Internal Rate of Return is the discount rate that delivers a Net

Wednesday, October 16, 2019

How East-Asian Martial Films Have Influenced Hollywood Cinema Literature review

How East-Asian Martial Films Have Influenced Hollywood Cinema - Literature review Example This genre has been known to incorporate richly detailed choreographed action scenes with high-flying kicks and martial art techniques. When it was first seen in Asia, it was far-removed from the American film genre and style. However, it soon became a common feature in the Hong Kong film industry (Michallet-Romero, 2003). While trying to preserve the traditional stories of Chinese heroes, Hong Kong film directors translated martial arts techniques into film and in the process influenced the Hollywood film industry. The Wuxia tales in Chinese history were representations of male and female sword masters who represented much heroism in their actions (Garnet, 1999). These tales of heroism were developed in an era dominated by Confucianism and the teachings of this religion. Confucius was very much focused on loyalty, obedience, and on fulfilling one’s duty to one’s family. The father was considered the head of the household and as such total respect was owed him by the re st of the family (Morgan, 2001). Confucius also advocated the belief that those who were stronger must protect the weak, the aged, and those who were unable to defend themselves. Confucius also supported the ideal leader, ordering his warriors to live their lives with dignity and with valour. From these teachings grew wuxia literature. This literature was also enriched by the stories of the Buddhist religious leader Siddartha Gautama (Michallet-Romero, 2003). Buddha’s teachings incorporated philosophical beliefs to the wuxia tales and also advocated the idea of alleviating the sufferings of man. Physical disciplines were later associated with Buddhism and Confucianism and these movements were meant to enhance a person’s chi, which is considered to be the life force of all beings (Michallet-Romero, 2003). ... iplines were later associated with Buddhism and Confucianism and these movements were meant to enhance a person’s chi, which is considered to be the life force of all beings (Michallet-Romero, 2003). From these movements Kung Fu would soon evolve. The Wuxia tales presented the image of the hero – either male or female – as one who is able to wield a sword skilfully, travelling to distant lands and carrying out heroic deeds in defence of the powerless and the weak. These heroes were often known to travel alone, exemplifying their strong skills in martial arts and sword play (Desser, 2002). The relationship of master and student within these stories were also apparent. The wuxia tales also presented the virtues of justice, valour, and sacrifice for the greater good of the people. The protagonists were also usually of common lineage and with skill and training gained much prestige (Birrell, 1999). This protagonist was very much different from the protagonists portra yed in Western stories where the heroes were often of noble blood. Wuxia folklore eventually made its way into the common and the noble people of China and these stories were retold with slight changes in their characterizations, making them darker and flawed and somehow representing a danger to those who were weak. Due to these changes in their characterization, the heroes were often made to confront their dark side as well (Birrell, 1999). Eventually however, this wuxian hero would be able to redeem himself by favouring the original teachings of Buddhism and Confucianism, harnessing enough chi to make the ultimate sacrifice for the people. These wuxia tales became popular forms of literature in China and they became common themes among travelling groups of actors in China. When the Peking Opera was

Tuesday, October 15, 2019

Financial Management assignment 2 Essay Example | Topics and Well Written Essays - 3000 words

Financial Management assignment 2 - Essay Example The company does not seem to be cash-rich as it currently has an overdraft facility. Although the company has been operating successfully, taking on the project will put the company in an unfavourable cash flow position. The Internal Rate of Return in which the Net Present Value is zero is undefined as there is no discount rate that is small enough to make the Net Present Value zero. The company has already incurred a considerable sum of GBP 750,000 on research and development of this new range. Perhaps, the company can consider alternative ways of manufacturing this product, such as outsourcing or negotiating for better material costs without compromising on its quality. The initial research cost of the project has already been incurred by the company and is considered as sunk cost. This is because whether Paddle Your Own Canoe Plc takes up the project, or not, the initial research cost will still be considered as being spent. In analysing the cash flow that will be generated from the project, sunk costs must be ignored. As such, the treatment of the initial research cost is to exclude from the cash flow calculation. Likewise, depreciation of the plant and machinery is not included in the calculation of the cash flow because this is a non cash flow item, while the investment appraisal focuses on cash flows. Depreciation is an accounting method of recognising the reduction of the company's fixed assets in its income statement over time and does not affect cash at all. Thus, this item has also been excluded. The additional working capital that the company needs to invest in is meant for other purposes at the end of the project. In fact, this will only be released for use at the end of the project. Although the company has to commit to this much earlier, the item has also been excluded in the calculations. This is because the working capital is not related to the project and will not affect the investment at all. However, in the event that the working capital is sought for the purpose of the project, then this will have to be considered in determining the feasibility of the project. Question 1c The payback period calculation looks at the shortest number of years to recover the cost of the project. Although the calculation is easy to understand and simple, it still has its limitations. It ignores the benefits that occur after the payback period and more importantly, the method ignores the time value of money. The Net Present Value is an indicator of how much value an investment or project adds to the company. The Net Present Value is a more reliable method of calculating the returns expected from investments as the method considers the time value of money. The Net Present Value compares the value of a dollar today to the value of that same dollar in the future, taking both inflation and returns into account. A positive Net Present Value generated from a prospective project is a good sign and should be accepted On the contrary, a negative Net Present Value resulting from projects should be rejected because the cash flows will also be negative. The Internal Rate of Return is the discount rate that delivers a Net

Charles Darwin and the Theory of Evolution Essay Example for Free

Charles Darwin and the Theory of Evolution Essay In the 1850s, Charles Darwin proposed his theory of evolution. His theory proposed that species evolved gradually through subtle changes from one generation to the next by means of natural selection. By natural selection, the most desirable hereditary traits become more common from one generation to the next while the less desirable, weaker traits die out. This gives rise to an organism that is more capable—fitted to—of surviving in the surrounding environment. At the time Darwin formulated his idea beginning with his trip on the HMS Beagle in the 1830s, some scientists resorted to the idea that God had preordained life by natural laws rather than by miraculous feats. While logical and correct, the idea still refers to a divine power, indicating a religious bent, so perhaps it was obvious that the ideas addressed could lead to religious controversy. As is common in science, Darwin’s concept arose from ideas garnered from a number of scientists of his time. Some researchers of the time believed that natural laws were responsible for life. While Darwin’s ideas did not account for the processes believed to account for life at the time, there was a theory at the time thought to account for life. Most thought that species were transmuted from one species into another. The problem with transmutation, an idea that is similar to evolution in some respects, is that a species may change through transmutation, but it will still be the same species. A dog may change into a different type of dog, but it will still be a dog; likewise, for a cat or any other species. Evolution dictates that the entire animal kingdom can grow through stages from one species into another over time. Birds came from reptiles, mammals came from birds and humans came from non-humans. (Lewontin, 1981) The data is unequivocal. During his voyage on HMS Beagle, Darwin found fossil remains of gigantic mammals that were recently extinct with no indication that their extinction had been caused by climate changes or catastrophic events. Although he believed that the remains he found were related to species in Africa or Europe, examination of the remains Darwin found showed that they were only related to other species found only in the Americas. Creationists insist that life came about from God in six days. While most evolutionists attack creationism on the grounds of scientific facts, there is another line of evidence virtually unnoticed by those who support evolution theory. Historians and archeologists have learned that the biblical story of creation came from the myths of another culture. Stories presented in the Bible evolved slowly over time, long before religions existed, and incorporated tales from many cultures. The story of the Garden of Eden, the serpent and the Tree of Life, for example, are said to have been depicted on an Akkadian Cylinder Seal nearly 2500 years before Christ. The serpent itself was viewed as a deity. Notice: No one familiar with the mythologies of the primitive, ancient, and Oriental worlds can turn to the Bible without recognizing counterparts on every page, transformed, however, to render an argument contrary to the older faiths. In Eves scene at the tree, for example, nothing is said to indicate that the serpent who appeared and spoke to her was a deity in his own right, who had been revered in the Levant for at least seven thousand years before the composition of the Book of Genesis. There is in the Louvre a carved green steatite vase, inscribed c. 025 BC by King Gudaea of Lagash, dedicated to a late Sumerian manifestation of this consort of the goddess, under his title Ningizzida, Lord of the Tree of Truth. p. 9. The Serpents Bride. Joseph Campbell. Occidental Mythology, The Masks of God. Arkana. New York. Viking Penguin Books. 1964, 1991 reprint The information in the Old Testament dates from about 1450 BC until 200 BC. This means that, contrary to the strongly held beliefs of most Christians, the creation story of Genesis is actually derived from the myths of ancient Sumerians. Therefore, the story is a myth. This means that those who against Darwin’s ideas on religious grounds based on their beliefs in the accuracy of the story in Genesis have unknowingly chosen to accept myth over facts. While they believe the myth to be factual, archeological evidence demonstrates otherwise. The scientific evidence leans heavily in support of Darwin’s ideas. While we may not fully understand some aspects behind the mechanism of evolution, we are continuously learning more about those mechanisms. (Dobzhansky, 1973) Dobzhansky states: Let me try to make crystal clear what is established beyond reasonable doubt, and what needs further study, about evolution. Evolution as a process that has always gone on in the history of the earth can be doubted only by those who are ignorant of the evidence or are resistant to evidence, owing to emotional blocks or to plain bigotry. By contrast, the mechanisms that bring evolution about certainly need study and clarification. There are no alternatives to evolution as history that can withstand critical examination. Yet we are constantly learning new and important facts about evolutionary mechanisms. Theodosius Dobzhansky, â€Å"Nothing in Biology Makes Sense Except in Light of Evolution†, American Biology Teacher vol. 35 (March 1973) reprinted in Evolution versus Creationism, J. Peter Zetterberg ed. , ORYX Press, Phoenix AZ 1983. Darwin (1859) believed that whales evolved from bears based on a scenario where selective pressures might cause this evolution, but he was criticized for this idea and removed the suggestion. Gould, 1995) Today, there is much more fossil evidence for the evolution of many species thus supporting the idea of evolution as a general biological principle, including the evolution of whales from lower animals. Evidence in support of evolution exists at many levels. There is paleontological evidence based on fossils, morphological evidence that relate the body morphology of higher animals to lower animals, evidence from molecular biology and from embryology. Added to this, the chronological picture that results is consistent with other lines of evidence. For example, the evidence for the evolution of whales from lower animals is convincing. Whales have been closely studied with respect to evolution. If evolution is valid, transitional stages from one level of evolution to another should exist. Although the fossil remains of whales spotty for a long time, recent fossil discoveries have more than adequately lent support to the concept of evolution for whales. Researchers state that independent lines of evidence from different disciplines confirm the pattern of evolution in whales. John Ray recognized that whales were mammals rather than fish in 1693 based on their similarity to terrestrial mammals. (Barnes, 1984) In 1883, Flower (see Barnes, 1984) found that whales had vestigial characteristics in common with terrestrial mammals just as humans have vestigial tails, the coccyx. Findings similar to these led to the concept of ‘ontogeny recapitulates phylogeny. ’ This concept is briefly explained in further detail below. Flower (1883) recognized that the whales have persistent rudimentary and vestigial features characteristic of terrestrial mammals, thus confirming that the direction of descent was from terrestrial to marine species. On the basis of morphology, Flower also linked whales with the ungulates; he seems to have been the first person to do so. Today, we know that whales have vestigial features in common with lower animals. For example, they have vestigial olfactory nerve, protruding hind limbs, pelvic fins and diaphragms. Like humans, during embryological development, whales develop features similar to lower animals and abandon them as development progresses. During their development, there is also evidence that whales have terrestrial ancestors. Some whales even develop hair while in the womb although they do not retain it. In 1985, Goodman et al. demonstrated that whales are more closely related to ungulates than to other animals. (Goodman, 1985; Miyamoto and Goodman, 1986) Some studies have identified genes, enzymes and other proteins that connect whales to extinct animals. (Irwin et al. 991; Irwin and Arnason, 1994; Milinkovitch, 1992; Graur and Higgins, 1994; Gatesy et al, 1996; Shimamura et al. , 1997) We have already noted above that the creation story in the Bible was taken from the text of an ancient culture that predates the Hebrew account. Rather than to openly acknowledge that the Bible’s story of creation is a mythical legend that explains evolution and the appearance of life on ea rth, some religious groups resort to far-fetched, fictitious, generally ridiculous concepts such as ‘creationism’, ‘creation science’ and ‘intelligent design’ to dismiss or explain away the science and replace it with fantasy. Embryology and developmental biology have a concept, ‘ontogeny recapitulates phylogeny’, that simplifies and briefly but succinctly expresses the concepts presented in the first chapter of Genesis. This is like explaining a complicated scientific concept, take conception and birth for example, to a little child by using a fairy tale rather than detailed research information. The fairy tale is not accurate, but the general information it communicates is true. With this single phrase, the first chapter of Genesis is summarized and explained. The phrase means that the embryological processes of development, ontogeny, depict and encapsulate the evolutionary history of the species, phylogeny. For example, during development of the human embryo, the fetus briefly has gills and a tail like its phylogenetic ancestors. In other words, during development, the developing embryo goes through some of the same stages that humans went through as the species developed from lower animals to humans. The concept makes perfect sense and explains many aspects of human development. Obviously, we cannot provide a comprehensive review of the evidence support evolution in a few pages, and we certainly cannot provide realistic evidence against it in light of all that exists to support it. While the evidence in support of the evolution of whales is plentiful, much evidence exists for evolution in general, including in humans. As has been reported here, the evidence is not just from scientific research, but also from archeology and history. That evidence shows, among other things, that the biblical story of creation in Genesis predates the Bible by hundreds of years. Despite all the evidence in support of evolution and against the idea of the biblical creation as being anything more than a myth, we can be certain that the argument in support of the biblical creation as being the real story and representing the real facts will not go away. Humans being what we are, we will always be faced with living with the Genesis myth as if it were fact, and coping with those who insist that the earth all the universe was created in six literal days. That concept certainly will never go away no matter what facts exist to disprove it.

Monday, October 14, 2019

Enhanced Frame-based Video Coding

Enhanced Frame-based Video Coding Abstract- This paper displays the improved edge based feature coding plan. The info source feature to the improved edge based feature encoder comprises of a rectangular-size feature and states of subjectively molded questions on feature outlines. The rectangular edge composition is encoded by the ordinary casing based coding method and the feature objects shape is encoded utilizing the form based vertex coding. It is conceivable to accomplish a few valuable substance based functionalities by using the shape data in the bit stream at the expense of a little overhead to the bitrate. Magic words Video coding, substance based, hyper feature, intuitiveness, shape coding, polygon. I. INTRODUCTION Through the years, the advanced feature engineering has been developing rapidly regarding the ways feature substance is delivered, conveyed, and devoured. Accordingly, clients are not content with just the pressure efficiency in a feature coding engineering; they are currently requesting more peculiarities. To meet the client requests, the new feature coding plans are obliged help substance based intuitiveness, permit content- based feature indexing and recovery, adapt up to data transfer capacity and bit slip rates of transmission systems, and accomplish retrogressive similarity with existing feature coding plans notwithstanding giving a decent squeezing efficiency. For this reason, the new feature encoders oblige the source info feature to be in such a structure, to the point that the feature substance can be effectively identified and described. The info feature source to the article based feature coding approach in MPEG-4 standard [1] is as discretionarily formed feature items and their shapes as demonstrated in Fig. 1(a). The MPEG-4 item based feature encourages client intuitiveness with individual items. Notwithstanding, the decoders focused around prior MPEG models are not equipped for interpreting the MPEG- 4 item based feature bit streams. Besides, the exact division of semantically compelling items from a rectangular feature still remains a testing issue. Then again, erroneous division of feature items might antagonistically influence the pressure efficiency [2]. In the sub-picture coding [3], a feature casing is apportioned into one or more client defined non-covering rectangular sub-pictures and a remaining foundation picture (see Fig. 1(b)). It is conceivable to appoint distinctive mistake insurance and quality levels to diverse sub-pictures focused around their imperativeness by utilizing sub-picture coding. In any case, the rectangular sub-pictures dont by and large speak to the genuine feature objects with which a client might want to cooperate. Some feature transmission plans propose typifying the MPEG-2 and the MPEG-4 feature streams inside the MPEG-2 vehicle stream to give the worth included administrations, for example, substance based intelligence [4]. Despite the fact that these plans furnish the retrograde similarity with the current (a) (b) Fig. 1. Cases of info source feature designs for (a) the MPEG-4 item based coding, and (b) the sub-picture coding. traditional MPEG-2 decoders, they have the disservice of considerably expanding the expense of the decoders so as to backing more than one MPEG standard. The goals of the proposed upgraded casing based feature encoder (EFBE) are the accompanying: 1) to serve as a basic augmentation of the customary edge based feature encoder architectures and to give retrogressive similarity, 2) to accomplish about the same execution as far as feature quality and packing proportion as contrasted with the ordinary edge based feature coding execution, and 3) to address the client requests for substance based functionalities. The construction modeling, the peculiarities and the execution of the upgraded edge based coding plan are portrayed in the accompanying. II. PROPOSED ENHANCED FRAME-BASED VIDEO CODING In the proposed improved casing based coding, the data source feature comprises of a rectangular-size feature and states of subjectively molded protests on feature outlines. We define the object of investment (OOI) in a rectangular edge feature as the subjectively formed semantically significant feature object which is of enthusiasm to a client. There are three steps included at the present time getting the coded representation of feature utilizing the improved edge based feature coding scheme:1) preprocessing, 2) encoding shape and composition, and 3) post- preparing. In the first step, an OOI is identified and its shape data is gotten as either a layout form representation or a division veil. The diagram shape representation of an OOI can be acquired by denoting the framework of OOI on the screen physically; along these lines the shape data can be effectively produced by a client. Programmed division [6] and self-loader division procedures [7]. For the proposed EFBE, the limits of portioned feature articles require just speak to a rough blueprint of the range having a place with a feature object and there is no necessity for division to be exact. In the second step, the rectangular casing surface and the feature objects shape are encoded. The square graph of the EFBE is indicated in Fig. 2. The post-preparing step includes partner the shape data with Fig.2 The enhanced frame-based video encoder. he composition of the item it speaks to. The state of an OOI identifies the range fitting in with the OOI on the rectangular casing feature so that the region carries on as a hotspot on the feature outline. This hotspot is connected with a connection to an alternate terminus like a hyperlink in the World Wide Web. This connection can be to either an alternate feature (which might possibly contain joins) or a HTTP protest, for example, a page, file, or CGI script. The following and in addition the connection data is multiplexed into the bit stream alongside surface and shape data. In this paper, we concentrate chiefly on the second venture to propose another feature encoding plan, Whatever the strategies utilized for preprocessing and post-transforming. Encoding shape and surface. As indicated in Fig. 2, the significant segments of the proposed EFBE are edge based composition coding and shape coding. The shape coding is performed in two steps: 1) polygonal rough guess of shape limit, and 2) vertex coding. The composition and shape bits are multiplexed into a solitary bit stream. The EFBE has two modes of operation: autonomous shape- surface (IST) mode and ward shape-composition (DST) mode. The IST/DST switch permits the exchanging between the two modes. In the IST mode, the rectangular edge surface and feature objects shape are encoded autonomously. Shape coding: Unlike the MPEG-4 which utilizes bitmap- based strategies for shape coding, the proposed EFBE utilizes form based method which fits the semantic shape characterization. The shape form as either the division veils limit or the framework shape representation of OOI is approximated by a polygon utilizing successive technique such that the separation between the polygon and the form is short of what or equivalent to a given average rough guess mistake ÃŽ ´ . In consecutive strategy, the form is checked from an introductory indicate on the bend focus the longest conceivable edge having the rough guess blunder short of what or equivalent to ÃŽ ´. The procedure is rehashed with the end purpose of the current edge as the following beginning stage. The vertices of the polygon are coded utilizing the article versatile vertex Fig 3. The horizontal and vertical distances of the vertex ai belonging to polygon A from polygon B. encoding system depicted in . The measure of shape mutilation is controlled by differing the estimation of ÃŽ ´Ãƒâ€ ; the bigger the estimation of ÃŽ ´ , the higher the shape twisting. Lossless shape coding is accomplished by setting ÃŽ ´0 . The separation between the polygonal rough guesses of OOI shape in the current and the reference casing is utilized to catch the measure of worldly variety fit as a fiddle. The separation between two polygons is processed as takes after. Let A and B be the polygonal estimates of the current and the reference OOI shape. Let hi and vi be the flat and vertical separation of the ith vertex of A from B (see Fig. 3). At that point the separation of A from B is defined as DAB =max (di) where di=min(hi , vi ). For the objects of investment, for example, talking-head, the variety OOI fit as a fiddle over an arrangement of adjacent casings is typically little. Accordingly when the lossy shape coding is craved, the shape data is not transmitted with each casing. Rather, the polygonal estimate of the current OOI shape is coded and transmitted just if the separation between the polygonal estimates of the current and reference OOI shapes is more prominent than or equivalent to an edge T . Overall no shape data is transmitted in the current edge. At the decoder, the most as of late decoded shape is utilized to distinguish the OOI if no shape data is available in the current edge. 2) Texture coding: The essential steps of composition coding in the EFBE are basically the same as those in a normal rectangular edge based encoder. These fundamental steps comprise of separating a feature outline into an exhibit of essential units called macro squares and preparing every macro square by applying discrete cosine change, quantization and variable length coding. Truth be told, the surface coding square in the EFBE can be any rectangular edge based feature encoder (e.g., MPEG- 1, MPEG-2 or MPEG-4 (basic profile) feature encoder). In our execution of EFBE, we have utilized MPEG-4 (straightforward profile) encoder for casing based feature composition coding. In the DST mode, the shape data is utilized to alter the composition coding parameters. The fundamental thought is to encode the composition in the area having a place with the polygonal estimate of the OOI shape with a finer quantization as contrasted with whatever remains of the feature outline. The quantizer qualities utilized for the two locales are installed in the header data which is annexed to the shape bit stream. At the decoder, the decoded shape data is used to accurately distinguish the locale fitting in with feature question on the feature outline and the quantizer data in the bit stream header is used for disentangling the edge surface. 3) Multiplexing shape and composition bits: The proposed upgraded casing based feature coding plan includes the multiplexing surface bits with the extra bits comprising of the shape bits and the bits that are produced by the post- preparing stage for following and connecting the objects of investment. The proposed improved casing based feature decoders would use the extra bits to give the substance based functionalities. We utilize the client information parcel insertion plan for MPEG-4 is depicted for this reason. We join the shape bits, extra header bits and the connection data bits into client information and spot the client information into the bit stream created by the edge based composition coding piece of the EFBE. III. FEATURES OF THE EFBE The construction modeling of the proposed EFBE is planned such that it can be actualized as a basic augmentation of a current casing based encoder structural planning. The main extra multifaceted nature that EFBE adds to a casing based encoder is that needed for shape coding. At the point when an EFBE bit stream is gotten by a current traditional edge based feature decoder, the shape data exhibit in the bit stream would essentially be overlooked and just rectangular casing composition would be decoded and showed. Since the shape and surface are encoded autonomously in the IST mode operation of EFBE, the IST mode furnishes the retrograde similarity with the routine edge based feature decoders. Notwithstanding, the DST mode of EFBE Fig. 4 The source videos used in our experiments: a) the first frame in Akiyo and the corresponding shape contour of the OOI, and b) the third frame in Foreman and the corresponding shape contour of the OOI, does not help retrogressive similarity with the current customary edge based decoders on the grounds that the composition coding is reliant on the shape data in this mode of operation. The installed shape data in the bit stream of the EFBE can be used to help a few substance based functionalities. At the beneficiary, the shape data of a feature protest in the bit stream encourages the identification of the locale having a place with the item as a hotspot on the rectangular casing. A hyperlink can be accommodated the item on the rectangular casing when a client initiates the article by clicking on the hotspot. Subsequently the decoded feature works just about like a Web page, permitting individuals to connect with the picture on the screen. Such a feature bit stream in which a connection and substance data is connected with a district on a feature casing is for the most part alluded to as Hyper Video. Besides, lossy shape coding can be utilized to accomplish higher clamping. The annotation of feature hyperlinks as little symbols containing the polygonal estimate of article con- visit can be shown at the base of the rectangular feature for a client to distinguish the problem areas in an edge. Here, the annotations give a thought regarding the present, past and next scenes to a client through the showcase of polygonal close estimations that give semantic depiction of the items in the scenes. This will permit a client to effortlessly look for a scene in a feature. Besides, amid quick forward or quick invert operations, no one but shape can be decoded and showed as opposed to deciphering the whole rectangular casing surface. In the event that the limits of the shape cover consummately match the genuine limits of OOI (as on account of shape data acquired through the standard blue-screen system in studio situations), one may pick the lossless shape coding by setting the polygonal estimate lapse ÃŽ ´=0 . This permits the client to concentrate the OOI from the rectangular casing and overlay the OOI on a foundation picture of his own decision to show a feature scene which is unique in relation to the one present in the bit stream. The DST mode of the EFBE is fit for giving extra substance based functionalities, for example, allocating distinctive quality, clamping, and lapse insurance levels to the areas of investment and the remaining zones in a feature outline. IV. EXPERIMENTAL RESULTS The ordinary edge based feature encoder (CFBE) in the MPEG-4 Verification Model (VM) programming [1] is utilized as the premise to actualize the proposed EFBE. We joined the accompanying modifications to VM programming: 1) expansion of our shape coding module, 2) conformity of quantization step focused around shape data in the DST mode, and 2) multiplexing the client information comprising of encoded shape data and the connection data of hotspots with the composition and header information. We utilize the first 100 edges of the 30hz CIF-size Akiyo and Foreman feature groupings and related OOI shape forms in our analyses. Fig. 4 demonstrates an example outline and related OOI shape form in the first features. The feature successions are encoded at 10 edges/sec; so there are 34 coded casings in the bit stream. Initially, we think about the execution of the IST mode of the EFBE with the execution of the CFBE. Since the surface coding in the IST mode of EFBE is the same as that in the CFBE, both the encoders yield the same feature quality. In this manner, we look at just the bit stream size. The accompanying encoder settings are utilized. A fixed quantization venture of Q=16 is utilized amid surface coding. For the EFBE, we have to define two extra parameters to be specific ÃŽ ´ and T connected with shape coding. In our investigations, we set ÃŽ ´=10 and we use T=0 for Akiyo and T=5 for the Foreman. The Fig. 5 demonstrates the polygonal rough guess of OOI in an edge for ÃŽ ´=10 . The bitrates are recorded in Table I. Since T=5 is utilized for coding the state of Akiyo, we saw in our tests that the OOI shape was encoded in just four out of the 100 casings and the aggregate number shape bits in the whole bit stream was 720; 720/34=21 along these lines the normal number of shape bits for every edge is , which is an irrelevantly little esteem as contrasted with the normal number of surface bits. If there should be an occurrence of the Foreman, the state of OOI in each one casing is encoded in light of the fact that T=0. We watch that the shape bits are 0.125% and 1.29% of the surface bits for Q=8 and Q=16 , separately. On the other hand, this little extra overhead of shape bits in the EFBE bit stream as contrasted with the CFBE bit stream is incredibly justified by the benefit attained as far as a few helpful substance based functionalities that the shape data empowers. We introduce the correlation of the execution of the DST mode of the EFBE with that of the CFBE utilizing the Foreman feature. A fixed quantization venture of Q =16 is utilized for all the macro pieces in CFBE. Though in the DST mode operation of EFBE, a lower quantizer (Q =8) is utilized for OOI district and higher quantizer ( Q=31) is utilized for the remaining piece of the casing to attain almost the same composition bits as that needed by CFBE. For the shape coding in the DST mode of the EFBE, we set(ÃŽ ´=10 T=0 ) . The quality and bitrate for the first Intra-edge encoded by the two encoders are exhibited in Table II. A higher PSNR for the OOI area is attained at the expense of lower PSNR for the foundation district as contrasted with the general PSNR acquired with the CFBE. The EFBE requires extra 128 bits for coding the state of the OOI V. CONCLUSIONS The building design and configuration of the proposed improved casing based feature encoder is introduced. The fundamental point of the proposed encoder is to give an upgrade to the traditional edge based coding. It is conceivable to attain a few helpful substance based functionalities by inserting the coded representation of a feature objects form alongside the coded surface in the bit stream,. The overhead of extra bits needed for shape coding is short of what 2% of the aggregate bits of the customary edge based coding in our exploratory results.