Friday, November 29, 2019
Bilingualism and Multilingualism
Bilingualism and Multilingualism Language is the influential aspect which determines the peculiarities of the peopleââ¬â¢s interactions in society. It is possible to discuss the usage of language for communication from psychological, linguistic, and sociolinguistic perspectives because language plays an enormous role in the formation of human identity.Advertising We will write a custom essay sample on Bilingualism and Multilingualism specifically for you for only $16.05 $11/page Learn More The peculiar features of the social development influence the progress of the situation when today many people are considered as bilingual or multilingual. Economical, political, cultural and social shifts to the development of international economy and integration caused the fact that the notions of bilingualism and multilingualism which are closely connected with the phenomenon of globalization became important aspects of a modern society. To understand the peculiarities of this tendency, it is neces sary to examine the definitions of bilingualism and multilingualism and determine the features in which these notions are similar or different. The issue of defining such notions as bilingualism and multilingualism is widely discussed by many researchers nowadays. The main difference of their approaches is in the consideration of these notions as similar or different in relation to their major characteristics. In her work, Pavlenko accentuates the fact that traditionally bilingualism and multilingualism are discussed as the same notions that is why she uses use the term ââ¬Ëbilingualismââ¬â¢ in order to study the aspects of bi- and multilingualism with paying attention only to the number of languages used by a speaker (Pavlenko, 2006). According to this idea, bilingualism should be defined as the phenomenon when people use two languages to realize their social interactions, and multilingualism is the phenomenon when people use more than two languages to complete their social n eeds (Altarriba Heredia, 2008).Advertising Looking for essay on linguistics? Let's see if we can help you! Get your first paper with 15% OFF Learn More However, to discuss the aspects of bilingualism and multilingualism, it is necessary to focus on the factor of the social motivation and psychological peculiarities of the ability to use two or more languages for interactions. To discuss the notions as the same, it is necessary to state that bi/multilingualism is a complex phenomenon which is influenced by social and psychological factors and also affects the structure of the languages used. This phenomenon is connected with the notion of codes. Thus, bilingualism is a result of ââ¬Å"psycholinguistic functioning of the mind when having two codesâ⬠(Ceroz Gorter, 2011, p. 357). Nevertheless, it is also possible to notice that multilingualism is a result of using more than two language codes. The usage of two or more codes results in developing code-mix ing and code-switching during the communication process (Ceroz Gorter, 2011). The peculiar features of code-mixing and code-switching are widely discussed by those researchers who support the opinion that bilingualism and multilingualism cannot be considered as the same notions. The base for their arguments is two views known as the ââ¬Ëfractionalââ¬â¢ view and ââ¬Ëholisticââ¬â¢ view (Perani Abutalebi, 2005). According to the first perspective, a bilingual is a person who interacts as two monolinguals depending on definite circumstances (Altarriba Heredia, 2008). The ââ¬Ëholisticââ¬â¢ view is more general and states that the languages used are interdependent and influence each other. Thus, the person who uses them should be considered as a unique personality following definite sociolinguistic peculiarities. Focusing on these two views, sociolinguists and psychologists accentuate that code- switching as the selection of definite linguistic elements in languages t o use is more typical for bilinguals and code-mixing is more typical for multilingual persons who combine the elements of many languages in one speech to complete the conversation goal (Myers-Scotton, 2006). Moreover, it is significant to pay attention to such points as the types of bi/multilingualism and their differences. Researchers define circumstantial bilingualism as the personââ¬â¢s usage of two languages according to the situation of communication and other socio-environmental factors which influenced the necessity to learn the second language (De Bot, Lowie, Verspoor, 2008).Advertising We will write a custom essay sample on Bilingualism and Multilingualism specifically for you for only $16.05 $11/page Learn More Circumstantial multilingualism can develop on the base of previous bilingualism under the definite living circumstances. That is why it is almost impossible to determine any strict differences in these types. Sequential bilingualism is based on the fact bilinguals develop some proficiency in their native language and then learn the second language. Thus, their knowledge about the native language can influence their acquiring the second language. The next stage after acquiring the second language can be multilingualism when a person studies languages sequentially. Thus, there are no obvious differences in sequential bilingualism and sequential multilingualism. The only fact which can influence the peculiarities of multilingual personsââ¬â¢ interactions is the ability to learn languages more effectively with using the knowledge about the first two or more languages (Wei Moyer, 2008). Passive bi/multilingualism is characterized by a personââ¬â¢s knowing two or more languages, but active usage in communication of only one of them (Paradis Navarro, 2003). Thus, the peculiarities of circumstantial, sequential, and passive bi/multilingualism cannot be considered as decisive for determining the differences in usin g the notions. Those researchers who develop the idea that bilingualism and multilingualism are similar notions accentuate the fact of ââ¬Ësoft boundariesââ¬â¢ between languages which are typical both for bilinguals and multilingual persons (Ceroz Gorter, 2011). Nevertheless, the other linguists argue that because of predominantly circumstantial character of bilingualism, ââ¬Ësoft boundariesââ¬â¢ between languages are more typical for the multilingual practice (Myers-Scotton, 2006). To determine the differences and similarities in the notions of bilingualism and multilingualism, it is possible to provide the general definition which is based on the opinion that a multilingual person differs from a bilingual only in the number of languages he knows. Moreover, multilingualism can also include the concept of bilingualism as the certain type of the phenomenon.Advertising Looking for essay on linguistics? Let's see if we can help you! Get your first paper with 15% OFF Learn More However, according to the ââ¬Ëholisticââ¬â¢ view with focusing on such aspects as code-mixing and ââ¬Ësoft boundariesââ¬â¢ between languages, it is possible to define a multilingual person as a man who uses more than two languages for realizing everyday social interactions. The main peculiarities of multilingual persons is the effective usage of more than two languages as the combination of codes (code-mixing) in order to achieve the goal of communication in spite of environmental factors. Multilingual persons differ from bilinguals in such aspects as the intensity of interdependence of the languages used, forming a unique personality from the psychological and sociolinguistic perspectives, and the usage of two or more languages and their combinations depending on their effectiveness according to the communicative goal. References Altarriba, J. Heredia, R. R. (2008). An introduction to bilingualism: Principles and Processes. USA: Psychology Press. Ceroz, J. Gorter, D. (2011). Focus on multilingualism: A study of trilingual writing. The Modern Language Journal, 95(iii), 356-369. De Bot, K., Lowie, W., Verspoor, M. (2007). A dynamic systems theory approach to second language acquisition. Bilingualism: Language and Cognition, 10, 7ââ¬â21. Myers-Scotton, C. (2006). Multiple voices. USA: Blackwell Publishing Ltd. Paradis, M. Navarro, S. (2003). Subject realization and crosslinguistic interference in the bilingual acquisition of Spanish and English: What is the role of the input? Journal of Child Language, 30, 371ââ¬â393. Pavlenko, A. (2006). Bilingual minds. USA: Multilingual Matters Ltd. Perani, D. Abutalebi, J. (2005). Neural basis of first and second language processing. Current Opinion in Neurobiology, 15, 202ââ¬â206. Wei, L. Moyer, M. G. (2008). The Blackwell guide to research methods in bilingualism and multilingualism. USA: Blackwell Publishing Ltd.
Monday, November 25, 2019
Age of Discovery essays
Age of Discovery essays I went to see Joseph McDonoughs play The Age Of Discovery on February 27, 2001 at the Seney-Stovall Chapel at the University of Georgia. Stanley Longman directed this particular version of the play, which is about two men, Lewis and Clark, and their insane and complicated journey trying to find their misplaced meteorite. Throughout their wild voyage, many personas and traits of the characters are developed as well as revealed to the audience. With the help of Clark and other characters such as Belle, Newton, Whitney, Perry, and Grandma, Lewis is able to come to important realizations about his own life. Throughout their crazy journey Lewis and Clark visit many different settings such as laundromats, junkyards, jail cells, and golf courses. The scenery, which consists of two turntables holding most of the props and decorations, is easily revolved between acts. Wardrobe also plays an important role in character assessment and evaluation. Although the play is held at a simplistic , light, and humorous level, the more considerable matters are still successfully noticed and absorbed by the audience. Lewis is initially introduced to the audience as an intense, anal person who is fixated with his work and stays continuously uptight throughout the play. He is obsessed with finding the rock and cannot understand how Clark, who he feels is a unreliable idiot, lost such an important stone. Lewis is referred to as an ivy league prick and with his personality, aura, and appearance he represents this stereotype well. Lewis demonstrates part of the realistic convention McDonough utilizes in his play. People can easily become preoccupied with their work to the point where it becomes unhealthy and they miss out on the important things in life. The audience can originally tell that Clark is an unorganized, flaky, person who has an idealist personality. Lewis gets annoyed with Clark easily and feels that he wastes his t...
Friday, November 22, 2019
Memorandum of Points and Authorities AKA Trail Court Brief Essay
Memorandum of Points and Authorities AKA Trail Court Brief - Essay Example STATEMENT OF CASE Marco Velasco, the DEFENDANT, of legal age, running with friends within the vicinity of San Diego Middle School was apprehended by authorities after they have ran inside and then exited of the SDMS campus with various items in their hands. Defendant was holding a glass vase, while the rest held a bottom of a lamp, a chair leg, and a candlestick. That the four teenagers were seen by campus security officers Miguel Martinez and Marvin DaSilvia on said vicinity. It so happened that Martinez recalled that defendant was a member of a gang and also attended San Diego Middle School. The security officers overheard one of the teenagers in the group of defendant shout, ââ¬Å"Heââ¬â¢s over there!â⬠Subsequently, the campus security officers yelled to the group to ââ¬Å"Stop!â⬠several times but the group of defendant continued running until they went towards the exit of the campus, of which they were subsequently apprehended by Officer Jael Waddle. In the proce ss, the glass vase held by defendant was confiscated and used as evidence to press charges against defendant in violation of section 12024 of the US Penal Code, specifically possession of deadly weapon. The arresting officers, however, failed to secure search warrant for possession of deadly weapons for defendant prior to arrest. This, in the assumption that defendant was a violent person who was about to assault a person with the ââ¬Å"deadly weaponâ⬠glass vase. Defendant was illegally arrested and his possession confiscated without probable cause. ARGUMENT THE COURT SHOULD REVERSE DECICION TO DETAIN DEFENDANT FOR VIOLATION OF PENAL CODE 12024 DUE TO ILLEGAL ARREST AND LACK OF PROBABLE CAUSE. Defendant Marco Velasco, charged with felony for single count of violation of section 12024 of the United States Penal Code, contends that the trial court erred in finding sufficient probable cause to justify his arrest. As a result, the glass vase held by Defendant during his arrest wr ongly assumed as a deadly weapon used against defendant, should have been suppressed. A. Defendant Was Illegally Detained Although defendant was immediately arrested upon apprehension and was never actually detained for investigative purposes, defendant submits that there lacks sufficient cause to justify lawful detention. This fact is important because after defendantââ¬â¢s illegal detention and arrest, he was charged with violation of California Penal Code Section 12024. Arrest and detention is lawful if the circumstances known or apparent to the officer includes specific articulable facts for the officer to suspect any criminal activity is happening and the person he intends to arrest is involved in that criminal activity (Tony C [1978] 21 Cal.3d 888, 890). In Brown v. Texas (1979, 443 U.S. 47), it was stated that, ââ¬Å"â⬠¦intrusion on interests prohibited by the Fourth Amendment and requires a reasonable suspicion based on articulable facts relating to the person or his or her conduct in order to be lawful,â⬠in consideration of alleging that a glass vase on defendantââ¬â¢s possession was a deadly weapon. The Fourth Amendment protects the right of the people to be secure in their persons, house, papers, and effects, against
Wednesday, November 20, 2019
You Decide Research Paper Example | Topics and Well Written Essays - 1000 words
You Decide - Research Paper Example People in developed world are happy with the advancement in technology while developing countries are struggling to keep up with the advanced technology. In the end, developed countries will have to reach an agreement to reduce their energy use in favor of developing countries due to growth in population in these countries, thus an increased demand on energy use to improve their livelihood. The world will require much energy supply in the coming 21st century. Nuclear energy has the potential to meet this demand. The most dominant sources of energy that have been used in developed and developing nations include fossil fuel, coal, oil, natural gas and in some countries they have used hydroelectric power, nuclear power and biomass. Air pollution in china has been on the increase due to energy use over the past decades, especially in urban areas and rural areas due to coal industries that are located in the countryside. It is stipulated that china has three of the ten most polluted cities which are not in accordance with world health organization air quality guidelines in the world (Abramsky, 2010). For example; Shenyang air pollution that took place 20 years ago due high levels of particulates and sulphur oxide in the atmosphere, which reduced visibility. The government of china has not only an obligation to address the problems of provision of basic services to increased numbers of people, develop economically but also address environmental problems of air pollution caused by rapid economic growth. A group of experts from various field in energy sector met in 2003 to discuss the way forward to reduce air pollution as part of energy policy in china. This led to incorporation of air pollution as an important matter when carrying out national planning. Planners in china have been able to look at the impacts of various choices of
Monday, November 18, 2019
High School Graduation Ceremony Essay Example | Topics and Well Written Essays - 1000 words
High School Graduation Ceremony - Essay Example It could never have brought more joy to my family and me as it marked a great step in my academic and social life. This is mainly because, I was going to process to my next level of education, and this would mean a lot especially to my parents who were eager to see me complete my education in a successful manner. To me, it meant relieving myself of some academic stress as I set my eyes on college education. On the other hand, it was a turning point in my social life in many aspects mainly because I was going to change my learning environment. This is especially what excited meowing to the numerous enticing stories I had heard concerning higher education. Due to enthusiasm about completing my high school education, I together with my parents planned appropriately to ensure that the graduation ceremony was a success. This was particularly so because I was in the process of transition to new levels of academic engagements and, therefore, I had to bid farewell to the high school life tog ether with my friends. Concerning my social life, I had great anticipations that high school graduation was going to be the turning point by influencing the kinds of friends I was going to make in my future life. Although I had good friends in high school, I was very anxious on that day because I was sure that I was going to make even more friends and perhaps take my relationships to the next level. In this respect, I vividly remember talking with friends about the kind of life and friends that we were to expect once we would be enrolled for colleges. Since I was leaving my friends in order to go and make new friends, I had to make the day memorable by inviting friends and families. What particularly motivated me was the fact that I would miss most of my friends whereby I was going to meet strangers and make new friends. Thus, the social aspect of my graduation ceremony was a real factor to reckon with. In the above regards, my graduation ceremony was a colorful one thanks to many f riends and relatives who gave a helping hand in the planning and organizing parts.
Saturday, November 16, 2019
The Moral Philosophy Of Virtue Ethics
The Moral Philosophy Of Virtue Ethics Virtue Ethics is a moral philosophy commonly attributed to Plato and Aristotle. The meaning of the word virtue for both was that of excellence. Although there are differences in their individual schools of thought, their outlook on morality is more or less the same. Both these philosophers came upon their understanding of ethics and morality while attempting to answer some fundamental question. For Plato, the question was, what is the good life? And for Aristotle this was, what do men fundamentally desire? In their individual attempts to answer these questions we find their theories of ethics. Plato described four cardinal virtues in his works. They were: Wisdom, Courage, Temperance and Justice, referring respectively to the following faculties of the human soul: Reason, Spirits, Appetites and justice being the correct balance of the first three, which according to him was the subservience of spirits and appetites to the faculty of reason. These virtues when properly exercised would lead to the development of an organized, well-balanced and hence virtuous individual. This well-balanced individual would be a happy person. So, Plato hypothesizes that it is a happy person who is leading a good life (hence, a good life is a happy life). He is happy because he is morally virtuous, morally virtuous because he is guided by reason and reason is knowledge. We now understand the first part of Platos theory that to be happy one must be morally virtuous. This leads to the second part of his theory that reason or that ultimate knowledge which is needed for morality comes from the Idea of Good. It is this Idea of Good which exists in the realm of Ideas, of immutable, unchanging Form which is the source and the final goal of all morality. And this Idea of Good is accessible only to the philosophers. Aristotle differs from the Platonic view over the concept of Forms and that knowledge of morality is a priori. According to him, moral principles are to be discovered through the study of mans life and his experiences and not from some obscure, formless world of ideals. In his search for the answer to what men fundamentally desire, Aristotle more or less comes to the same conclusion as Plato, which is the attainment of Eudaimonia, a term used by Aristotle and translated commonly as Happiness. As with Plato, Aristotle also believes that leading a virtuous life will lead to happiness. A virtuous life is one which is governed by reason. Reason in man has two functions. First is the use of reason (or the rational part of the soul) to control the irrational (appetitive, for e.g. emotions and vegetative, for e.g. breathing) part of the soul. The second is to use reason for the sake of deep analysis to come up with knowledge which in turn yields laws and principles to govern everyday life. He further states that virtue in man corresponds to these two functions of reason respectively: moral virtues and intellectual virtues. These moral and intellectual virtues are the mean between two vices. That is these virtues exist as the middle ground between two extremes. Moral virtues are those which based on rationality are ingrained in a man as his nature and are practiced by him out of habit. Examples of the moral virtues are courage and prudence etc. On the other hand, the intellectual virtues are those of exercising the rational part of the soul purely for the sake of reasoning, an example of which is wisdom. The former (moral virtues) are within reach of the ordinary man while the intellectual virtues fall in the domain of a few divinely blessed only. Finally, according to Aristotle it is the state of character of a person which makes him morally virtuous. This state of character is one of the three components of a mans personality. The other two being: the passions (e.g. anger or fear) and the faculties (e.g. ability to feel anger). It is the state of character which propels a man to choose between two extremes. Hence moral virtue is the state of character of a man which leads him to choose the golden mean. Let us take an example, proper pride is the mean between empty vanity and undue humility. To sum up Aristotles philosophy of ethics is that it is the character of man within which lies the power to choose. Hence it is not the act but the choice made between different forms of that act that morality is evident. NOTES William Lille, An Introduction to Ethics, (London: Methuen Co Ltd, 1971), 272. Ethel M. Albert, Theodore C. Denise and Sheldon P. Peterfreund, Great Traditions in Ethics, (New York: D. Van Nostrand Company, 1980), 11. Ibid., 38. Lille, An Introduction, 274, 277. Ethel M. Albert and others, Great, 11. Ibid., 29. Ibid., 38. Ibid., 46. Ibid., 48. Ibid., 39. Ibid., 50.
Wednesday, November 13, 2019
Class Distinction Shown in The Prince and the Pauper Essay example --
In his book, The Prince and the Pauper, Mark Twain highlights class distinction very often. It plays an immensely important role in his novel, because Twain places his two main characters in the total extremes of the social class. Through these characters, Edward and Tom, Twain illustrates the vast difference between the high and low ends of the social class in England, shows how ignorant they were of each other, proves that a person's social status was determined by his appearance, and demonstrates that social status does not show the true worth of a person. Throughout the whole book, Twain shows that there is a huge difference between the English Royalty and the slums. He does this by describing Tom's and Edward's homes, the people surrounding them, their way of life, and the way they dressed. The first chapter of Twain's book starts out like this: In the ancient city of London, on a certain autumn day in the second quarter of the sixteenth century, a boy was born to a poor family of the name of Canty, who did not want him. On the same day another English child was born to a rich family of the name of Tudor, who did want him. (15) Already in the first two sentences, he shows a drastic difference between the two main characters. Tom was an unwanted child, but the whole nation had been longing for the birth of Edward. Later on in the chapter he makes a comment about their clothes, saying that Tom was ââ¬Å"lapped in his poor rags,â⬠and Edward ââ¬Å"lay lapped in silks and satinâ⬠(15). Twain uses Tom's and Edward's homes as another way to portray class distinction. He describes the places where they live so vividly that the reader can almost visualize it in his head. Tom lived on Offal Court, and the name fit his situation pre... ...ction can be found on almost every page. Twain uses it to portray his own views on England's social classes. Works Cited Paul, Kathleen. "The Prince and the Pauper." Masterplots II: Juvenile and Young Adult Fiction Series (1991). Literary Reference Center. EBSCO. North Haledon Free Public Library, North Haledon, NJ. 3 Jan. 2009 . "The Prince and the Pauper." Masterplots, Revised Second Edition (1996). Literary Reference Center. EBSCO. North Haledon Free Public Library, North Haledon, NJ. 3 Jan. 2009 . Twain, Mark. The Prince and the Pauper. New York: Harper and Row, Publishers, Inc., 1964.
Monday, November 11, 2019
Librarysystem
A PROPOSED COMPUTERIZED LIBRARY SYSTEM USING RFID FOR BARANGKA ELEMENTARY SCHOOL A Thesis Presented to the Faculty of Informatics International College Cainta, Rizal In Partial Fulfillment of The Requirements for Thesis A MEJIA, JEMWARD ALLEN M. AMERICA, EDMAN PAUL R. LUMBAO, JONALYN D. FEBRUARY 2013 TABLE OF CONTENTS THESIS APPROVAL SHEET â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦ ii ACKNOWLEDGEMENT â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. iii DEDICATION â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ iv ABSTRACT â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã ¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦ v TABLE OF CONTENTS â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. vi LIST OF FIGURES AND TABLES â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ ii CHAPTER 1 INTRODUCTION â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 1 Background of the Study â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 4 Statement of the Problem â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 5 Scope and Limitation â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 6 Significance of the Study â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦9 Research Hypothesis â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦10 CHAPTER 2 EVALUATION DESIGN AND FRAMEWORK â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 11 Theoretical Framework â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 12 Conceptual Framework â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã ¢â¬ ¦Ã¢â¬ ¦14 The Variables, their Definitions and Importance to the Study â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦15 Definition of Terms â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 7 CHAPTER 3 RESEARCH METHODOLOGY â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 18 Methods of research â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 19 Locale of the Study â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦20 Participants of the Study â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 21 Sources of Data â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦. 22 Procedure of the Study â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 24 Design Strategy â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 25 Statistical Treatment â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 26 CHAPTER 4 RESULTS AND DISCUSSIONS â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦. 27 CHAPTER 5 SUMMARY OF FINDINGS, CONCLUSIONS AND RECOMMENDATION â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã ¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 28 CHAPTER 6 OUTPUT â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 9 BIBLIOGRAPHY â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 130 APPENDICES â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.. 131 CURRICULUM VITAE â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦140 ACKNOWLEDGEMENT We would like to extend our gratitude to the following staff and students of Barangka Elemen tary School who helped us while working on this proposal: Ms. Lourdes Larios, Ms. Violeta Dig, Ms. Aizaleen Marcelo, Jan Bernice Reign Cruz, Arch Gabriel Tesorero, Katya Santos, Patricia Kaye Cervantes, Reylaldo Jose, Kimberlyn Gumaro, Rudelyn Dingding, Eunice Roxas, Claire Erika Samsona, Maria Angelica Ronsairo, Rica Mae Guttierez and Jim Arron Abanos.We would also like to thank our adviser, Ms. Mylene Alvaran who guided us throughout the whole process of this study. To our families who gifted us with education, the rest of our Informatics Marikina family, and last but not the least, to our Lord God. With Him all things are possible. CHAPTER 1 INTRODUCTION The library is always been a ââ¬Å"study roomâ⬠for the people especially for the students who wants to make studies and researches. We simply define library as a room or building containing a collection of books. Before the advent of omputers, libraries usually used a card catalog to index all the items inside it. For acad emic libraries, if the students want to borrow a book, they should have their library card and they should give it to the librarian for the security of the books and for special libraries you should be member of that institution, organization or association. There are three types of libraries. First public libraries, it describes as large main branch and opens to the public and it is maintained by the local authorities like National Library here in the Philippines.It has the most extensive reference collection (dictionaries, encyclopedia, indexes, historical documents of the Philippines, etc. ) and provides resources such as internet access and databases on CD-ROM. Second type of library is the College Libraries. This type is what all schools have. Sometimes itââ¬â¢s open to the public also and its collection reflects the academic majors and specialties of the school. Lastly, the Special Libraries, its being run by corporations, associations or governments or specialized in a par ticular subject.The existence of a library for every schools, organizations, institution and associations come with much importance, like it can be considered as a store-house of knowledge and renders a great service to the society. It plays a very important role in promoting the progress of knowledge. Foe people who love read books which also called ââ¬Å"bookwormsâ⬠but canââ¬â¢t afford to buy books, library is the best for them, also a best help especially for students. It is also a very useful for rural youths to spend their time reading books instead of doing evil habits such as gambling and loitering.Nowadays library has been evolving to automated library system (ALS) or also known as Library Management System (LMS). It is use to track all items inside the library and monitor who have borrowed and return books. It uses a software or program that interact with the database and has two graphical user interfaces (GUI), one for user and one for administrator. It is cost e ffective and space saving alternative to other document shelving, and addressing the need for secure and automated document and record handling. Radio-frequency technology has come far from its roots at the beginning of the twentiethà century.Russian physicistà Leonà à Theremin is commonly attributed as having created the first RFID device in 1946 (Scanlon, 2003). While Theremin may be recognized for the first successful application of the technology, RFID has earlier roots. RFID is a combination of radar and radio broadcast technology. Radar was developed in theà U. S. in the 1920s (Scanlon, 2003). Scholars noted the relationship between electricity and magnetism, which is a foundation of radio broadcasting, at the beginning of the nineteenth century (Romagnosi, 2009).Harry Stockman wrote a seminal paper in 1948, identifying the vast amount of research and development still needed before ââ¬Å"reflected-power communicationsâ⬠could be used in applications. Interest in implementing RFID in libraries is on the rise (Dorman, 2003). RFID technology has been used to raise efficiency in transport, business and theft-monitoring systems. The evolution of RFID described below suggests that libraries may well benefit from widespread use of this technology. Background of the StudyBarangka Elementary school is located at General Julian Cruz Street, Bonifacio Avenue, Barangka. Marikina City. The school is currently has more than 1000+ book titles and copies. With only a librarian and a teacher librarian handling all transactions thru manual recording and processing, book borrowing and returning as well as master list updating has always been a tedious task. This has been causing delays in processing, organization, and inventory of currently available, currently borrowed, damaged, donated and phased-out books and consumes a lot of time.Other than those problems it can also came up with the result of data mishandling, book records are not updated and lots o f borrowers will have a time waiting for one borrower to another, librarian will be more confused if there will come a time were all students are borrowing a book all at the same time. T0he researchers came up with the idea of developing a Library System that would improve transaction efficiency. Being part of an institution where identification is used not just for efficiency but for safety as well, the proponents decided to make the usage of the library system but the library data files/ documents more secured.The library system may only be used by authorized staff, but it would be better if the library itself was restricted for those who are supposed to benefit from it. By having the need to identify themselves with the use of RFID, everyone who borrows a book in the library is enlisted. Also, it will help the library staff to be able to monitor and distinguish the days and books the library is most used and the statistical details of the library. Statement of the Problem Current Library System of Barangka Elementary School (Manual Library System) 1. The system is inconvenient to use 2.The security of books is questionable 3. Take more effort and time consuming in listing and checking all the books 4. The librarians donââ¬â¢t have any idea about the circulating books. 5. The students and professors donââ¬â¢t know the books information and availability. 6. Sometimes the librarian didnââ¬â¢t know the total amount of fines and date of dues of the students. 7. The librarian canââ¬â¢t have a reports of who borrowed and returned books. 8. The student cant reserve book/s. 9. Sometimes the books were being borrowed by students for more than 2 days. 10. The books were damaged after returning HypothesisThere is no significant difference between the perceptions of the teachers, students and the librarian concerning the Library System using RFID. Scope and Limitation The study took place at the Barangka Elementary School. The researchers conduct a study ins ide the school and ask for permission to gather some information about their library. After that the researchers went to the library and have some study, they went to the Barangka Elementary School on February 22, 2013 to gather some information for the proposed library system using RFID and gathered these following variables to suits the proposal system.These variables that the researchers gathered are student name, address, contact details, and book ID for further explanation student name is needed for the librarian to know who is the borrower and identify the borrower, Address to identify the borrowers current location, contact details to contact the borrower if there is some problems about the book and book id to identify the number of the book and the number of its copy when it is being borrowed. After gathering the variables needed, the researcher needs some programming language in order to use the gathered variables as data to the proposed system.The VB6. 0 or shall we say Vi sual Basic 6. 0 or Visual Basic. Net is being chosen by the researcher as programming language. The researcher also needs some hardware for the proposed system in order to make some testing and runs. For the researchers they choose desktop and laptop computer which is currently installed with vb. 6. 0 and running to an operating system of Windows XP and Windows 7. Significance of the Study In this section, the study benefits the following people inside and outside the organization: 1. Librarian Once the new I.T solution is implemented in the library, the librarian would be able to easily monitor more books that are available or unavailable. He/she can easily identify the borrower with the use of RFID. This means faster access to information and faster processing of book borrowing. 2. Students and faculty Students and faculty members can benefit from this study because with the new automated system, they would be able to easily find the books they want to barrow. They would also bene fit from faster processing of book borrowing since the library staff would be able to easily track borrowers. . School administration The school administration will also benefit from this study because the library system also brings about more secure ways of managing the schoolââ¬â¢s library collection. This means that the possibility of losing books due to lost borrowing records and security problems will be minimized with the proper implementation of the new system. This new system serves as a good way to protect the schoolââ¬â¢s investment in library holdings. Chapter 2 EVALUATION DESIGN AND FRAMEWORK Theoretical Framework The association of research libraries (ARL) in North America has collected tatistics related to its memberââ¬â¢s libraries for many years ago. These statistics focused on ââ¬Å"inputâ⬠measure size of collections or number or staff. Subsequently, ARL considered ââ¬Å"Outputâ⬠measures such as circulation statistics. Shim and Kantor (1996) u sed data envelope Analysis (DEA) to evaluate digital libraries. DEA measures the relative efficiencies of Organizations (ââ¬Å"decision making unitsâ⬠), given multiple inputs and outputs the measurement of efficiency can apply to a single institution over time, or across multiple institutions.As shim and Kantor state ââ¬Å" an efficient library is defined as the one which produces the same output with less input or, for a given input, produces more output. â⬠While this approach advance the notion of evaluation, Kyrillido (2002) points out that the relationships between inputs and outputs within a library are not necessarily clear. Additionally, Shim and Kantor indicate that libraries must describe how inputs are transformed into services, rather than outputs. ARL has acknowledged this need through its New Measures Initiative, which emphasizes outcomes, impacts, and quality, based on user satisfaction.ARLââ¬Ës E-metrics projects represents an effort to define and coll ect data on the use and value of electronic resources. ARLââ¬â¢s LibQual+â⠢ attempts to measure overall service quality in academic research libraries (Cook et al. , 2001). LibQual+â⠢ arose from SERVQUAL, an instrument, based on the gap theory of service quality, which was used to assess private sector institutions. ARL intends to extend LibQual+â⠢ to evaluate digital libraries, through the National Science Foundationââ¬â¢s National SMETE Digital Library (NSDL) program.The affirmed Kantor, along with Saracevic, (1997a; 1997b) conducted a long term study to develop a taxonomy of user values for library services and a methodology for applying the taxonomy. They also provide arguments for the importance of used-based evaluation include Norlin (2000) who evaluated user satisfaction regarding references services with surveys to gather demographic data, unobtrusive observations of the delivery of reference services, and follow-up focus groups. Hill et al. (1997) used multiple methods to obtain feedback regarding the Alexandria Digital Library (ADL) at the University of California, Santa Barbara.The study adopted several methods to evaluate user views including: online surveys, ethnographic studies, focus groups, and user comments. The goal of this study was not to compare the value of the library system to its costs, but rather to incorporate the user feedback in the ongoing design and implementation of the ADL. Talbot et al. (1998) employed a Likert type survey to evaluate patron satisfaction with various library services at the University of California, San Diego. This survey was conducted in response to a comprehensive change in the library managementââ¬â¢s philosophy.Chris Borgman at UCLA has written extensively regarding digital libraries from user-centric perspective. One of her recent works, Borgman (2000), provides a multi-disciplinary, holistic, human- centered perspective on the global information infrastructure. Many economists inc luding Hal Varian, Malcolm Getz, and Jeff Mackie-Manson have examined the evaluation of libraries and information. Mackie-Manson, and the others, examined the issue of electronic journals pricing during the Pricing Access to Knowledge (PEAK) 2000 conference.There are numbers of studies that adopt multi-attribute, stated-preference techniques, or some variant of them. Crawford (1994) describes a multi-attribute, stated-preference application for evaluating reference within academic libraries and provides an overview of an earlier study using similar techniques (Halperin and Stradon 1980). Harless and Allen (1999) utilize contingent valuation methodology (CVM), a subset of multi-attribute, stated ââ¬âpreference techniques, to measure patron benefits of reference desk services.Basically, CVM explores userââ¬â¢s willingness to pay in dollar values, for varying levels of services. The most widely cited reference for CVMââ¬â¢s Mitchell and Carson (1989). The Harless and Allen pa per raises the important distinction between use and option value, concepts that have been developed in the context of environmental. Use value reflects the value of benefits as assigned by actual users of specific services. Option value incorporates the additional benefits as determined by users who might use specific services in the future (i. e. individual who had not used the reference service but still placed a value of its existence). Any evaluation study that focuses only on individuals who use a specific service (e. g. , interviewing only patrons as they leave the reference desk) will most probably underestimate the benefit of the service in question. Outside of the US, the eVALUEd project team has implemented a questionnaire designed to collect data regarding evaluation methodologies in the UK. The questionnaire was offered to the heads of Library/Information Services in Higher Education Institutions in UK.The goal eVALUEd is to produce a transferable model for e-library ev aluation and to provide training and dissemination in e-library evaluation. The results of this effort should provide an interesting comparison to efforts based in the US. These studies demonstrate an increasing emphasis on both inter and intra-institutional measures, outcomes rather than inputs, a user-centric perspective, adoption of evaluation techniques from various disciplines, and evaluation of libraries that is published as a software. Conceptual FrameworkThe aim of conceptual model of the study is to visualize the theoretical plans that will be used in the study. It is composed of three blocks, explicitly the input, the process and the output blocks. The Input Block is made up of personal information such as name and address contact details . Book number for the numerical arrangement of book according to its accession number and identification card for serial number purposes. The Process block is made up process where all the variables in the input is being used to make a pr ocess that will definitely return a certain output.The Output block is made up of what will be the outcome when the inputs and process have been done and it is Library system using rfid The Evaluation will now see if the system meets the clientââ¬â¢s requirements if it is working properly. It will serve as assembly practice for the comments, feedbacks, and suggestions from the user of the system. Importance to the study The importance of name to the study is to identify who are the borrower / user of the library system. The importance of address in the study is to identify the borrowers / userââ¬â¢s location for security purposes.The importance of contact details in the study is to identify the borrowers/ userââ¬â¢s details whenever there are some arguments about the book that has been borrowed or returned. The importance of the Book ID/ Book Number is to identify the current book status whenever it is in or out of the library. Chapter 3 Methodology Method of Research The p roponents use the following techniques or methods in order to achieve data gathering for this study. First, the researchers use the descriptive method of research that involves a process of observation of events and facts and their description in words and/or numbers.Second, the proponents also use the job analysis method that deals with the assessment of the efficiency and effectiveness of practices, policies, instruments or other variables in work process of an organization. These two methods were used because the tasks in the study involves the observation of perceptions of the respondents and the analysis of existing work practices in order to come up with improvements. Locale of the Study The study took place in Barangka Elementary School, located at Bonifacio Avenue Barangka Marikina City, beside the Barangay Hall of Brgy. Barangka.The library currently uses manual process of borrowing and returning of books, a data base that contains an inventory of books. However the library doesnââ¬â¢t give students and faculty members/ staffs the ability of borrowing and returning of books more secured and much detailed information. The database just helps the librarian in performing regular inventories of books. The researcher then thought of coming up with a solution to help improve the way the libraryââ¬â¢s collection and book borrowing are managed. For further analysis here a scenario for us to know about the process currently happens in Barangka elementary school library.At first the student will confront the librarian asking for a book and then the librarian will look up to his/ her records of the books. If the book is in the book shelves then the librarian will tell if it is available or out. When the book is available then the librarian will ask if the student will borrow the book and ask for his/ her library card and fill it with the following information. After registering the book as being barrowed the librarian take a look at his/ her records and re cord the book that is being borrowed.And this is the process in the Barangka elementary school library. Participants The participants in this study were librarian, Students and faculty members. During this conduct of study the population of the participants could be broken down to 150 students, 10 faculty members and staff and school librarian with the total of 161 persons. The survey was held to get the general perceptions of the librarians, students and faculty members on the accuracy, efficiency and security of the current library system. Research InstrumentsInterview about the existing library system was done by asking questions related companyââ¬â¢s background, existing library process, problems encountered while using the existing system. The answers are answerable by their own insights of the person involved during the interview session. The purpose of the surveys and interviews is for the proponents will know of there will be improvements that they are going to add for th eir proposed project. The proponents used questionnaires for surveys of Barangka Elementary School Library system using rfid.The questionnaire is composed of 4 questions. These are answerable by the numbers which are from their own perceptions and experiences and experiences. Number one (1) is equivalent to always answer, number two (2) is equivalent to often, number three (3) is equivalent to sometimes answer, number four (4) is equivalent to rarely answer and number five (5) is equivalent to never answer. The proponents chose the survey to be answerable by 1,2,3,4 and 5 only because they want it to be more convenient and answerable by the students of the Barangka Elementary School. Data gatheringBefore initiating the study, the researchers requested permission through a letter signed by the adviser, and approved by the school Principal. The questionnaire to be used for the survey was prepared and presented to the adviser for the approval. After the adviserââ¬â¢s approval of the questionnaire, the researchers conducted the survey in the school where the participants include the librarian, students and faculty members. Design Strategy 1. Planning On completing the survey and the data gathering, the researchers started the planning stage in the developing the Library system using rfid.Through the survey and interview, the researchers learned more about the existing manual library system, and how it can be improved through with the use of RFID. During the planning stage, the data flow diagram, entity relationship diagram and flow chart were prepared. 2. Writing The researchers used VB. 60 and VB. net in programming the process and Microsoft Access for the database. Vb6. 0 and Vb. net was selected it can handle a program more reliable, Microsoft Access is selected because it can handle database more efficiently. 3. Testing The Library system using rfid was tested first among the researchers.The librarian, students and the faculty members also tested the system and gave suggestions in improving its usability. 4. Implementation The proponents have launched the Barangka Elementary School Library system using rfid after all testing, analyzing the final results and all the criteria and said goal are accomplished. Should the proponents and benefactors of the said system are not satisfied; the system will then undergo a new evaluation. The implementation has the following stages: 1. Training of staff and librarian ââ¬â The staff, administrations and librarians will be trained later on time.Theyââ¬â¢ll learn the security features, how to enter data produce reports. 2. Live run of the System ââ¬â The proponents will present during this initial live run to troubleshoot possible errors. 3. Turnover of documentation and software ââ¬â The software and documentation will be turned over to the administrators and librarians of the school as soon as the System was being approved. Chapter 4 Results and Findings This chapter presents the dat a gathered through the survey. The results were analyzed by using the weighted means, and their corresponding verbal interpretations.Table 1, 2, 3, and 4 show the results of the survey conducted for the students and librarian of the Barangka Elementary School, Marikina City on the accuracy, security, accessibility, and usability of proposed library system which is Barangka Elementary School Library System using RFID. They asked 160 respondents including the librarian and faculty staff. Table 1: Perceptions of the students and the librarian on security Question 1| Number of Respondents| WtdX| Verbal Interpretation| | 1| 2| 3| 4| 5| | | The books are well secure. 152| 8| 1| 0| 0| 1. 3| Books are always secure. | The results under the category accuracy gave weighted means ranging to 1. 3 (always). The results indicate that all books were secure Library System School using RFID. Table 2: Perceptions of the students and librarian on the accessibility Question 2| Number of Respondents| Wt d X| Verbal Interpretation| | 1| 2| 3| 4| 5| | | The accessibility of the system is applicable. | 154| 6| 0| 0| 0| 1. 15| The accessibility of the user accounts is always applicable. |According to the results under the category accessibility gave weighted means ranging to 1. 15 (Always). The results include that the proposed system has user level accessibility from school staffs to student accounts of campus. Table 3: perception of the students and the librarian on accuracy Question 3| Number of Respondents| Wtd X| Verbal Interception| | 1| 2| 3| 4| 5| | | . The Accuracy in updating account details | 148| 12| 0| 0| 0| 1. 1| The data and settings are always accurate| Under the table of question about accuracy gave weighted means ranging to 1. (Always). The result include that the records / data and settings are always accurate and can give correct and updated information to the users. Table 4: Perceptions of the students and the librarian on usability Question 4| Number of Respondent s| Wtd X| Verbal Interpretation| | 1| 2| 3| 4| 5| | | Usability of the system. (e. g. Features Modules)| 150| 10| 0| 0| 0| 1. 25| The system is always usable or user friendly. | Under the table of usability the weighted means ranging to 1. 25 (Always).The result implies that the users can use the system with minimum trainings or without trainings at all. Chapter 5 Summary, Conclusion and Recommendation This presents the summary of findings, conclusion and recommendations to solve the problems. A. Summary The findings of this study are shown under the categories of accuracy, security, accessibility, and usability. 1. Perception of accuracy According to the perception of the students and the librarian, accuracy of data are well maintained by the system. 2. Perception on security According to the students and librarian, all the books can be secure. . Perception on accessibility According to the students and the librarian, user accessibility of the system is applicable and working prope rly. 4. Perception on usability According to the students and librarian, the system is easy to use with graphical user Interface. B. Conclusion Taking into the account the finding mentioned previously, proponents came up with their conclusion that the system has meet the minimum requirements and important requirements that the client needs. All the modules are working properly and satisfy the users.Although the system is open for future enhancement. C. Recommendation The proponents came up with the following recommendations based on the result of the live run testing of the system; . User Level ââ¬â logout of the existing account first before another user can login. . Quantity of the books ââ¬â the total number of books in each category. . Fine computation ââ¬â computation of fine of each student. . Usability of internet in accessing accounts of the users ââ¬â using of internet in accessing user accounts. APPENDCES A. Survey Questionnaire Name: __________________ Dat e: _____________Upon using the applied system, indicate if the questions below meet the desired requirements of the users. Check the number of your desired answer. (1- Always, 2- Often, 3- Sometimes, 4- Rarely, 5- Never) Questions| 1| 2| 3| 4| 5| 1. The books are well secured| | | | | | 2. The accessibility of the system is applicable. (e. g borrower type)| | | | | | 3. The account details are updateable| | | | | | 4. Usability of the system(e. g graphical interface)| | | | | | Screenshots Login Page Main Menu Books User Borrower Borrowing Returning Book Reports
Saturday, November 9, 2019
John Foulcher for the Fire Q&a Essay
For the fire Q&A The first lines in the poem introduce us to the sounds in the bush. what are these sounds and whom does he think is making the noise? Why is his mistake understandable? What effect is achieved through these sound images? * The opening starts with the word ââ¬Å"Outsideâ⬠presenting the natural world that appears on the surface to be so beautiful and gentle. ââ¬Å"a chopping soundâ⬠disrupts the natural image, ââ¬Å"its singular human thudâ⬠represents a human is harming the environment. The effect is that humans are damaging the environment and its not uncommon (the author is not surprisedâ⬠Explain the effect of the simile ââ¬Å"like clockworkâ⬠what effect is created by the repetition of theââ¬Ëtââ¬â¢ andââ¬Ëdââ¬â¢ sounds in the sound drops/chipped from a tall dead tree? * It reminds us that this is a place controlled by nature. It is repetitive and continuous the image of the kookaburra and the lizard is vivid. Comment on lines 6-10 discussing the images created, choice of words and what they may suggest, the expressive verbs and the overall meaning of these lines. * The authors powerful language and imagery that we witness the savagery and brutality and feel sympathetic. what does the word oblivious tell us about the birds behaviour? * The bird doesnââ¬â¢t have sympathy for the lizard because it is a part of natures cycle and it was uninvietable. The birds behaviour is instinctive and even though it may seem brutal and savage to us, it is acting only out of instinct and survival. How does the poet indicate his acceptance of the birds apparent brutality. * The poet doesnââ¬â¢t help the lizard, instead he accepts natures cycle and picks up his kindling and leaves. What interpretation can you suggest to explain the meaning of the cold air congealing behind me * Visual image of the air is like a door closing on a world where the poet was an intruder.
Wednesday, November 6, 2019
police science Essay Example
police science Essay Example police science Essay police science Essay Police administration Essay 1 The list of UCR crimes includes murder, rape, robbery, aggravated assault, burglary, larceny theft and vehicle theft. When statistics for murder cases are being recorded, they include those of manslaughter too. The figure of murder currently reads beyond five hundred in New York. Rape cases are beyond one thousand. However, the trend shows they have reduced as the years have passed. For instance, in 1980, statistics for rape cases were three thousand seven hundred and eleven. In 2005, the figure had reduced to one thousand four hundred and twelve. The department of homeland security has approximately 230,000employees. Community policing has three key elements that fall under organizational dimension, external elements and tactical elements. There are several more under these key elements such as inclusion of citizens. The broken window theory is based on the assumption that if a small crime is not responded to, it will result to more crime. Thus, criminal behavior could be termed as a lax in police force. The NYPD patrol bureau is concerned with planning, directing and coordinating of the police in uniform on their law enforcement patrol duties. The CIMS branch that requires having detectives for combating terrorist activities is the police department. The COPMSTAT was started in New York by Jack Maple when he was a transit police officer Yes/ No Answers 1) Did a riot occur in Los Angles in the 1992 over the beating of a black male motorist by police officers? Yes 2) Did Police Commissioner Lee Brown bring Community Police to NYPD? Yes 3) Is Police Administration a general term for police supervision and operations? No 4) Are there five (5) branches in the CIMS model? No 5) Is August Volmer considered the father of policing in America? Yes 6) Is the NYPD Fusion center called the Command and Dissemination Center? No 7) Is an example of domestic terrorism group Hamas? Yes 8) Did Chief Justice Earl Warren take away many rights from criminal suspects? Yes 9) Was SARA model first used by Sir Robert Peel in England Pendleton Reform? Yes An example of a patrol function is conducting buy and bust operations. No
Monday, November 4, 2019
Subculture identity how the tradidiontal costume keeps their own Essay
Subculture identity how the tradidiontal costume keeps their own culture nowadays - Essay Example Hence, a historical back ground of various sub culture identities such as Greeks, Japanese, Arabs, Indians and etc along with their culture costume characteristic is being discussed in this article. Furthermore, it's greatly shedding light on latest outfits of various sub culture identities and presenting several opinions of writers regarding how to keep that traditional culture costume alive in joyful manner. In order to describe how the traditional costumes of Greeks was reminiscent of question arises from the frequent consideration. Basically, the frequent consideration (Vrelli-Zaxou 1994) is that long-established costume is definitely the costume. However, it characterizes the individuality of a farming culture and on the other hand it articulate the connection flanked by an individual and the civilization. Giselis (1974) inscribe that the set of clothes is a representation of the particular crowd and not of its wearer's character which underneath force may be required to match to the mutual strength. It should be noted that it is not simple to differentiate oneself commencing the group of people with a costume (Vrelli-Zaxou 1994), while the civilization itself stimulate the method of communal control and permit forcing a potential outlook modernizer to come back to the array. The major feature of folk set of clothes is to facilitate generally acknowledged by the preponderance (Vrelli -Zaxou 1994). Moreover, it cannot fail to notice the information to facilitate the remark as costume. which is a strange remark pro the Greek, is derivative since the English remark 'costume' and its doublet 'custom', which into their twirls are source of Latin consuetude 'habit' Each and every from the above is resultant from the information that each consign possess its own costume. The ordinary difference by more than a few writers (e.g. Roubis 1995) links the set of clothes of the residents of hilly regions and those existing on the plains, and as well as among the outfits of the islanders and the residents of mainland, is no longer applicable. Since study has shown that a century before rural communities illustrated themselves from others with a quality costume (Hatzimichali 1925). In addition, traditional civilization a costume might have contained a variety of utilities. Solitary of its utility was to replicate the modification of the exertion time and as well as the holiday plus the days of time off. They fluctuate morphologically as distant as the excellence and beautification is Apprehensive (Kyriakidou-Nestoros 1989). The set of clothes for daily practice is very realistic in its dim colors and with no at all sewing and attractive elements. On the other hand, joyful clothing is traditionally wealthy in colors and decoration. The joyful costume is extensively worn in official dancing and at carnivals through out the entire Greece. Furthermore, there are certainly some areas where a unique and special set of clothes is worn for special occasions. It should be noted that in the rural community of Nesting, Arcadias (Vrelli-Zaxou 1994) males put on the tsipianitiko shirt where as women put on asprofoustano, a definite type of pallid dress, in Sirako, Paros (Dimas 1993) firm pastoral shoes are worn out on festive and
Saturday, November 2, 2019
Native American Art History Essay Example | Topics and Well Written Essays - 500 words
Native American Art History - Essay Example As the report stressesà there is omission of the Plateau and or is discussed as an imitation of the areas around it, making it hard for the art to be recognized as historical canon. ââ¬Å"A Nez Perce shirt, technically from the Plateau, would be less likely to appear than a similar Crow shirt from the Plains, and a Nez Perce cradle might be overshadowed by one from the Great Lakesâ⬠.This essay highlights that exhibitions of Native American art focused broadly on culture areas and more narrowly on the art of specific Native nations or individual artists.P.79.There was thus no exploitation of the artwork.à Adena Pipe was often included in canons as those created by a master or genius. This is because the work was known by archeological designation and location of discovery. The great naturalism and unique nature of the pipe have placed it in the art historical canon.à Great Serpent Mound in Ohio is artwork whose date aligns closely with that of the supernova of the Crab Neb ula.P.74. It fits in the western art canon because it offers immediate comparison to other earthworks that appears in the same volumes of American sculpture.à The artwork is supposed to be wide. There are so many barriers that have limited the artwork.à Masterpieces that break from the tradition of the Native American art make the work and the artist to remain anonymous.à The artwork must conform to the standards and this has made many artworks not to be recognized.Ã
Subscribe to:
Posts (Atom)