Monday, September 30, 2019

Bloodsucking Fiends: A Love Story Chapter 23~24

Chapter 23 Mom and Terrapin Pie â€Å"She's in town,† Jody said. â€Å"She's coming over in a few minutes.† Jody lowered the phone to its cradle. Tommy appeared in the bedroom doorway, Scott still dangling from his sleeve. â€Å"You're kidding.† â€Å"You're missing a cufflink,† Jody said. â€Å"I don't think he's going to let go. Do we have any scissors?† Jody took Tommy by the sleeve a few inches above where Scott was clamped. â€Å"You ready?† Tommy nodded and she ripped his sleeve off at the shoulder. Scott skulked into the bedroom, the sleeve still clamped in his jaws. â€Å"That was my best shirt,† Tommy said, looking at his bare arm. â€Å"Sorry, but we've got to clean this place up and get a story together.† â€Å"Where did she call from?† â€Å"She was at the Fairmont Hotel. We've got maybe ten minutes.† â€Å"So she won't be staying with us.† â€Å"Are you kidding? My mother under the same roof where people are living in sin? Not in this lifetime, turtleboy.† Tommy took the turtleboy shot in stride. This was an emergency and there was no time for hurt feelings. â€Å"Does you mother use phrases like ‘living in sin'?† â€Å"I think she has it embroidered on a sampler over the telephone so she won't forget to use it every month when I call.† Tommy shook his head. â€Å"We're doomed. Why didn't you call her this month? She said you always call her.† Jody was pacing now, trying to think. â€Å"Because I didn't get my reminder.† â€Å"What reminder?† â€Å"My period. I always call her when I get my period each month – just to get all the unpleasantness out of the way at one time.† â€Å"When was the last time you had a period?† Jody thought for a minute. It was before she had turned. â€Å"I don't know, eight, nine weeks. I'm sorry, I can't believe I forgot.† Tommy went to the futon, sat down, and cradled his head in his hands. â€Å"What do we do now?† Jody sat next to him. â€Å"I don't suppose we have time to redecorate.† In the next ten minutes, while they cleaned up the loft, Jody tried to prepare Tommy for what he was about to experience. â€Å"She doesn't like men. My father left her for a younger woman when I was twelve, and Mother thinks all men are snakes. And she doesn't really like women either, since she was betrayed by one. She was one of the first women to graduate from Stanford, so she's a bit of a snob about that. She says that I broke her heart when I didn't go to Stanford. It's been downhill since then. She doesn't like that I live in the City and she has never approved of any of my jobs, my boyfriends, or the way I dress.† Tommy stopped in the middle of scrubbing the kitchen sink. â€Å"So what should I talk about?† â€Å"It would probably be best if you just sat quietly and looked repentant.† â€Å"That's how I always look.† Jody heard the stairwell door open. â€Å"She's here. Go change your shirt.† Tommy ran to the bedroom, stripping off his one-sleever as he went. I'm not ready for this, he thought. I have more work to do on myself before I'm ready for a presentation. Jody opened the door catching her mother poised to knock. â€Å"Mom!† Jody said, with as much enthusiasm as she could muster. â€Å"You look great.† Frances Evelyn Stroud stood on the landing looking at her youngest daughter with restrained disapproval. She was a short, stout woman dressed in layers of wool and silk under an eggshell cashmere coat. Her hair was a woven gray-blond, flared and lacquered to expose a pair of pearl earrings roughly the size of Ping-Pong balls. Her eyebrows had been plucked away and painted back, her cheekbones were high and highlighted, her lips lined, filled, and clamped tight. She had the same striking green eyes as her daughter, flecked now with sparks of judgment. She had been pretty once but was now passing into the limbo-land of the menopausal woman known as handsome. â€Å"May I come in,† she said. Jody, caught in the half-gesture of offering a hug, dropped her arms. â€Å"Of course,† she said, stepping aside. â€Å"It's good to see you,† she said, closing the door behind her mother. Tommy bounded from the bedroom into the kitchen and slid to a stop on stocking feet. â€Å"Hi,† he said. Jody put her hand on her mother's back. Frances flinched, ever so slightly, at the touch. â€Å"Mother, this is Thomas Flood. He's a writer. Tommy, this is my mother, Frances Stroud.† Tommy approached Frances and offered his hand. â€Å"Pleased to meet you†¦Ã¢â‚¬  She clutched her Gucci bag tightly, then forced herself to take his hand. â€Å"Mrs. Stroud,† she said, trying to head off the unpleasantness of hearing her Christian name come out of Tommy's mouth. Jody broke the moment of discomfort so they could pass into the next one. â€Å"So, Mom, can I take your coat? Would you like to sit down?† Frances Stroud surrendered her coat to her daughter as if she were surrendering her credit cards to a mugger, as if she didn't want to know where it was going because she would never see it again. â€Å"Is this your couch?† she asked, nodding toward the futon. â€Å"Have a seat, Mother; we'll get you something to drink. We have†¦Ã¢â‚¬  Jody realized that she had no idea what they had. â€Å"Tommy, what do we have?† Tommy wasn't expecting the questions to start so soon. â€Å"I'll look,† he said, running to the kitchen and throwing open a cabinet. â€Å"We have coffee, regular and decaf.† He dug behind the coffee, the sugar, the powdered creamer. â€Å"We have Ovaltine, and†¦Ã¢â‚¬  He threw open the refrigerator. â€Å"Beer, milk, cranberry juice, and beer – a lot of beer – I mean, not a lot, but plenty, and†¦Ã¢â‚¬  He opened the chest freezer. Peary stared up at him through a gap between frozen dinners. Tommy slammed the lid.†Ã¢â‚¬ ¦ that's it. Nothing in there.† â€Å"Decaf, please,† said Mother Stroud. She turned to Jody, who was returning from balling up her mother's cashmere coat and throwing it in the corner of the closet. â€Å"So, you've left your job at Transamerica. Are you working, dear?† Jody sat in a wicker chair across the wicker coffee table from her mother. (Tommy had decided to decorate the loft in a Pier 1 Imports cheap-shit motif. As a result it was only a ceiling fan and a cockatoo away from looking like a Thai cathouse.) Jody said, â€Å"I've taken a job in marketing.† It sounded respectable. It sounded professional. It sounded like a lie. â€Å"You might have told me and saved me the embarrassment of calling Transamerica only to find out that you had been let go.† â€Å"I quit, Mother. I wasn't let go.† Tommy, trying to will himself invisible, bowed his way between them to deliver the decaf, which he had arranged on a wicker tray with cream and sugar. â€Å"And you, Mr. Flood, you're a writer? What do you write?† Tommy brightened. â€Å"I'm working on a short story about a little girl growing up in the South. Her father is on a chain gang.† â€Å"You're from the South, then?† â€Å"No, Indiana.† â€Å"Oh,† she said, as if he had just confessed to being raised by rats. â€Å"And where did you go to university?† â€Å"I, um, I'm sort of self-educated. I think experience is the best teacher.† Tommy realized that he was sweating. â€Å"I see,† she said. â€Å"And where might I read your work?† â€Å"I'm not published yet.† He squirmed. â€Å"I'm working on it, though,† he added quickly. â€Å"So you have another job. Are you in marketing as well?† Jody intervened. She could see steam rising off Tommy. â€Å"He manages the Marina Safeway, Mother.† It was a small lie, nothing compared to the tapestry of lies she had woven for her mother over the years. Mother Stroud turned a scalpel gaze on her daughter. â€Å"You know, Jody, it's not too late to apply to Stanford. You'd be a bit older than the other freshmen, but I could pull a few strings.† How does she do this? Jody wondered. How does she come into my home and within minutes make me feel like dirt on a stick? Why does she do it? â€Å"Mother, I think I'm beyond going back to school.† Mother Stroud picked up her cup as if to sip, then paused. â€Å"Of course, dear. You wouldn't want to neglect your career and family.† It was a verbal sucker punch delivered with polite, extended-pinky malice. Jody felt something drop inside her like cyanide pellets into acid. Her guilt dropped through the gallows' trap and jerked with broken-neck finality. She regretted only the ten thousand sentences she had started with, â€Å"I love my mother, but†¦Ã¢â‚¬  You do that so people don't judge you cold and inhuman, Jody thought. Too late now. She said, â€Å"Perhaps you're right, Mother. Perhaps if I had gone to Stanford I would understand why I wasn't born with an innate knowledge of cooking and cleaning and child-rearing and managing a career and a relationship. I've always wondered if it's lack of education or genetic deficiency.† Mother Stroud was unshaken. â€Å"I can't speak for your father's genetic background, dear.† Tommy was grateful that Mother Stroud's attention had turned from him, but he could see Jody's gaze narrowing, going from hurt to anger. He wanted to come to her aid. He wanted to make peace. He wanted to hide in the corner. He wanted to wade in and kick ass. He weighed his polite upbringing against the anarchists, rebels, and iconoclasts who were his heroes. He could eat this woman alive. He was a writer and words were his weapons. She wouldn't have a chance. He'd destroy her. And he would have. He was taking a deep breath to prepare to light into her when he saw a swath of denim disappearing slowly under the frame of the futon: his dismembered shirt sleeve. He held his breath and looked at Jody. She was smiling, saying nothing. Mother Stroud said, â€Å"Your father was at Stanford on an athletic scholarship, you know. They would have never let him in otherwise.† â€Å"I'm sure you're right, Mother,† Jody said. She smiled politely, listening not to her mother, but to the melodic scraping of turtle claws on carpet. She focused on the sound and could hear the slow, cold lugging of Scott's heart. Mother Stroud sipped her decaf. Tommy waited. Jody said, â€Å"So how long will you be in the City?† â€Å"I just came up to do some shopping. I'm sponsoring a benefit for the Monterey Symphony and I wanted a new gown. Of course I could have found something in Carmel, but everyone would have seen it already. The bane of living in a small community.† Jody nodded as if she understood. She had no connection to this woman, not anymore. Frances Evelyn Stroud was a stranger, an unpleasant stranger. Jody felt more of a connection with the turtle under the futon. Under the futon, Scott spotted a pattern of scales on Mother Stroud's shoes. He'd never seen Italian faux-alligator pumps, but he knew scales. When you are lying peacefully buried in the muck at the bottom of a pond and you see scales, it means food. You bite. Frances Stroud shrieked and leaped to her feet, pulling her right foot free of her shoe as she fell into the wicker coffee table. Jody caught her mother by the shoulders and set her on her feet. Frances pushed her away and backed across the room as she watched the snapping turtle emerge from under the futon merrily chomping on the pump. â€Å"What is that? What is that thing? That thing is eating my shoe. Stop it! Kill it!† Tommy hurdled the futon and dived for the turtle, catching the heel of the shoe before it disappeared. Scott dug his claws into the carpet and backed off. Tommy came up with heel in hand. â€Å"I got part of it.† Jody went to her mother's side. â€Å"I meant to call the exterminator, Mother. If I'd had more notice†¦Ã¢â‚¬  Mother Stroud was breathing in outraged yips. â€Å"How can you live like this?† Tommy held the heel out to her. â€Å"I don't want that. Call me a cab.† Tommy paused, considered the opportunity, then let it pass and went to the phone. â€Å"You can't go out without shoes, Mother. I'll get you something to wear.† Jody went to the bedroom and came back with her rattiest pair of sneakers. â€Å"Here, Mom, these will get you back to the hotel.† Mother Stroud, afraid to sit down anywhere, leaned against the door and stepped into the sneakers. Jody tied them for her and slipped the uneaten pump into her mother's bag. â€Å"There you go.† She stepped back. â€Å"Now, what are we going to do for the holidays?† Mother Stroud, her gaze trained on Scott, just shook her head. The turtle had wedged himself between the legs of the coffee table and was dragging it around the loft. A cab pulled up outside and beeped the horn. Mother Stroud tore her gaze away from the turtle and looked at her daughter. â€Å"I'll be in Europe for the holidays. I have to go now.† She opened the door and backed out through it. â€Å"‘Bye, Mom,† Jody said. â€Å"Nice meeting you, Mrs. Stroud,† Tommy called after her. When the cab pulled away, Tommy turned to Jody and said, â€Å"Well, that went pretty well, didn't it? I think she likes me.† Jody was leaning against the door, staring at the floor. She looked up and began to giggle silently. Soon she was doubled over laughing. â€Å"What?† Tommy said. Jody looked up at him, tears streaming her face. â€Å"I think I'm ready to meet your folks, don't you?† â€Å"I don't know. They might be sort of upset that you're not a Methodist.† Chapter 24 The Return of Breakfast The Emperor lay spread-eagle on the end of a dock in the Saint Francis Yacht Club Marina, watching clouds pass over the bay. Bummer and Lazarus lay beside him, their feet in the air, dozing. The three might have been crucified there, if the dogs hadn't been smiling. â€Å"Men,† the Emperor said, â€Å"it seems to me now that there is, indeed, a point to that Otis Redding song about sitting on the dock of the bay. After a long night of vampire hunting, this is a most pleasant way to spend the day. Bummer, I believe a commendation is in order. When you led us down here, I thought you were wasting our time.† Bummer did not answer. He was dreaming of a park full of large trees and bite-sized mailmen. His legs twitched and he let out a sleepy ruff each time he crunched one of their tiny heads. In dreams, mailmen taste like chicken. The Emperor said, â€Å"But pleasant as this is, it tastes of guilt, of responsibility. Two months tracking this fiend, and we are no closer to finding him than when we started. Yet here we lay, enjoying the day. I can see the faces of the victims in these clouds.† Lazarus rolled over and licked the Emperor's hand. â€Å"You're right, Lazarus, without sleep we will not be fit for battle. Perhaps, in leading us here, Bummer was wiser than we thought.† The Emperor closed his eyes and let the sound of waves lapping against the piers lull him to sleep. Lying at anchor, a hundred yards away, was a hundred-foot motor yacht registered in the Netherlands. Belowdecks, in a watertight stainless steel vault, the vampire slept through the day. Tommy had been asleep for an hour when pounding on the door downstairs woke him. In the darkness of the bedroom he nudged Jody, but she was out for the day. He checked his watch: 7:30 A.M. The loft rocked with the pounding. He crawled out of bed and stumbled to the door in his underwear. The morning light spilling though the loft's windows temporarily blinded him and he barked his shin on the corner of the freezer on his way through the kitchen. â€Å"I'm coming,† he yelled. It sounded as if they were using a hammer on the door. He did a Quasimodo step and slid down the stairs, holding his damaged shin in one hand, and cracked the downstairs door. Simon peeked through the crack. Tommy could see a ball-peen hammer in his hand, poised for another pound. Simon said, â€Å"Pardner, we need to have us a sit-down.† â€Å"I'm sleeping, Sime. Jody's sleeping.† â€Å"Well, you're up now. Wake up the little woman, we need breakfast.† Tommy opened the door a little wider and saw Drew dazzling a stoned and goofy grin behind Simon. â€Å"Fearless Leader!† All the Animals were there, holding grocery bags, waiting. Tommy thought, This is how Anne Frank felt when the Gestapo came to the door. Simon pushed through the door, causing Tommy to hop back a step to avoid having his toes skinned. â€Å"Hey.† Simon looked at Tommy's erection-stretched jockey shorts. â€Å"That just a morning wood, or you in the middle of something?† â€Å"I told you, I was sleeping.† â€Å"You're young, it could still grow some. Don't feel bad.† Tommy looked down at his insulted member as Simon breezed past him up the stairs, followed by the rest of the Animals. Glint and Lash stopped and helped Tommy to his feet. â€Å"I was sleeping,† Tommy said pathetically. â€Å"It's my day off.† Lash patted Tommy's shoulder. â€Å"I'm cutting class today. We thought you needed moral support.† â€Å"For what? I'm fine.† â€Å"Cops came by the store last night looking for you. We wouldn't give them your address or anything.† â€Å"Cops?† Tommy was waking up now. He could hear beers being popped open in the loft. â€Å"What did the cops want with me?† â€Å"They wanted to see your time cards. They wanted to see if you were working on a bunch of nights. They wouldn't say why. Simon tried to distract them by accusing me of leading a black terrorist group.† â€Å"That was nice of him.† â€Å"Yeah, he's a sweetheart. He told that new cashier, Mara, that you were in love with her but were too shy to tell her.† â€Å"Forgive him,† Clint said piously. â€Å"He knows not what he does.† Simon popped out onto the landing. â€Å"Flood, did you drug this bitch? She won't wake up.† â€Å"Stay out of the bedroom!† Tommy shook off Lash and Clint and ran up the stairs. Cavuto chewed an unlit cigar. â€Å"I say we go to the kid's house and lean on him.† Rivera looked up from a stack of green-striped computer printout. â€Å"Why? He was working when all the murders happened.† â€Å"Because he's all we've got. What about the prints on the book; any thing?† â€Å"There were half a dozen good prints on the cover. Nothing the computer could match. Interesting thing is, none of the prints were the victim's. He never touched it.† â€Å"What about the kid; a match?† â€Å"No way to tell, he's never been printed. Let it go, Nick. That kid didn't kill these people.† Cavuto ran his hand over his bald head as if looking for a bump that would hold an answer. â€Å"Let's arrest him and print him.† â€Å"On what charges?† â€Å"We'll ask him. You know what the Chinese say, ‘Beat a kid every day; if you don't know why, the kid will.  » â€Å"You ever think about adopting, Nick?† Rivera flipped the last page of the printout and threw it into the wastebasket by his desk. â€Å"Justice doesn't have shit. All the unsolved murders with massive blood loss involve mutilation. No vampires here.† For two months they had avoided using the word. Now, here it was. Cavuto took out a wooden match, scraped it against the bottom of his shoe, and moved it around the tip of his cigar. â€Å"Rivera, we will not refer to this perp by the V-word again. You don't remember the Night Stalker. This fucking Whiplash Killer thing the press has picked up is bad enough.† â€Å"You shouldn't smoke in here,† said Rivera. â€Å"The sprout eaters will file a grievance.† â€Å"Fuck 'em. I can't think without smoking. Let's run sex offenders. Look for priors of rapes and assaults with blood draining. This guy might have just graduated to killing. Then let's run it with cross-dressers.† â€Å"Cross-dressers?† â€Å"Yeah, I want to put this thing with the redhead to bed. Having a lead is ruining our perfect record.† She woke to a miasma of smells that hit her like a sockful of sand: burned eggs, bacon grease, beer, maple syrup, stale pot smoke, whiskey, vomit and male sweat. The smells carried memories from before the change – memories of high school keggers and drunken surfers face-down in puddles of puke. Hangover memories. Coming as they did, right after a visit from her mother, they carried shame and loathing and the urge to fall back into bed and hide under the covers. She thought, I guess there's a few things about being human that I don't miss. She pulled on a pair of sweatpants and one of Tommy's shirts and opened the bedroom door. It looked as if the good ship International Pancakes had run aground in the kitchen. Every horizontal surface was covered with breakfast jetsam. She stepped through the debris, careful not to kick any of the plates, frying pans, coffee cups, or beer cans that littered the floor. Beyond the freezer and the counter she spotted the shipwreck survivor. Tommy lay on the futon, limbs akimbo, an empty Bushmill's bottle by his head, snoring. She stood there for a moment running her options over in her head. On one hand, she wanted to fly into a rage; wake Tommy up and scream at him for violating the sanctity of their home. A justifiable tantrum was strongly tempting. On the other hand, until now Tommy had always been considerate. And he would clean everything up. Plus, the hangover he was about to experience would be more punishment than she could dole out in a week. Besides, she wasn't really that angry. It didn't seem to matter. It was just a mess. It was a tough decision. She thought, Oh heck, no harm, no foul. I'll just make him coffee and give him that â€Å"I'm-so-disappointed-in-you† look. â€Å"Tommy,† she said. She sat down on the edge of the futon and jostled him gently. â€Å"Sweetheart, wake up; you've destroyed the house and I need you to suffer for it.† Tommy opened one bloodshot eye and groaned. â€Å"Sick,† he said. Jody heard a convulsive sloshing in Tommy's stomach and before she could think about it she had caught him under the armpits and was dragging him across the room to the kitchen sink. â€Å"Oh my God!† Tommy cried, and if he was going to say anything else it was drowned out by the sound of his stomach emptying into the sink. Jody held him up, smiling to herself with the satisfaction of the self-righteously sober. After a few seconds of retching, he gasped and looked up at her. Tears streamed down his face. His nose dripped threads of slime. Cheerfully, Jody said, â€Å"Can I fix you a drink?† â€Å"Oh my God!† His head went back into the sink and the body-wrenching heaves began anew. Jody patted his back and said â€Å"Poor baby† until he came up for air again. â€Å"How about some breakfast?† she asked. He dived into the sink once again. After five minutes the heaves subsided and Tommy hung on the edge of the sink. Jody turned on the faucet and used the dish sprayer to hose off his face. â€Å"I guess you and the guys had a little party this morning, huh?† Tommy nodded, not looking up. â€Å"I tried to keep them out. I'm sorry. I'm scum.† â€Å"Yes, you are, sweetheart.† She ruffed his hair. â€Å"I'll clean it up.† â€Å"Yes, you will,† she said. â€Å"I'm really sorry.† â€Å"Yes, you are. Do we want to go back to the futon and sit down?† â€Å"Water,† Tommy said. She ran him a glass of water and steadied him while he drank, then aimed him into the sink when the water came back up. â€Å"Are you finished now?† she asked. He nodded. She dragged him into the bathroom and washed his face, rubbing a little too hard, like an angry mother administering an abrasive spit-bath to a chocolate-covered toddler. â€Å"Now you go sit down and I'll make you some coffee.† Tommy staggered back to the living room and fell onto the futon. Jody found the coffee filters in the cupboard and began to make the coffee. She opened the cupboard to look for a cup but the Animals had used them all. They were strewn around the loft, tipped over or half full of whisky diluted by melted ice. Ice? â€Å"Tommy!† He groaned and grabbed his head. â€Å"Don't yell.† â€Å"Tommy, did you guys use the ice from the freezer?† â€Å"I don't know. Simon was bartending.† Jody brushed the dishes and pans from the lid of the chest freezer and threw it open. The ice trays, the ones Tommy had bought for the drowning experiment, were empty and scattered around the inside of the freezer. Peary's frosty face stared up at her. She slammed the lid shut and stormed across the room to Tommy. â€Å"Dammit, Tommy, how could you be so careless?† â€Å"Don't yell. Please don't yell. I'll clean it up.† â€Å"Clean it up my ass. Someone was in the freezer. Someone saw the body.† â€Å"I think I'm going to be sick.† â€Å"Did they come into the bedroom while I was sleeping? Did they see me?† Tommy cradled his head as if it would crack at any moment and spill his brains onto the floor. â€Å"They had to get to the bathroom. It's okay; I covered you up so the light wouldn't get to you.† â€Å"You idiot!† She snatched up a coffee cup and prepared to throw it at him, then caught herself. She had to get out of here before she hurt him. She shook as she set the cup on the counter. â€Å"I'm going out, Tommy. Clean up this mess.† She turned and went to the bedroom to change. When she emerged, still shaking with anger, Tommy was standing in the kitchen looking repentant. â€Å"Will you be home before I leave for work?† She glared at him. â€Å"I don't know. I don't know when I'll be back. Why didn't you just put a sign on the door, ‘See the Vampire'? This is my life you're playing with, Tommy.† He didn't answer. She turned and walked out, slamming the door. â€Å"I'll feed your turtles for you,† he called after her.

Sunday, September 29, 2019

Mini Usa

MINI USA After working together for almost five years, MINI USA’s advertising agency, Scheid, Roberts, and Reicher (SRR) decided to resign the MINI account in order to pursue a larger account with Volkswagen. MINI USA had developed a significant successful client-advertising agency relationship with SRR since the launch of MINI Cooper in USA, and MINI’s advertising had been highly unconventional. For Trudy Hardy, marketing manager for MINI USA, the first challenge was starting over and finding a new but unique advertising agency before the end of the year.The selection process would be the crucial part. This analysis will discuss about the development of MINI and SRR, the alternatives of campaign strategy, and the recommendations to the MINI USA. For the last 40 years, MINI has become a cultural icon in all of those automobiles. Originally, MINI was deigned for those people who seeking frugal transport. After the acquisition of BMW, the new MINI model had been designed with a more evolutionary approach in terms of design combined with BMW’s reputation for delivering high-performance, driver-oriented cars.However, MINI was still seen as a less expensive car to compete at luxury end of a maturing world market. Before the official launch of US’s Marketing, plans were to position the MINI as a Premium small car because MINI Cooper was smaller and more expensive than some of the better-established compact cars made by Honda, Toyota, and Nissan. According the initial MINI marketing material and media reports, the MINI Cooper was described as â€Å"fashionable accessory to an affluent, urban-hipster lifestyle. This report suggested that the target market for the MINI was not limited to a specific demographic group or socioeconomic class but rather was more of a lifestyle choice or mind-set. From this report, MINI and BMW AG decided that the psychographic might have a significant impact on the purchase of a MINI. Also, the new MINI should b e marketed as a particular segment of car buys. By allowing buyers of MINI to add optional features and color schemes and limiting MINI’s advertising to traditional media such as television and radio, MINI was reinforcing the image of its otential buyers seemed less interested in being part of the mainstream. In 2001, SRR become the ad agency for MINI. The perfect relation between MINI and SRR enable SRR grew to more than 300 employees from fewer than 50. And MINI’s unit sales from 24,590 in 2002 increased to 40. 820 units in just 4 years. In addition to the strong sales figures, a consumer survey indicated that brand awareness for the MINI among the car-buying public was as high as 25%. This win-win situation was driven by a lot to the innovative and classic advertisement campaign produced by MINI and SRR.MINI and SRR’s advertising since the launch of the Cooper had been highly unconventional: they insisted using print and nontraditional marketing technique suc h as outdoor marketing instead of using television or radio, which was not cost effective. Meanwhile, they developed a booklet, The Book of Motoring, convey the message that what does MINI meant. Also, the SRR and the MINI marketing team designed a series of promotional events and publicity stunts to create additional buzz for the brand.For Trudy Hardy, there are several ways to rescue the jeopardy situation: The first choice would be try their best to find a new advertising agency. MINI could choose if they want to follow the old marketing strategy or go to a completely new one base on the selection process. The problem is MINI might not be able find any agency could be either follow the old marketing strategy or contribute a new idea. The second way for MINI is develop their own Marketing & advertising department. The MINI had been launched in US for almost five years.The crew of MINI should have a better understanding of MINI cooper than any other advertising agency. The in-house marketing department would be able to convey the spirit and message of MINI perfectly. However, developing an in-house department is not easy. Company has to spend a large amount of money on some specify talented people just for one –time project. And also, MINI didn’t have enough time to build a team in short period of time. Lastly, trying to get SRR back would be a way to solve the problem. SRR decided to resign to pursue a larger account with a competing German automobile manufacturer.If SRR is just for a larger account or a higher compensation, MINI could raise the price or compensation for SRR. If SRR is for another reason, MINI could also negotiate with SRR and try to figure out what is the real reason and get SRR back. From these three choices, the first one would have less impact on MINI’s future business. First of all, MINI knows its product better than anybody else, and MINI cooper is such a unique product. As long as MINI is able to convey the core v alue of MINI cooper and the way they want to market itself, it shouldn’t that hard for other agencies to catch the idea.Also, MINI could change the service any time. From the cost’s perspective, the first choice would cost less than any other options. Developing its own in-house marketing department or raising the compensation to get SRR back will case a significant high cost for MINI USA. Usually the average time of cooperation between companies and their advertising agencies is two to three year. This is just a normal business transition. MINI should focus on their future marketing strategy and how to convey this to the potential advertising agencies.What if MINI selected to find a new advertising agency, however, they found that none of those potential could meet MINI’s requirement? MINI should also have a contingency in case they couldn’t find the advertising agency or they picked a agency could not make a good campaign or promotion. I will have two s uggestions: one is keep using the old marketing strategies had been proved their successes until they find a new advertising agency could meet their requirement. Or to brainstorm and come up with some creative but less cost ideas by MINI USA’s own marketing department and take advantage of those unconventional outlets.

Saturday, September 28, 2019

Acknowledgement

The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information. On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the system’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy – is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management – is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database – is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System – is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification – is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie Theater Charging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024Ãâ€"768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk – wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: †¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. †¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. †¢ The system was able to track whom librarian is accountable for the loss of a returned material. †¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: †¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed †¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button †¢ Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA.. Acknowledgement The interrogator emits a field of electromagnetic waves from an antenna, which are absorbed by the tag. The absorbed energy is used to power the tag’s microchip and a signal that includes the tag identification number is sent back to the interrogator. The use of a wireless non-contact system that uses radio frequency  electromagnetic fields  to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Backround of the Study Tanauan Institute has already been using the Library System. Since the institution is already using such technology, these will be the first time for the institution to use Radio Frequency Identification. The researchers thought of maximizing its use by creating a system that will track the students who borrowed books, which will be having RFID stickers for monitoring purposes, in the library. Currently, the school’s library is using the â€Å"Library System† in monitoring the books, which has a number of limitations. It is not capable of generating reports that can determine the books that are mostly borrowed which can help them decide on the number of a particular book they will be purchasing in the future. It is also using Microsoft Visual Basic for the system’s database which can only store very limited information. On the other hand, the system that the library is using in recording the attendance of the users cannot help them in identifying the library users of the month. The librarians need to manually count the number of times each student had logged in the system. Lastly, they have also no means of reminding the library users regarding their borrowed book Statement of the Problem Not capable of generating reports that can determine the books that are mostly borrowed. No means of reminding the library users regarding about their borrowed books. Manual counting the number of times each student had logged in the system. Objectives of the Study Generally, the researchers aim to design and develop a system that would enhance the use of the current Library System with the help of RFID in the said Institute. Specifically, the study aims to: Design and develop a system that will generate reports to determine the trend in book borrowing Use MySQL for the system’s database Determine the library users of the month in just a click of a button Remind the students and faculty members regarding their borrowed books Test and evaluate the system’s accuracy and reliability Scope and Delimitation There would be some limitations to the project that should be taken into consideration. This study limits its coverage to the students of the Tanauan Institute only. It will be conducted for two semesters which consists of 10 months. Two low frequency ACR122U Smart Card Readers will be used for the system: one for the monitoring of books and the other one for the recording of the attendance. The system will be written in Microsoft Visual Basic 2010. The database that will be incorporated with such is Microsoft My SQL. It will execute only in platforms running Windows Operating System. The applications of the system will only cover the monitoring of books and tracking of the borrowers. Other unavoidable circumstances, such as power interruptions and speed of access, and other more complex areas of RFID Technology, such as securing the data, are no longer part of the study. Conceptual Framework For the researchers to be able to come up with a Radio Frequency Identification Reloading System, they will need very flexible and versatile knowledge in using the VB. NET programming language and in using the MS Server 2008. They will also be needing materials such as ACS Readers, tags which should be compatible with the reader and a desktop running Windows operating system. The related foreign and local studies and literature would also be of big aid to them because of the given information and problems with solutions of these materials. With all the knowledge, the materials to be used and the related resources, the researchers will need to carefully plan the whole study which is going to be the foundation of their research as a whole, gather and analyze data before they design and code the system. After the coding stage, the researchers need to test and evaluate their study. If necessary, modifications should be done to perfect the system. Conceptual Paradigm Below is the figure of the conceptual paradigm of the study: NOTE:::: REVISED PARADIGM MAKE A NEW DIAGRAM.. PLACE IT HERE!!!.. Figure 2. Paradigm of the study Definition of Terms Accuracy – is a characteristic of a reliable system achieved from a number of tests and evaluation. Circulation Management – is a division in the library which is in charge of managing the borrowing and the returning of library materials. Collection Management- is a division in the library which is in charge of maintaining the collection of the library materials through adding or updating records. Database – is an organized collection of data needed for storing, updating, retrieving and viewing information for a particular system. Library Management System – is the system which will be an aid for monitoring the books and tracking and reminding the borrowers in a certain library. Radio Frequency Identification – is one of the newest identification technologies that use electromagnetic fields to transfer and read data that will be integrated by the researchers in this study. Chapter 2 Related Literature and Studies A. Related Literature Foreign Literature Holloway (June 2006), Microsoft EMEA Manufacturing Industry Solutions Architect, wrote a white paper which explained the components of a basic RFID system and how it works. According to him, an RFID system is composed of three important pieces of equipment such as: (1) a small radio device called a tag, or the transponder, which contains the data, (2) the reader, or the interrogator, that transmits and collects data to be downloaded from and uploaded to the tag, and (3) the host computer installed with an RFID software to process the data into valuable information. Daniel (2004) summarizes the operation in a basic RFID system as discussed below: First, the tag will enter the RF field of the Reader then, the RF signal will power the Tag that will transmit the ID with other data which, on the other hand, will be sent to the computer by the Reader. Then, the computer will be the one sending data to the Reader which will be transmitted to the tag. In a paper published by Mitrokotsa and Douligeri (2009), â€Å"Integrated RFID and Sensor Networks: Architectures and Applications†, they discussed and differentiate RFID and Wireless Sensor Network (WSN) Technologies. They also discussed why these technologies should be implemented to various fields of business and their requirements. Since the proponents will be using RFID, the tips, which are proven effective, given in this study on how to have better RFID-based systems will be of big help in conducting their study. Soldatos (2010) formulated a study entitled Rich Client Application for RFID EPCIS Repository wherein he created software which intended to provide a UML-like graphical representation of the business locations, and read points of an enterprise with a more user friendly RFID-based software system. Dhanalakshmi and Mamatha (n. d. ) wrote a paper wherein they discussed the project that they created entitled â€Å"RFID Based Library Management System† which is very similar to the study being conducted by the proponents. In their study’s conclusion, they have indicated and proven that RFID in the library speeds up its transactions such as book borrowing, returning, searching thus enables staff to do more of its responsibilities. Mutigwe and Aghdasi (n. d. also conducted a study entitled â€Å"Research Trends in RFID Technology† wherein they have given attention at continuing research activities in the field of RFID and talked about the possible major burdens that RFID Technology is facing today such as privacy, high costs, and social and legal concerns. Local Literature Garcia (2009) made a study, â€Å"Student Recognition Using Radio Frequency Identification for Tarlac State University†, which was undertaken to develop a system that would support and i mprove the current way of identifying students at Tarlac State University. The system is capable of importing excel files to update student records. Through the images and the information displayed by the system, security officers find it easy to identify the students entering the school campus. Reports can be generated for administration and filing purposes. The concern of security was also addressed because the system can control users and produce integral records. Similar to the study of the proponents, the system that they will create can also generate reports for monitoring and inventory purposes. Another study which also focused on the record keeping of students who enter and exit the school premises is the â€Å"Design of RFID Interface System: A Prototype† conducted by Engr. Dellosa (2007). He designed a circuitry capable of indicating the arrival and departure of the students in such a way that the students can also be notified. He also developed software capable of capturing and recording the student’s names together with their time of arrival and departure within the school premises. B. Related Studies Foreign Studies A study of Botterman and Oranje (May 2009) entitled â€Å"Study on The Requirements and Options For RFID Application in Healthcare† proved that RFID Technology is versatile and can also bring improvements in the field of healthcare. It also proved that the speed of access and speed of processing of transactions, the inventory of equipment, and the monitoring of the patience and employees can be improved by RFID. Lastly, Zherdev (2011) performed a study, â€Å"Storing and Reading Sensor Data from Battery Assisted Passive RFID†, which dealt with tags of battery assisted passive-type and ISO 18000-6C standard. His study evaluated and improved a system designed to transmit information about the bearings status of railway wagons. It is related to this study being conducted by the proponents since they will also be using the passive type of RFID tags. Shariff of Longitude Consultancy Services made a proposal for schools to implement systems incorporated with RFID Technology for attendance monitoring, library management, and logging in school buses. He reasoned out the needs for such advancement which made the proponents more eager in pursuing this study. Local Studies Studies were not only done in other countries but also in the Philippines as well. Filipinos also hunger for knowledge and improvements in the field of Technology. One of the pioneers in using RFID Technology to make its transactions faster and more efficient is the Mapua Institute of Technology with its Cardinal Plus Model which made many transactions convenient ever since it was introduced to the Institute such as securing student identification upon entering the campus and online grade access of students. This study is somehow related because both implementation targets are in universities. A study conducted by Balbacal (2005) entitled â€Å"Automated Bus Fare System† is related to the system that the researchers is planning to create. In Balbacal’s system, she used reloadable cards which used barcodes in riding a bus and paying for the fare. The amount to be reloaded on a card depends on the user’s capability to pay. However, Aquino et. al’s (October 2009) â€Å"Automation of the Movie Theater Charging Procedures Through the Use of RFID† proved that RFID Technology can also improve the field of entertainment. Their system was able to eliminate queuing problems improve charging operations of the system implied on improvement in the efficiency, reliability accuracy of the operation. Even though the field of implementations of their study and the researchers’ are not the same, the purposes of both are identical. The researchers want to eliminate the redundancy in recording the attendance of the students which the existing system is not capable of. In Villame’s (2010) research entitled â€Å"Carrier Suppression Locked Loop Mechanism for UHF RFID Readers†, he made an improvement on the front-end architecture of UHF RFID readers to address the problem of having the performance of the reader limited as the active components in the receiver become saturated due to having the readers being exposed to strong carrier leakage signals because of the antenna reflections and limited isolation of circulators and directional couplers. This would be of great help but the researchers indicated that other complex aspects of RFID such as isolation of signals will not be covered by this study. Chapter 3 Methodology Research Design In every study, the method of research to be used is very important. The whole study somehow depends on such method because it will determine how the data collected will be handled. The goal is of this method is to acquire accurate and systematic data which are based on facts that can be used in averages, frequencies and similar statistical calculations. It often uses visual aids such as graphs and charts to aid the reader in understanding the data distribution. The researchers are also taking into consideration the use of developmental research. In a paper published by James D. Klein et. al, (n. d. ) they define it as studies that involve the production of information with the goal to improve the development of instructional design, development, and evaluation. Such research is based on either situation-speci? c problem solving or generalized inquiry actions. Sampling The researching process will take place at the Tanauan Institute, a institute located at J. V. Gonzales St. Pagaspas Tanauan City. The researchers have chosen this institution because it is where they are currently studying and it was the first time the school will use the RFID system. Instruments/Tools The primary tools that will be used in gathering the needed information for this study are researching and browsing from the net. The secondary tools will be the related foreign and local literature and studies that the researchers have gathered. Gathering Data The process of the data we gathered is divided into five phases namely: Identify and Analyze the Requirements. In this phase, the proponents will gather all possible requirements that the end user expects from the system to be developed. These requirements will dictate the functions that will be integrated in the system. Design the System. Upon gathering and analyzing the requirements of the end user, the designing of the system will follow. This phase is important because the system’s design will dictate the overall system architecture. If the proponents have inquiries about the system, they can gather and analyze the requirements again. Code the System. After designing what the system will look like, the proponents will start the actual coding of the system. This design of the system will be the basis of how the system will look like. Test the System. To ensure that the system is efficient and reliable, several tests will be conducted. If the system fails the testing phase, the proponents will go back to the second phase which is designing of the system. 5. Acceptance of the System. After having proven that the system is functioning well, it will be deployed to the end user and they will be trained on how to use it. They will evaluate if their requirements and expectations have been met. If not, the proponents have to go back to the first phase again and start all over. Software Specification |Operating System |Microsoft Windows XP or higher | |Microsoft SQL Sever |2008 or higher | |Microsoft . Net Framework |4. 0 or higher | |Windows Internet Explorer |7 or higher | |ACS CCID Driver | | Hardware Specification |Memory |2 GB or higher | |Processor |2. GHz or faster | |Hard Disk |At least 3GB of available space | |Monitor |1024Ãâ€"768 or higher resolution | |Printer | | |ACR122U NFC Reader | | Gantt Chart ILAGAY DITO†¦ Chapter4 The Proposed System User and Needs of the Study Proposed system is the Tanauan Institute New College Library Management System. Through our software user can add books, update books, search books, update information, edit information, record the attendance of the borrowers, borrow and return books in quick time. Our proposed system has the following advantages. ? User friendly interface ? Fast access to database ? Less error ? More Storage Capacity ? Search facility ? Look and Feel Environment ? Quick transaction All the manual difficulties in managing the Library have been rectified by implementing computerization. Analysis General Features of the System RFID technology has been applied in libraries just over a decade, though the technology is not yet mature but its rapid development allows more and more functions to be achieved. RFID is still in its developing stage in libraries, the technology originally can only simply achieve the self-check-in and check-out function, but till now, the effectively inventory, logistics and sorting the returned books are all able to be achieved. The library can adopt RFID technology aim of improving the self-service. Patrons can borrow and return the items using automatic lending machines, which require a library card and a PIN. Self-service becomes much easier with this new technology as it does not require line of sight and max. 3 items can be borrowed at a time. So far, the frequency of self-service is nearly 100%. Besides, sorting the returned books greatly reduces the library staffs manual work. As RFID label has anti-theft function, there is no need for an extra alarm strip to be attached to the item, which makes the borrowing and tagging tasks a lot easier accordingly. Chapter 5 Implementation Program Testing We the researchers have come up to test the system with different specifications to know the compatibility of it to the system. The researcher make sure that they will not have any problem during implementation and also we asked the end user to see and to test the system, if they had any wanted to changed or add on the system. To ensured that the system is efficient. Documentation Plan The documentation has seven chapters. The first three chapters were made during the first part of the study, these three chapters guide the researcher to create a system what look alike. The last four chapters were made at the second part together with the system proposal. Data Management Plan We the researchers gathered data by acquiring information on some schools, browsing the net, getting some ideas with the old system, library research, asking personal questions and getting information through handouts. Resource Management Plan The development of the software would not be possible without the following components: A. Computer – an electronic device uses to manipulate data. B. USB Flash Drive – is a data storage device that includes flash memory with an integrated Universal Serial Bus (USB) interface. C. Hard Disk – wherein the system is stored and the soft copy of the documentation is saved. D. Ballpen Paper – use for writing down the documentation and other important information. E. Internet – the primary tool of the researchers that used to gathered the needed information or data. F. Printed Materials – used for additional reference. G. Printer – used to provide hard copy of the program code and documentation. All the data which were manipulated throughout the process of the study were stored in the computer hard disk drive with back up on several flash drives. Quality Assurance Plan The researchers ensure the most precise and direct method of providing the software with highest regard on procedures thereby providing easy access for end user. Accuracy and efficiency of the software is likewise ensured thereby providing the end users guaranteed reliable software. Security Plan The researchers ensure that all data, documentation, codes and system were provided sets of back up. And though the system, the researchers put a login form on the system to ensure that no one can access or view, only the end user can use it. Training Plan Formal training on how to use the program for end users will be provided by the researcher, if needed. The system is intended to use by an end-user acting as the administrator and could add another administrator that will do the same task to facilitate all their activities. Chapter 6 Maintenance Upon the implementation of the system, that is downloading and debugging the entire system, the researchers assures extension of services for future modifications or updates of information already published responsibilities: 1. Provided with the necessary updates on information, the researchers will plan the necessary layout modification, if needed. 2. According to the layout planned, necessary changes in the codes follows. 3. Appropriate testing of the modified code is to be done to ensure efficiency and accuracy. 4. Updating other details is provided by the system 5. Providing back-up of the modified code 6. Providing updated documentation 7. Entrusting all the used resources to the appropriate authorities. Hardware maintenance is beyond the duty of the researcher. Chapter 7 The Summary of Findings, Conclusions and Recommendation Summary Library Management, particularly Circulation and Collection, in Tanauan Institute uses a semi-automated system which has a number of limitations such as incapability of automatically generating reports and statistics, and loss, inconsistency, and in accuracy of data. Since this institution is already using RFID Technology in monitoring the attendance of its students, the researchers attempted to resolve such issues by creating an RFID-Based Library Management System using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008 with the students and the librarians as the target beneficiaries in mind. Modified waterfall was the research model used by the researchers which helped them in the distribution of the tasks they need to accomplish. Descriptive method of research was also utilized in order to gather data more accurately and systematically with the use of data gathering tools such as surveys with open and close ended questions, interviews, and time motion study represented by graphs and tables to test and evaluate the system’s reliability and the user’s acceptance. Conclusion Through months of conducting this study, starting from the data-gathering-phase up to the deployment-phase, with the aid of the surveys, interviews, and time motion study analyzed, the researchers concluded the following statements about their Tanauan Institute New Library RFID-Based Library Management System: †¢ The system was able to generate statistics and reports by just a click of a button which can help them in forecasting and identifying the library users of the month. They can now finally be assured regarding the accuracy and reliability of the data generated. †¢ The system can cater larger amount of data which is what the library practically needed at this time that they are upgrading the amount of their collection. Data loss will now be finally eliminated. †¢ The system was able to track whom librarian is accountable for the loss of a returned material. †¢ The system was able to help them in reminding the students regarding their unreturned materials. Recommendations For the future researchers to improve, the researchers suggest the following: †¢ Module for printing of a receipt-like for library users as a confirmation of the material that they have returned or borrowed †¢ Module for printing of a book-card-like after adding or updating a particular library material so that librarians can now generate it with just a click of a button †¢ Module to Include visitors who don’t have RFIDs LAGYAN PA NG RECOMMENDATION YUNG NDI NYO NAGAWA..

Friday, September 27, 2019

Photography as art Essay Example | Topics and Well Written Essays - 2000 words

Photography as art - Essay Example It was in the 1920s and 30s (Edmundson 2007, p.23). Ernest Dicher builds upon the theory so that it can have its use as a technique in marketing. The fact of improving upon the theory of Psychoanalysis by Sigmund Freud on primary unconscious brought about other factors that got hidden. Ernest Dicher brought about new ideas that were interesting in the field of marketing. It placed the executive of corporate in a better position towards efficiency and success of their organizations. The result was that they could sell more of their products due to successful advertising and also better communication with the potential customers. Psychoanalysis technique has played a major role in the advertisements and marketing as the document discusses (Freud & Eder 2005, p.46). Both politics and business make the use of the psychological techniques to create, read and also meet the demands of the people. They are able to make their products and also speeches pleasing to the people and also consumers. The issue attracts interest due to the intentions of the use of psychoanalysis techniques. Politicians are supposed to engage with the conscious mind of the citizens and also fulfill the needs of the people. The use of the psychoanalysis techniques renders them questionable upon the implementation of their responsibility to the society (Freud 2003, p.67). The objective towards the use of Psychoanalysis is providing a person an insight to the motivations and also desires that be unconscious to them. The theory of psychoanalytic indicates that the origin of personality in an adult is a deep conflict between a person’s desire to fulfill their needs and their obligation to become a responsible person in the community. In accordance to the theory of Freud, the struggle takes place in the mind of a person and it has three elements associated with it, the ego, super ego and also the id. In the analysis made by Freud, the id is oriented towards

Thursday, September 26, 2019

How do symphony orchestras manage their members before a song Essay

How do symphony orchestras manage their members before a song successfully performed in front of the audience - Essay Example The implication here is that the musicians/organisational members, must subsume themselves into the whole and, rather than perceive of themselves as individuals, see themselves as integral parts of the unit, complimenting and completing the whole. While there tends to be a dearth in the literature on symphony orchestra management, the few sources which were located for this research unanimously attested to the complexity of managing a symphony orchestra and held the conductor as an exemplification of the total quality manager (Morgan, 1980; Chong, 2000; Rentschler, 2002). Not only is he entirely responsible for the management of orchestra members, musicians, towards the execution of a perfectly timed and completely harmonious and faultless musical performance but his responsibilities include organisational visioning, strategic direction, audience development and fundraising. To be effective, the musical leader/conductor of the orchestra must possess a combination of skills, the most significant of which appear to be artistic and musical skills, organisational skills, and charismatic leadership (Morgan, 1980). Proceeding from the above stated, and as may have been deduced from the foregoing, this research will establish the extent to which effective leadership and efficient management are integral to success, looking at the case of symphony orchestras. 2 Symphony Orchestra as Organisation The operations and performances of the symphony orchestra have always been expensive. In earlier decades, when orchestras presented their unpaid bills at the end of a season, wealthy patrons wrote personal checks to cover the costs. As generations progressed, patronage was no longer a reliable source of financial security, and local corporations stepped up to help with the burden (Holland, 2003). Organisational power was placed into the hands of a Board of Directors culled from the elite patrons (Couch, 2005). As a cultural institution, the symphony orchestra is a collective organisation of diverse groups committed to preserving a vital part of cultural heritage. Through the collaboration and commitment of musicians, administrators, volunteers and patrons, the orchestral organisation protects the viability and strength of symphonic music. Nearly every role in the orchestral organisation demands a combination of high-level skills in music as well as the logistics of production and management. Behaviour in modem orchestras is deeply institutionalised, growing out of practices and traditions that began more than a century ago. With large infrastructures to support, little room for financial errors, and ambiguous leadership structures, orchestras

Thunder Heart Essay Example | Topics and Well Written Essays - 1000 words - 3

Thunder Heart - Essay Example Whose City†. The effects of social networking in urban environments for young adults, like the ones seen in the film, can have negative results attributed to them, especially in urban neighborhoods. As seen in the film, young adults would go out to neighborhood hangouts, like a bar or club, to meet people and dance. Such activities can be fun but also be misleading. As seen in the movie, the two young ladies, Maria and Blanca, went to a club just to dance and hangout. They happen to meet some guys who appear to be harmless and a friendship arises. As the friends begin to see each other more often they begin to learn more about one another. This is where misleading networking plays a role. One of the guys met at the bar happens to have associates within a drug ring and is tied to drug smuggling. Soon after, Maria and Blanca become smugglers for their new friends associates. Had the two girls not tried to network with others at the bar they might have evaded this ultimate outcome. Therefore, the n egative effect of social networking in these kinds environments is that people may seem to be one thing but are something quite different. In areas where drug trade is openly visible and common, like the setting in Columbia, social networking can be dangerous. This danger can also be associated in context with control of the urban cities. The danger associated to urban cities is the means of one’s sacrifices for survival. In deprived cities, like the one in the film, money is the most admired commodity. In areas where plantations and industries thrive, workers and laborers certainly do not share the profits attained by these businesses. Workers wages do not meet the bar for providing for their family and ones own personal needs therefore the danger of the drug trade looms. Drug distribution is highly recognized and sought after due to the large

Wednesday, September 25, 2019

Custmer care Essay Example | Topics and Well Written Essays - 1000 words

Custmer care - Essay Example The businesses who are struggling for improving their customer service are unable to consider and recognize the need and role of their own employees. The traditional form of approach to customer service through customer relationship management and automated workflows are not performing well as they are not considering the power their employees. Customer service can be transformed by the customer service organizations by empowering their employees. The employee empowerment can transform customer service providing benefits to business, customer and employee, the three stakeholders in customer relationship. Empowerment Empowerment is the process of granting greater responsibility to everyone who works for an organization. In literal sense, it denotes granting the power of making decisions. It is the process of authorizing or enabling an individual to behave, thinks, control work and take action and make decisions in autonomous ways. Empowering the members of an organization is a tremend ous motivational tool as it provides them the feeling that they are contributing to the organization by their own initiative and are improving the performance and achieving better results. The empowerment of employees plays a significant role in achieving superior customer service as they are the best in performing their jobs (Mabey, Skinner and Clark, 1998, pp.42-43). Ways of empowerment The empowerment can be fostered among the employees of an organization in the following manner: Creation of non-threatening environment The empowerment and creativity are defused by the traditional organizations using power and micro management. Creativity and empowerment should flourish in the organization by providing freedom to employees in respect of pursuing their interest and they should be supported and encouraged by the management. Resolving problems by employees The managers should not always provide answers to every problem; rather the employees should be guided to think critically for th emselves to resolve the issues. When employees will act on their own, it will result in better solutions because they will be the experts while performing their jobs and the manager might not have all the facts available with him. Allowing for mistakes Individuals and companies can grow and learn by making mistakes. The employees should be supported even after making mistakes. Learning is the most significant part that takes place within an organization. The employees should be encouraged to share information with the team. The individuals are not required to make mistakes to learn rather they can also learn from the mistakes of others. Respecting employee ideas or suggestions The ideas or suggestions of employees should never be ignored as one of these ideas may turn the company into a business of multi-million dollar. If an idea does not seem appropriate, the rationale should be discussed with the employee. This will not make the employee to feel ignored by the management. Develop ing each employee through projects Each employee should be made the team leader on a certain project which will provide them the confidence to grow and to be an excellent contributor within the company. Creating opportunities for advancement and development The excellent contributors are required to be felt valued. The additional work is

Tuesday, September 24, 2019

Black Leisure Assignment Example | Topics and Well Written Essays - 2500 words

Black Leisure - Assignment Example (Zagotta & Don, 2008, Issue 5) This mission is will be very successful in the communication of the strategy by use of mantra. The mission statements are also very well articulated to plan the strategy results rather than planning the activities. The Mission Statement has also clearly planned what Black Leisure's group will not do so that they avoid doing everything and finally end up not achieving anything. (Zagotta & Don, 2008, Issue 5) By mentioning the various sections that will be target for growth, the mission has taken the first step to open up to the organization. By use of the annual financial results and the quarterly feedback, these mission statements will be able to give feedback on the progress. Finally the whole statements has laid a foundation for a virtuous circle of improvement and implementation by the way it has been laid out. (Zagotta & Don, 2008, Issue 5) According to H. Ansoff (1988), there are two fronts that Black Leisure can adopt as marketing strategies to develop their objectives. These are the markets and products. Since Black Leisure has an existing market of outdoor retailing activities and existing product of clothing wear and Boardwear, they should concentrate to enhance the brands they have such as Peter Storm, One Earth, Eurohike, Storm Shield, Rarespecies, ALS, Technicals, O'neill, Freespirit and 100%MAMBO. They should have objectives of expanding the market turnover that is currently at 298.3 million and operating profit that had declined to 1.6 million due to poor brand sales force.(Ansoff, 1988, chapter 6.) (BernStein, 2007, p. 4) Black Leisure have an existing clothing brand product that they consider offering to new markets within and outside UK. These new market segments should be concentrate on youth style brands objectives, show fashion innovations, and have high sporting technology. They should also objectives that are focused on Boardwear and latest rebalanced wears that can be used for varied sport operations. (Ansoff, 1988, chapter 6.) ( BernStein, 2007, p. 8) Black Leisure Group have may be having a new product such as Outdoor and Boadwear clothing and an existing market such as skiing, mountaineering, walking and many others. The strategy should be to having objective of mixing the brands wear such as promoting a Freesprint Clothes and O'neill shoes; Storm Shield jackets combined with One Earth boots; Freesprint Sport shoes and ALS tracksuit and any other new mixes possible. (Ansoff, 1988, chapter 6.); (Bernstein, 2007, p. 6). Finally, Black Leisure have will need to formulate new products such as parachutes, goggles pressure pads and for new markets such as sky diving. This is becoming a popular sport activity whose objective will be to diversify the current product availabilities and capabilities with the customers being able to explore new geographical

Monday, September 23, 2019

A Report on the High Cost of College Education in America Essay

A Report on the High Cost of College Education in America - Essay Example 9 October, 10, 2011. Dr. Morgan Bill Joint University students’ union Washington, CO 456007 Dear Mr. Houston: The union is submitting this report, due October, 10, 2011, that was requested by the education ministry. The report is entitled the High cost of College Education in America. The purpose of the report is to inform the stake holders in the education sector on the high cost of college tuition in America which has become a source of discouragement for students who would like to have a high level of Education. It further emphasizes on the need work on the lowering of the cost of college tuition. The content of this report centers on the price of college education which is not equivalent to future salaries and is not worth all loans and credits acquired to fund education. Any questions concerning this report can be sought by contacting Mr. Morgan Bill, the union secretary, at 453-6897. Very truly yours, Morgan Bill, Secretary General. Executive summary The cost of college education in America has over years increasingly gone too high. High tuition fee charges in colleges is now proving to be the biggest problem facing college students, parents and sponsors. In this hard economic time, students and parents are now struggling a lot sourcing for funds to meet this high cost of tuition fee. This has ranged from sourcing school loans from banks and including selling of property assets to fund education. This trend has negatively impacted on the concerned parties to an extent where students have almost lost hope for a better future. One very strong negative impact that has so far been noticed is the discouragement it has had on the students undertaking various courses in various universities. It is quite clear from studies conducted by this team that on completion of college education individuals who graduate hardly get well-paying jobs that match the cost incurred while in college. Moreover, a greater percentage of the little money earned from these jobs end up being used to repay the loans that were borrowed during school days leaving a minimal percentage for investment. This therefore renders a larger population of the newly employed and young hustling for their entire life. From these insights it is therefore paramount to consider the cry of the large young population and consider a thorough review of the entire fee payment systems in colleges with intent of lowering its cost for the benefit of the future generation. Methodology A sampled group of about 40 students from sampled universities and colleges in the United States of America were interviewed with a view of getting background information from the affected groups. Similarly, various employees who had just completed training was sampled and interviewed. The method selected aimed at collecting data that will enable the researchers identify the problem and propose potential solutions. Findings The cost of college tuition for many colleges has over time become so expensive. T he price for college studies has neither equated the future salary of those taking the courses nor has it equal the loans and many credits being spent on tuition fees. It is therefore imperative to present this report as a means of passing a message of discontent and outcry facing parents and students who pay dearly to get valuable education (Heller, 2001). The biggest problem for millions of people living in America while joining a college or university is

Sunday, September 22, 2019

Using a pendulum Essay Example for Free

Using a pendulum Essay To find the gravity by finding the period of the oscillations of a pendulum and plotting a graph. Hypothesis and Prediction: the gravity from the graph is going to equal the gravity from the formula. Variables: The independent variable is the length of the string The Dependent variable is the period of one oscillation Controlled variables are: mass of the pendulum Equipment: -Brass Ball -string -boss and clamp -stopwatch -2 metal blocks -Meter Ruler -Micrometer -The diameter of the brass ball was measured using a micrometer. Then the value was divided by 2 to give the radius.-the length of the string was measured -two metal block were clamped with the string in between, the string was tied to the bob -the bob was pulled to the side and released -the time was started when the bob passed the reference line. -a full oscillation is when the bob passes the reference line forth back and forth again. the length of the string is increased or decreased in a regular pattern the time was monitored by reading through the stopwatch. -the same brass ball was used over the experiment to keep the mass constant. the length was varied 10 times with a 10 cm difference. -4 readings were taken for each 10 cm -the time was taken for 20 oscillations. And then divided by 20 to give one oscillation. Data Collection: Table number Length of String / M i 0. 05 Number of oscillations Time Taken/s i 0. 5 Period/s i The table contains the length of the string in meters, the number of oscillations, the time per 20 oscillations and the period of one oscillation. As the length of the string deceases , the time for 1 oscillation decreases. So the length of the string is directly proportional to the period. Data Processing and presentation: Example in working out average period when the string is 1. 01 The graph is plotted with Average period squared against length of string. Y=3. 9244x-0. 0087 3. 9244=gradient. 3. 9244= (4(pi)^2)/g g = (4(pi)^2)/3. 9244 g=10. 060 from the graph. The average gravity from the formula= 100. 614/10= 10. 614 Conclusion: the results where very close to the prediction but they werent the same as the graph is a scatter diagram.-the result from the graph is more accurate as the graph cancels inaccurate measurements. Evaluation: -the method had weaknesses. -the angle of the pendulum to the reference line isnt the same in each reading which might cause a slight error. -the Air conditional may effect the pendulum; it may change its speed or change its direction. it is difficult to stop the stopwatch and start it in the reference line exactly which might induce error sometimes the ball tends to move in a circular motion and the experiment will have to be repeated.